Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET CVE-2025-24043 WinDbg Remote Code Execution Vulnerability
MicrosoftASP.NET Core & Visual Studio CVE-2025-24070 ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
MicrosoftAzure Agent Installer CVE-2025-21199 Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability
MicrosoftAzure Arc CVE-2025-26627 Azure Arc Installer Elevation of Privilege Vulnerability
MicrosoftAzure CLI CVE-2025-24049 Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability
MicrosoftAzure PromptFlow CVE-2025-24986 Azure Promptflow Remote Code Execution Vulnerability
MicrosoftKernel Streaming WOW Thunk Service Driver CVE-2025-24995 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-43098 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53165 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53157 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53156 Unknown
security@golang.orgMariner CVE-2025-22868 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53146 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-27026 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-35790 Unknown
secalert@redhat.comMariner CVE-2024-12133 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-26943 Unknown
secalert@redhat.comMariner CVE-2019-3833 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-40982 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-35792 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-27061 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53171 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56606 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56622 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56593 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56601 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56704 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56698 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56602 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56574 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53237 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53227 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56369 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53217 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56578 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56572 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56569 Unknown
security@ubuntu.comMariner CVE-2022-28737 Unknown
secalert@redhat.comMariner CVE-2024-3727 Unknown
security-advisories@github.comMariner CVE-2024-52006 Unknown
security-advisories@github.comMariner CVE-2024-50349 Unknown
cve@mitre.orgMariner CVE-2017-18207 Unknown
cve@mitre.orgMariner CVE-2017-17522 Unknown
security@golang.orgMariner CVE-2022-32149 Unknown
security@golang.orgMariner CVE-2024-45338 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56777 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57901 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56728 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56774 Unknown
secalert@redhat.comMariner CVE-2025-26595 Unknown
secalert@redhat.comMariner CVE-2025-26598 Unknown
secalert@redhat.comMariner CVE-2025-26596 Unknown
secalert@redhat.comMariner CVE-2025-26594 Unknown
secalert@redhat.comMariner CVE-2021-20286 Unknown
security-advisories@github.comMariner CVE-2024-32021 Unknown
security-advisories@github.comMariner CVE-2024-25629 Unknown
security-advisories@github.comMariner CVE-2024-32465 Unknown
cve@mitre.orgMariner CVE-2024-37535 Unknown
secalert@redhat.comMariner CVE-2023-1393 Unknown
secalert@redhat.comMariner CVE-2023-40549 Unknown
secalert@redhat.comMariner CVE-2023-40546 Unknown
cna@vuldb.comMariner CVE-2025-1182 Unknown
cna@vuldb.comMariner CVE-2025-1181 Unknown
cve@mitre.orgMariner CVE-2007-4559 Unknown
cna@vuldb.comMariner CVE-2025-1176 Unknown
cve@mitre.orgMariner CVE-2020-22217 Unknown
cve-assign@fb.comMariner CVE-2021-24032 Unknown
cna@vuldb.comMariner CVE-2025-1178 Unknown
cve@mitre.orgMariner CVE-2015-9251 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56648 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56650 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56643 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56629 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56688 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56694 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56670 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56623 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56596 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56587 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56595 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56614 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56603 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56615 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56605 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56708 Unknown
secalert@redhat.comMariner CVE-2025-26600 Unknown
security-advisories@github.comMariner CVE-2025-27516 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-50302 Unknown
secalert@redhat.comMariner CVE-2025-26597 Unknown
secalert@redhat.comMariner CVE-2025-26599 Unknown
security-advisories@github.comMariner CVE-2025-27423 Unknown
cve_disclosure@tech.gov.sgMariner CVE-2025-1744 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57902 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56756 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56745 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56747 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56770 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57850 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56787 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56781 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56778 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56779 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56776 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56780 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57896 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57874 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56785 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56748 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56716 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56642 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56715 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56726 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56739 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56723 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56746 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57841 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53239 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53206 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53096 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53173 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56581 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56575 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53226 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53145 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57946 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-36476 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57890 Unknown
cna@python.orgMariner CVE-2024-9287 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-48881 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-50051 Unknown
security@golang.orgMariner CVE-2025-22869 Unknown
secalert@redhat.comMariner CVE-2019-3816 Unknown
secalert@redhat.comMariner CVE-2021-20277 Unknown
cve@mitre.orgMariner CVE-2024-50608 Unknown
secalert@redhat.comMariner CVE-2025-26466 Unknown
cve@mitre.orgMariner CVE-2022-40898 Unknown
secalert@redhat.comMariner CVE-2024-7383 Unknown
secalert@redhat.comMariner CVE-2022-32746 Unknown
secure@intel.comMariner CVE-2019-14584 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2023-52917 Unknown
cve@mitre.orgMariner CVE-2024-50609 Unknown
security@apache.orgMariner CVE-2021-36374 Unknown
security@apache.orgMariner CVE-2021-36373 Unknown
secalert@redhat.comMariner CVE-2024-1454 Unknown
security-advisories@github.comMariner CVE-2025-26618 Unknown
security-advisories@github.comMariner CVE-2025-27144 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-9681 Unknown
secalert@redhat.comMariner CVE-2020-27840 Unknown
secalert@redhat.comMariner CVE-2023-40550 Unknown
security@hashicorp.comMariner CVE-2024-6104 Unknown
facts@wolfssl.comMariner CVE-2024-5288 Unknown
secalert@redhat.comMariner CVE-2021-3672 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56627 Unknown
secalert@redhat.comMariner CVE-2023-40548 Unknown
report@snyk.ioMariner CVE-2021-23336 Unknown
security@apache.orgMariner CVE-2024-52338 Unknown
cve@mitre.orgMariner CVE-2012-6708 Unknown
security-advisories@github.comMariner CVE-2024-32020 Unknown
security-advisories@github.comMariner CVE-2024-34062 Unknown
cve@mitre.orgMariner CVE-2019-20907 Unknown
security@golang.orgMariner CVE-2023-45288 Unknown
secalert@redhat.comMariner CVE-2012-2677 Unknown
cve@mitre.orgMariner CVE-2019-9674 Unknown
secalert@redhat.comMariner CVE-2023-40660 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-47143 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-45828 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53155 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53161 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57807 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57802 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57938 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-57900 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56662 Unknown
secalert@redhat.comMariner CVE-2025-26601 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56724 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56659 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56548 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-55916 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56626 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56600 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53150 Unknown
cve@kernel.orgMariner CVE-2024-26973 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53215 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53151 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56741 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-50181 Unknown
cna@vuldb.comMariner CVE-2025-0840 Unknown
security-advisories@github.comMariner CVE-2024-39908 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56640 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56634 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56754 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56720 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56568 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-53180 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56598 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-56567 Unknown
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1918 Chromium: CVE-2025-1918 Out of bounds read in PDFium
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1919 Chromium: CVE-2025-1919 Out of bounds read in Media
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1916 Chromium: CVE-2025-1916 Use after free in Profiles
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1917 Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1922 Chromium: CVE-2025-1922 Inappropriate Implementation in Selection
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1923 Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1921 Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1914 Chromium: CVE-2025-1914 Out of bounds read in V8
MicrosoftMicrosoft Edge (Chromium-based) CVE-2025-26643 Microsoft Edge (Chromium-based) Spoofing Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2025-1915 Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools
MicrosoftMicrosoft Local Security Authority Server (lsasrv) CVE-2025-24072 Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
MicrosoftMicrosoft Management Console CVE-2025-26633 Microsoft Management Console Security Feature Bypass Vulnerability
MicrosoftMicrosoft Office CVE-2025-24083 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-26629 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-24080 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-24057 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Access CVE-2025-26630 Microsoft Access Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-24081 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-24082 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-24075 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-24077 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-24078 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-24079 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Streaming Service CVE-2025-24046 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
MicrosoftMicrosoft Streaming Service CVE-2025-24067 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
MicrosoftMicrosoft Windows CVE-2025-25008 Windows Server Elevation of Privilege Vulnerability
Synaptics, Inc.Microsoft Windows CVE-2024-9157 Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
MicrosoftRemote Desktop Client CVE-2025-26645 Remote Desktop Client Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2025-24064 Windows Domain Name Service Remote Code Execution Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-24048 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-24050 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftVisual Studio CVE-2025-24998 Visual Studio Elevation of Privilege Vulnerability
MicrosoftVisual Studio CVE-2025-25003 Visual Studio Elevation of Privilege Vulnerability
MicrosoftVisual Studio Code CVE-2025-26631 Visual Studio Code Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2025-24059 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Cross Device Service CVE-2025-24994 Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
MicrosoftWindows Cross Device Service CVE-2025-24076 Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
MicrosoftWindows exFAT File System CVE-2025-21180 Windows exFAT File System Remote Code Execution Vulnerability
MicrosoftWindows Fast FAT Driver CVE-2025-24985 Windows Fast FAT File System Driver Remote Code Execution Vulnerability
MicrosoftWindows File Explorer CVE-2025-24071 Microsoft Windows File Explorer Spoofing Vulnerability
MicrosoftWindows Kernel Memory CVE-2025-24997 DirectX Graphics Kernel File Denial of Service Vulnerability
MicrosoftWindows Kernel-Mode Drivers CVE-2025-24066 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
MicrosoftWindows MapUrlToZone CVE-2025-21247 MapUrlToZone Security Feature Bypass Vulnerability
MicrosoftWindows Mark of the Web (MOTW) CVE-2025-24061 Windows Mark of the Web Security Feature Bypass Vulnerability
MicrosoftWindows NTFS CVE-2025-24993 Windows NTFS Remote Code Execution Vulnerability
MicrosoftWindows NTFS CVE-2025-24984 Windows NTFS Information Disclosure Vulnerability
MicrosoftWindows NTFS CVE-2025-24992 Windows NTFS Information Disclosure Vulnerability
MicrosoftWindows NTFS CVE-2025-24991 Windows NTFS Information Disclosure Vulnerability
MicrosoftWindows NTLM CVE-2025-24996 NTLM Hash Disclosure Spoofing Vulnerability
MicrosoftWindows NTLM CVE-2025-24054 NTLM Hash Disclosure Spoofing Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2025-24035 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2025-24045 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-24051 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Subsystem for Linux CVE-2025-24084 Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
MicrosoftWindows Telephony Server CVE-2025-24056 Windows Telephony Service Remote Code Execution Vulnerability
MicrosoftWindows USB Video Driver CVE-2025-24988 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
MicrosoftWindows USB Video Driver CVE-2025-24987 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
MicrosoftWindows USB Video Driver CVE-2025-24055 Windows USB Video Class System Driver Information Disclosure Vulnerability
MicrosoftWindows Win32 Kernel Subsystem CVE-2025-24044 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
MicrosoftWindows Win32 Kernel Subsystem CVE-2025-24983 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

CVE-2025-24035 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24035
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24035
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Critical Remote Code Execution 5052040
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Critical Remote Code Execution 5052040
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Critical Remote Code Execution 5051980
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24035 ʌ!ɔ⊥ojv with Kunlun Lab


Anonymous


Anonymous


CVE-2024-9157 - Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-9157
MITRE
NVD

Issuing CNA: Synaptics, Inc.

CVE Title: Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
CVSS:
None
Executive Summary:
None
FAQ:

Why is this Synaptics CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is Synaptics' Audio Effects component, which is consumed by Microsoft Windows. It is being documented in the Security Update Guide to announce that the latest builds of Windows are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-9157
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: N/A
Temporal: N/A
Vector: N/A
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: N/A
Temporal: N/A
Vector: N/A

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: N/A
Temporal: N/A
Vector: N/A

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: N/A
Temporal: N/A
Vector: N/A
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: N/A
Temporal: N/A
Vector: N/A
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: N/A
Temporal: N/A
Vector: N/A
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: N/A
Temporal: N/A
Vector: N/A
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: N/A
Temporal: N/A
Vector: N/A
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-9157 Harrison Neal with PatchAdvisor


CVE-2025-24044 - Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24044
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24044
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24044 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2025-24043 - WinDbg Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24043
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: WinDbg Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper verification of cryptographic signature in .NET allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24043
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
WinDbg Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.2502.25002.0
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24043

CVE-2025-24057 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24057
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24057
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002693 (Security Update) Critical Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2016 (64-bit edition) 5002693 (Security Update) Critical Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24057 0x140ce(Peace & Love)


CVE-2025-24070 - ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24070
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain the privileges of the compromised user.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24070
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
ASP.NET Core 8.0 5054229 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
8.0.14
Maybe None
ASP.NET Core 9.0 5054230 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
9.0.3
Maybe None
Microsoft Visual Studio 2022 version 17.10 Release Notes (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
17.10.12
Maybe None
Microsoft Visual Studio 2022 version 17.12 Release Notes (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
17.12.6
Maybe None
Microsoft Visual Studio 2022 version 17.13 Release Notes (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
17.13.3
Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C
17.8.19
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24070 Zahid TOKAT


CVE-2025-24077 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24077
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24077
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24077 Haifei Li with EXPMON


CVE-2025-24078 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24078
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24078
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Word 2016 (32-bit edition) 5002662 (Security Update) Important Remote Code Execution 5002619
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.18526.20080
Maybe None
Microsoft Word 2016 (64-bit edition) 5002662 (Security Update) Important Remote Code Execution 5002619
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.18526.20080
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24078 Haifei Li with EXPMON


CVE-2025-24079 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24079
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24079
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Word 2016 (32-bit edition) 5002662 (Security Update) Important Remote Code Execution 5002619
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.18526.20080
Maybe None
Microsoft Word 2016 (64-bit edition) 5002662 (Security Update) Important Remote Code Execution 5002619
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.18526.20080
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24079 Haifei Li with EXPMON


CVE-2025-24080 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24080
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24080
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002693 (Security Update) Important Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2016 (64-bit edition) 5002693 (Security Update) Important Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24080 Haifei Li with EXPMON


CVE-2025-24081 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24081
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24081
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002696 (Security Update)
5002694 (Security Update)
Important Remote Code Execution 5002687

5002684
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002696 (Security Update)
5002694 (Security Update)
Important Remote Code Execution 5002687

5002684
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Office Online Server 5002690 (Security Update) Important Remote Code Execution 5002679
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10416.20073
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24081 Anonymous


CVE-2025-24082 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24082
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24082
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002696 (Security Update) Important Remote Code Execution 5002687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002696 (Security Update) Important Remote Code Execution 5002687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Office Online Server 5002690 (Security Update) Important Remote Code Execution 5002679
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10416.20073
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24082 f4


CVE-2025-24083 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24083
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24083
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002693 (Security Update) Important Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2016 (64-bit edition) 5002693 (Security Update) Important Remote Code Execution 5002686
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24083 0x140ce(Peace & Love)


Exodus Intelligence Vendor Disclosure Team with Exodus Intelligence


Exodus Intelligence Vendor Disclosure Team with Exodus Intelligence


CVE-2025-24986 - Azure Promptflow Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24986
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Promptflow Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper isolation or compartmentalization in Azure PromptFlow allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, Confidentiality and Integrity are rated as Low and Availability is None (C:L, I:L, A:N). What does that mean for this vulnerability?

While an attacker can access some data, that data is not customer’s data, or any highly sensitive/critical information; furthermore an attacker cannot affect the availability of the product.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24986
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure promptflow-core Release Notes (Security Update) Important Remote Code Execution Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
1.17.2
No None
Azure promptflow-tools Release Notes (Security Update) Important Remote Code Execution Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
1.6.0
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24986 l1k3beef


CVE-2025-24987 - Windows USB Video Class System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24987
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24987
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24987 Adel and Benjamin Rodes


CVE-2025-24988 - Windows USB Video Class System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24988
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24988
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24988 Adel and Benjamin Rodes.


CVE-2025-21180 - Windows exFAT File System Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21180
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows exFAT File System Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21180
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Remote Code Execution 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21180 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2025-24995 - Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24995
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24995
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24995 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-24996 - NTLM Hash Disclosure Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24996
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTLM Hash Disclosure Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an action other than opening or executing the file could trigger this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24996
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Spoofing 5052016
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Spoofing 5052016
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Spoofing 5052020
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Spoofing 5052020
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Spoofing 5051980
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24996 Aakriti Shukla with Microsoft


CVE-2025-24997 - DirectX Graphics Kernel File Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24997
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DirectX Graphics Kernel File Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.4/TemporalScore:3.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Null pointer dereference in Windows Kernel Memory allows an authorized attacker to deny service locally.


FAQ:

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24997
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Denial of Service 5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Denial of Service 5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Denial of Service 5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Denial of Service
5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Denial of Service
5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Denial of Service
5051974
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Denial of Service 5051989
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Denial of Service 5051989
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Denial of Service
5051989
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Denial of Service
5051989
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Denial of Service 5051987

5052105
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Denial of Service 5051987

5052105
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Denial of Service 5051979

5052106
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Denial of Service 5051979

5052106
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Denial of Service 5051980
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Denial of Service 5051987

5052105
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Denial of Service 5051987

5052105
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24997

CVE-2025-24998 - Visual Studio Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24998
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Visual Studio Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


According to the CVSS metric, the attack vector is local (AV:L), privileges are low (PR:L), and user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an authenticated attacker to place a specially crafted .dll file in a local network location. When a victim runs this file, it loads the malicious DLL.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24998
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.9.71
Maybe None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.45
Maybe None
Microsoft Visual Studio 2022 version 17.10 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.12
Maybe None
Microsoft Visual Studio 2022 version 17.12 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.12.6
Maybe None
Microsoft Visual Studio 2022 version 17.13 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.13.3
Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.19
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24998 Polar Penguin


CVE-2025-25003 - Visual Studio Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25003
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Visual Studio Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of this vulnerability requires that a user trigger the payload in the application.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25003
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.45
Maybe None
Microsoft Visual Studio 2022 version 17.10 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.12
Maybe None
Microsoft Visual Studio 2022 version 17.12 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.12.6
Maybe None
Microsoft Visual Studio 2022 version 17.13 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.13.3
Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.19
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25003 ycdxsb


CVE-2025-25008 - Windows Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25008
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper link resolution before file access ('link following') in Microsoft Windows allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker would be able to delete targeted files on a system.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability?

This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25008
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update) Important Elevation of Privilege 5051979
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update) Important Elevation of Privilege 5051979
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update) Important Elevation of Privilege 5051987
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update) Important Elevation of Privilege 5051987
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25008 Lockheed Martin Red Team


CVE-2025-1919 - Chromium: CVE-2025-1919 Out of bounds read in Media

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1919
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1919 Out of bounds read in Media
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1919
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1919 None

CVE-2025-1916 - Chromium: CVE-2025-1916 Use after free in Profiles

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1916
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1916 Use after free in Profiles
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1916
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1916 None

CVE-2025-1918 - Chromium: CVE-2025-1918 Out of bounds read in PDFium

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1918
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1918 Out of bounds read in PDFium
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1918
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1918 None

CVE-2025-1917 - Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1917
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1917
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1917 None

CVE-2025-1921 - Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1921
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1921
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1921 None

CVE-2025-1915 - Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1915
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1915
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1915 None

CVE-2025-1923 - Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1923
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1923
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1923 None

CVE-2025-1922 - Chromium: CVE-2025-1922 Inappropriate Implementation in Selection

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1922
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1922 Inappropriate Implementation in Selection
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1922
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1922 None

CVE-2025-1914 - Chromium: CVE-2025-1914 Out of bounds read in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1914
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-1914 Out of bounds read in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
134.0.3124.51 3/7//2025 134.0.6998.45

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1914
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1914 None

CVE-2025-21247 - MapUrlToZone Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21247
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: MapUrlToZone Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability).


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?

While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.

To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21247
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
5053593 (IE Cumulative)
Important Security Feature Bypass 5052038
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.23168

1.000
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
5053593 (IE Cumulative)
Important Security Feature Bypass 5052038
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.23168

1.000
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053593 (IE Cumulative)
5053620 (Monthly Rollup)
5053627 (Security Only)
Important Security Feature Bypass
5052016
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
1.000

6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053593 (IE Cumulative)
5053620 (Monthly Rollup)
5053627 (Security Only)
Important Security Feature Bypass
5052016
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
1.000

6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Security Feature Bypass 5052020
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Security Feature Bypass 5052020
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053593 (IE Cumulative)
5053887 (Monthly Rollup)
Important Security Feature Bypass
5052042
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
1.000

6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053593 (IE Cumulative)
5053887 (Monthly Rollup)
Important Security Feature Bypass
5052042
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
1.000

6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Security Feature Bypass 5051980
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21247 George Hughey with MSRC Vulnerabilities & Mitigations


George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2025-21199 - Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21199
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an administrator to install the VM agent on the target device where an attacker has planted specially crafted malicious files.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to have access to the location where the target file will be run. They would then need to plant a specific file that would be used as part of the exploitation.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


What are the fixed build numbers for the versions of Azure Site Recovery addressed in Update Rollup 76 for Azure Site Recovery?

Component Name Version
ASR V2A Agent (Classic VMware/Physical to Azure) 9.63.7233.1
ASR H2A Agent (Hyper-V or VMM to Azure) 5.1.8116.0
ASR Mars 2.0.9940.0

**Are there any any prerequisites for installing the update?

To install Microsoft Azure Site Recovery Provider Update Rollup 76, you must have one of the following installed:

  • Microsoft Azure Site Recovery Provider (version 5.23.x or a later version)
  • Microsoft Azure Recovery Services Agent (version 2.0.9263.0 or a later version)

Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21199
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Agent for Backup Release Notes (Security Update) Important Elevation of Privilege Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.9940.0
Maybe None
Azure Agent for Site Recovery Release Notes (Security Update) Important Elevation of Privilege Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
9.30
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21199 R4nger & Zhiniang Peng


CVE-2025-24045 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24045
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24045
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Critical Remote Code Execution 5051980
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24045 ʌ!ɔ⊥ojv with Kunlun Lab


Ashana Sharan with Microsoft India


CVE-2025-24046 - Kernel Streaming Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24046
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24046
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24046 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-24048 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24048
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain Kernel Memory Access.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24048
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24048 ChengBin Wang with ZheJiang Guoli Security Technology


CVE-2025-24050 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24050
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain Kernel Memory Access.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24050
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24050 ChengBin Wang with ZheJiang Guoli Security Technology


CVE-2025-24051 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24051
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24051
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Remote Code Execution 5051980
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24051 Anonymous


CVE-2025-24054 - NTLM Hash Disclosure Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24054
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTLM Hash Disclosure Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an action other than opening or executing the file could trigger this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24054
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Spoofing 5052016
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Spoofing 5052016
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Spoofing 5052020
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Spoofing 5052020
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Spoofing 5052006
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Spoofing 5052000
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Spoofing 5051980
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24054 Rintaro Koike with NTT Security Holdings


j00sean


CVE-2025-24055 - Windows USB Video Class System Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24055
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Video Class System Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24055
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Information Disclosure 5051980
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24055 Adel from MSRC V&M


CVE-2025-24056 - Windows Telephony Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24056
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24056
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Remote Code Execution 5051980
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24056 Anonymous


CVE-2025-24059 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24059
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24059
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24059 Anonymous


CVE-2025-24061 - Windows Mark of the Web Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24061
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mark of the Web Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally.


FAQ:

How could an attacker exploit the vulnerability?

  • In a web-based attack scenario, an attacker could host a malicious website that is designed to exploit the security feature bypass.
  • In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted .url file that is designed to exploit the bypass.
  • Compromised websites or websites that accept or host user-provided content could contain specially crafted content to exploit the security feature bypass.

In all cases an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachment.

Please see Additional information about Mark of the Web for further clarification


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited the vulnerability could evade Mark of the Web (MOTW) defenses.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24061
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Security Feature Bypass 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24061 SkorikARI with SkorikARI


CVE-2025-24064 - Windows Domain Name Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24064
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Domain Name Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in DNS Server allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

In a network-based attack an attacker sending a dynamic DNS update message with perfect timing to a DNS server could potentially execute code remotely on the target server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24064
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Critical Remote Code Execution 5051980
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24064 Jay Ladhad with Microsoft


CVE-2025-24066 - Kernel Streaming Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24066
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24066
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24066 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-24067 - Kernel Streaming Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24067
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24067
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24067 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-24071 - Microsoft Windows File Explorer Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24071
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows File Explorer Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24071
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Spoofing 5052040
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Spoofing 5052006
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Spoofing 5052000
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Spoofing 5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Spoofing
5051974
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Spoofing 5051989
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Spoofing
5051989
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Spoofing 5052042
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Spoofing 5052006
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Spoofing 5052006
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Spoofing 5052000
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Spoofing 5052000
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Spoofing 5051979

5052106
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Spoofing 5051980
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Spoofing 5051987

5052105
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24071 SkorikARI with SkorikARI


Wayne Low of Synapxe


CVE-2025-24072 - Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24072
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24072
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege 5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Elevation of Privilege
5051974
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Elevation of Privilege 5052000
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051979

5052106
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24072 Florian Schweins


CVE-2025-24075 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24075
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Stack-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24075
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002696 (Security Update) Important Remote Code Execution 5002687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002696 (Security Update) Important Remote Code Execution 5002687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.95.25030928
Maybe None
Office Online Server 5002690 (Security Update) Important Remote Code Execution 5002679
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10416.20073
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24075 Li Shuang and willJ with Vulnerability Research Institute


CVE-2025-24076 - Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24076
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability and save an invalid state to a database or trigger other unintended actions.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

Exploitation of the vulnerability requires an attack vector involving both attacker authentication (to modify the DLL) and user interaction (to initiate the Link-to-Phone feature installation and enable the 'Use as a connected camera' option).


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24076
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Elevation of Privilege 5051980
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24076 John Ostrowski with Compass Security


CVE-2025-24084 - Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24084
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally.


FAQ:

How could an attacker exploit this vulnerability?

Exploitation of this vulnerability requires that an attacker send a malicious link to the victim via email, or that they convince the user to click the link, typically by way of an enticement in an email or Instant Messenger message. In the worst-case email attack scenario, an attacker could send a specially crafted email to the user without a requirement that the victim open, read, or click on the link. This could result in the attacker executing remote code on the victim's machine. When multiple attack vectors can be used, we assign a score based on the scenario with the higher risk (UI:N).


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24084
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051979

5052106
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Critical Remote Code Execution 5051980
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5051987

5052105
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24084

CVE-2025-24983 - Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24983
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24983
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Elevation of Privilege 5052040
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Elevation of Privilege 5052038
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Elevation of Privilege 5052016
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Elevation of Privilege 5052020
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Elevation of Privilege 5052042
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Elevation of Privilege 5052006
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24983 Filip Jurčacko with ESET


CVE-2025-24984 - Windows NTFS Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24984
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.6/TemporalScore:4.3
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.


FAQ:

According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24984
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Information Disclosure 5052006
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Information Disclosure 5052000
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Information Disclosure 5051980
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24984 Anonymous


CVE-2025-24985 - Windows Fast FAT File System Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24985
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Fast FAT File System Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24985
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Remote Code Execution 5051980
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24985 Anonymous


CVE-2025-24991 - Windows NTFS Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24991
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24991
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Information Disclosure 5051980
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24991 Anonymous


CVE-2025-24992 - Windows NTFS Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24992
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24992
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Information Disclosure 5052040
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure 5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Information Disclosure
5051974
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure 5051989
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Information Disclosure
5051989
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Information Disclosure 5052038
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Information Disclosure 5052016
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Information Disclosure 5052020
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Information Disclosure 5052042
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Information Disclosure 5052006
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Information Disclosure 5052000
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Information Disclosure 5051979

5052106
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Information Disclosure 5051980
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Information Disclosure 5051987

5052105
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24992 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2025-24993 - Windows NTFS Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24993
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24993
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Remote Code Execution 5052040
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution 5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Remote Code Execution
5051974
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution 5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Remote Code Execution
5051989
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Remote Code Execution 5052038
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Remote Code Execution 5052016
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Remote Code Execution 5052020
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Remote Code Execution 5052042
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Remote Code Execution 5052006
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Remote Code Execution 5052000
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051979

5052106
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Remote Code Execution 5051980
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Remote Code Execution 5051987

5052105
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24993 Anonymous


CVE-2025-24994 - Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24994
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability and save an invalid state to a database or trigger other unintended actions.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

Exploitation of the vulnerability requires an attack vector involving both attacker authentication (to modify the DLL) and user interaction (to initiate the Link-to-Phone feature installation and enable the 'Use as a connected camera' option).


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24994
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege 5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Elevation of Privilege
5051989
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5051987

5052105
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24994 John Ostrowski with Compass Security


CVE-2025-24049 - Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24049
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in a command ('command injection') in Azure Command Line Integration (CLI) allows an unauthorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by passing a specially crafted key-value argument to Azure CLI, injecting arbitrary Python code that modifies runtime behavior.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24049
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure CLI Release Notes (Security Update) Important Elevation of Privilege Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.69.0
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24049 Zhengyu Liu and Jiacheng(Gavin) Zhong with Johns Hopkins University


Zhengyu Liu with Johns Hopkins University


Jiacheng(Gavin) Zhong with Johns Hopkins University


CVE-2025-26627 - Azure Arc Installer Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26627
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Arc Installer Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in a command ('command injection') in Azure Arc allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


How do I know if I'm affected by this vulnerability?

Only machines onboarded via Group Policy that have the GPO applied to them are affected.

The GPO name is '[MSFT] Azure Arc Servers Onboarding' followed by a datetimestamp e.g. '[MSFT] Azure Arc Servers Onboarding20250220113589'

What steps are needed to protect from this vulnerability?

  1. Unassign and delete the previous Group Policy Object from the Group Policy Management Console (GPMC).
  2. Download the new scripts from the Fixed agent proxy parameter release in the Github repository 1.0.10.
  3. Run the DeployGPO script as before using the same parameters.
  4. Assign the new Group Policy Object to your groups/domains/units.

For further information, please go to the Arc blade of Azure Portal and follow the instructions for GPO onboarding.

Only machines onboarded via Group Policy that have the GPO applied to them are affected

The GPO name is '[MSFT] Azure Arc Servers Onboarding' followed by a datetimestamp e.g. '[MSFT] Azure Arc Servers Onboarding20250220113589'


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to carefully time their actions to exploit the timing differences in the execution of specific operations. They must accurately measure these timing variations to infer sensitive information or gain unauthorized access. This often involves sophisticated techniques to manipulate and observe the timing behavior of the target system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26627
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure ARC What's new (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.0.10
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26627 SP with WithSecure Consulting


CVE-2025-26629 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26629
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26629
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26629 Haifei Li with EXPMON


CVE-2025-26630 - Microsoft Access Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26630
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Access Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Access allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user needs to be tricked into running malicious files.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26630
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Access 2016 (32-bit edition) 5002697 (Security Update) Important Remote Code Execution 5002670
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Access 2016 (64-bit edition) 5002697 (Security Update) Important Remote Code Execution 5002670
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5491.1001
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26630 Unpatched.ai


CVE-2025-26631 - Visual Studio Code Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26631
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Visual Studio Code Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled search path element in Visual Studio Code allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, user interaction is required (UI:R) and privileges required  is low (PR:L). What does that mean for this vulnerability?

An authorized attacker must send the user a malicious file and convince the user to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26631
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Visual Studio Code Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.98.0
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26631 Sandro Poppi


CVE-2025-26633 - Microsoft Management Console Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26633
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Management Console Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


How could an attacker exploit the vulnerability?

In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted file that is designed to exploit the vulnerability.

In any case an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachment.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26633
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Important Security Feature Bypass 5052040
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass 5051974
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Important Security Feature Bypass
5051974
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass 5051989
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Important Security Feature Bypass
5051989
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Important Security Feature Bypass 5052038
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Security Feature Bypass 5052016
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Important Security Feature Bypass 5052016
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Important Security Feature Bypass 5052020
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Important Security Feature Bypass 5052020
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Important Security Feature Bypass 5052042
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Important Security Feature Bypass 5052042
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Important Security Feature Bypass 5052006
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Important Security Feature Bypass 5052000
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update)
5053638 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051979

5052106
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3328

10.0.20348.3270
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Important Security Feature Bypass 5051980
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update)
5053636 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5051987

5052105
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3476

10.0.26100.3403
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26633 Aliakbar Zahravi with Trend Micro


CVE-2025-26643 - Microsoft Edge (Chromium-based) Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26643
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

The UI performs the wrong action in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L), and availability (A:N). What does that mean for this vulnerability?

Successful exploitation of this vulnerability has limited impacts to Confidentiality and Integrity and no impact on Availability. An attacker would need to combine this vulnerability with other vulnerabilities to perform an attack.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the permissions dialog feature prompt presented to users when initiating a download.


Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-25    

Information published.


Low Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26643
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Low Spoofing Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
134.0.3124.51
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26643 Farras Givari with Meta4sec


Ahmed ElMasry


Om Apip with ITSEC Asia


canalun


CVE-2025-26645 - Remote Desktop Client Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26645
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Desktop Client Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26645
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Remote Desktop client for Windows Desktop Release Notes (Security Update) Critical Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.2.6017.0
Maybe None
Windows 10 for 32-bit Systems 5053618 (Security Update) Critical Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 for x64-based Systems 5053618 (Security Update) Critical Remote Code Execution 5052040
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20947
Yes None
Windows 10 Version 1607 for 32-bit Systems 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1607 for x64-based Systems 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows 10 Version 1809 for 32-bit Systems 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 1809 for x64-based Systems 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 21H2 for x64-based Systems 5053606 (Security Update) Critical Remote Code Execution 5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5608
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 10 Version 22H2 for x64-based Systems 5053606 (Security Update) Critical Remote Code Execution
5051974
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5608
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 22H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution 5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5039
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 23H2 for x64-based Systems 5053602 (Security Update) Critical Remote Code Execution
5051989
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5039
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5053598 (Security Update) Critical Remote Code Execution 5051987
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None
Windows 11 Version 24H2 for x64-based Systems 5053598 (Security Update) Critical Remote Code Execution 5051987
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None
Windows App Client for Windows Desktop Release Notes (Security Update) Critical Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.365.0
Maybe None
Windows Server 2008 for 32-bit Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5053888 (Monthly Rollup)
5053995 (Security Only)
Critical Remote Code Execution 5052038
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23168
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5053620 (Monthly Rollup)
5053627 (Security Only)
Critical Remote Code Execution 5052016
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27618
Yes None
Windows Server 2012 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 (Server Core installation) 5053886 (Monthly Rollup) Critical Remote Code Execution 5052020
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25368
Yes None
Windows Server 2012 R2 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2012 R2 (Server Core installation) 5053887 (Monthly Rollup) Critical Remote Code Execution 5052042
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22470
Yes None
Windows Server 2016 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2016 (Server Core installation) 5053594 (Security Update) Critical Remote Code Execution 5052006
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7876
Yes None
Windows Server 2019 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2019 (Server Core installation) 5053596 (Security Update) Critical Remote Code Execution 5052000
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7009
Yes None
Windows Server 2022 5053603 (Security Update) Critical Remote Code Execution 5051979
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328
Yes None
Windows Server 2022 (Server Core installation) 5053603 (Security Update) Critical Remote Code Execution 5051979
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5053599 (Security Update) Critical Remote Code Execution 5051980
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None
Windows Server 2025 5053598 (Security Update) Critical Remote Code Execution 5051987
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None
Windows Server 2025 (Server Core installation) 5053598 (Security Update) Critical Remote Code Execution 5051987
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3476
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26645 None

CVE-2021-3672 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-3672
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.6/TemporalScore:5.6
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    27-Nov-21    

Information published.


1.1    27-Feb-25    

Added c-ares to CBL-Mariner 1.0


1.2    28-Feb-25    

Added c-ares to CBL-Mariner 1.0


1.3    01-Mar-25    

Added c-ares to CBL-Mariner 1.0


1.4    02-Mar-25    

Added c-ares to CBL-Mariner 1.0


1.5    03-Mar-25    

Added c-ares to CBL-Mariner 1.0


1.6    04-Mar-25    

Added c-ares to CBL-Mariner 1.0


1.7    05-Mar-25    

Added c-ares to CBL-Mariner 1.0


1.8    06-Mar-25    

Added c-ares to CBL-Mariner 1.0


1.9    08-Mar-25    

Added c-ares to CBL-Mariner 1.0


2.0    09-Mar-25    

Added c-ares to CBL-Mariner 1.0


2.1    10-Mar-25    

Added c-ares to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-3672
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Unknown Unknown None
CBL Mariner 1.0 ARM c-ares (CBL-Mariner) Unknown Unknown Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1.18.1-1
Unknown None
CBL Mariner 1.0 x64 c-ares (CBL-Mariner) Unknown Unknown Base: 5.6
Temporal: 5.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1.18.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-3672 None

CVE-2021-23336 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-23336
MITRE
NVD

Issuing CNA: report@snyk.io

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    27-Feb-21    

Information published.


1.6    30-Jun-24    

Information published.


1.7    08-Jul-24    

Information published.


1.8    09-Jul-24    

Information published.


1.9    10-Jul-24    

Information published.


2.0    12-Jul-24    

Information published.


2.1    13-Jul-24    

Information published.


2.2    14-Jul-24    

Information published.


2.3    15-Jul-24    

Information published.


2.4    16-Jul-24    

Information published.


2.5    17-Jul-24    

Information published.


2.6    19-Jul-24    

Information published.


2.7    20-Jul-24    

Information published.


2.8    21-Jul-24    

Information published.


2.9    22-Jul-24    

Information published.


3.0    23-Jul-24    

Information published.


3.1    24-Jul-24    

Information published.


3.2    25-Jul-24    

Information published.


3.3    26-Jul-24    

Information published.


3.4    27-Jul-24    

Information published.


3.5    28-Jul-24    

Information published.


3.6    29-Jul-24    

Information published.


3.7    02-Aug-24    

Information published.


3.8    03-Aug-24    

Information published.


3.9    04-Aug-24    

Information published.


4.0    05-Aug-24    

Information published.


4.1    06-Aug-24    

Information published.


4.2    07-Aug-24    

Information published.


4.3    08-Aug-24    

Information published.


4.4    09-Aug-24    

Information published.


4.5    10-Aug-24    

Information published.


4.6    11-Aug-24    

Information published.


4.7    12-Aug-24    

Information published.


4.8    15-Aug-24    

Information published.


4.9    16-Aug-24    

Information published.


5.0    17-Aug-24    

Information published.


5.1    18-Aug-24    

Information published.


5.2    19-Aug-24    

Information published.


5.3    20-Aug-24    

Information published.


5.4    21-Aug-24    

Information published.


5.5    22-Aug-24    

Information published.


5.6    23-Aug-24    

Information published.


5.7    24-Aug-24    

Information published.


5.8    25-Aug-24    

Information published.


5.9    26-Aug-24    

Information published.


6.0    27-Aug-24    

Information published.


6.1    28-Aug-24    

Information published.


6.2    29-Aug-24    

Information published.


6.3    30-Aug-24    

Information published.


6.4    31-Aug-24    

Information published.


6.5    01-Sep-24    

Information published.


6.6    02-Sep-24    

Information published.


6.7    03-Sep-24    

Information published.


6.8    05-Sep-24    

Information published.


6.9    06-Sep-24    

Information published.


7.0    07-Sep-24    

Information published.


7.1    08-Sep-24    

Information published.


7.2    11-Sep-24    

Information published.


7.3    12-Sep-24    

Information published.


7.4    13-Sep-24    

Information published.


7.5    14-Sep-24    

Information published.


7.6    15-Sep-24    

Information published.


7.7    16-Sep-24    

Information published.


7.8    17-Sep-24    

Information published.


7.9    18-Sep-24    

Information published.


8.0    19-Sep-24    

Information published.


8.1    20-Sep-24    

Information published.


8.2    21-Sep-24    

Information published.


8.3    22-Sep-24    

Information published.


8.4    23-Sep-24    

Information published.


8.5    24-Sep-24    

Information published.


8.6    25-Sep-24    

Information published.


8.7    26-Sep-24    

Information published.


8.8    27-Sep-24    

Information published.


8.9    28-Sep-24    

Information published.


9.0    29-Sep-24    

Information published.


9.1    30-Sep-24    

Information published.


9.2    01-Oct-24    

Information published.


9.3    02-Oct-24    

Information published.


9.4    03-Oct-24    

Information published.


9.5    04-Oct-24    

Information published.


9.6    05-Oct-24    

Information published.


9.7    06-Oct-24    

Information published.


9.8    07-Oct-24    

Information published.


9.9    08-Oct-24    

Information published.


10.0    09-Oct-24    

Information published.


10.1    10-Oct-24    

Information published.


10.2    11-Oct-24    

Information published.


10.3    12-Oct-24    

Information published.


10.4    13-Oct-24    

Information published.


10.5    14-Oct-24    

Information published.


10.6    15-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


10.7    16-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


10.8    17-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


10.9    18-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.0    19-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.1    20-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.2    21-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.3    22-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.4    23-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.5    24-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.6    25-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.7    26-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.8    27-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


11.9    28-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.0    29-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.1    30-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.2    31-Oct-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.3    01-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.4    02-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.5    04-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.6    05-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.7    06-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.8    07-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


12.9    08-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.0    09-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.1    10-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.2    11-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.3    12-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.4    13-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.5    14-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.6    15-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.7    16-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.8    17-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


13.9    18-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.0    19-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.1    20-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.2    21-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.3    23-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.4    24-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.5    25-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.6    26-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.7    27-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.8    28-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


14.9    29-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.0    30-Nov-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.1    01-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.2    02-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.3    03-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.4    04-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.5    05-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.6    07-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.7    08-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.8    09-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


15.9    10-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.0    11-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.1    12-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.2    13-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.3    14-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.4    15-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.5    16-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.6    17-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.7    18-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.8    19-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


16.9    20-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.0    21-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.1    22-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.2    23-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.3    24-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.4    25-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.5    26-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.6    27-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.7    28-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.8    29-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


17.9    30-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.0    31-Dec-24    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.1    01-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.2    02-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.3    03-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.4    04-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.5    05-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.6    06-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.7    07-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.8    08-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


18.9    09-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.0    10-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.1    11-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.2    12-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.3    13-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.4    15-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.5    16-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.6    17-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.7    18-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.8    19-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


19.9    20-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.0    21-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.1    22-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.2    23-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.3    24-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.4    25-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.5    27-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.6    28-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.7    29-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.8    30-Jan-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


20.9    01-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.0    02-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.1    03-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.2    04-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.3    05-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.4    07-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.5    08-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.6    09-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.7    10-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.8    11-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


21.9    12-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.0    13-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.1    14-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.2    15-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.3    16-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.4    17-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.5    18-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.6    19-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.7    20-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.8    21-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


22.9    22-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.0    23-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.1    24-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.2    25-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.3    26-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.4    27-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.5    28-Feb-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.6    01-Mar-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.7    02-Mar-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.8    03-Mar-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


23.9    04-Mar-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.0    05-Mar-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.1    06-Mar-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.2    08-Mar-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.3    09-Mar-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


24.4    10-Mar-25    

Added python2 to CBL-Mariner 1.0 Added python3 to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-23336
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
2.7.18-6

3.7.10-3
None
CBL Mariner 1.0 x64 python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
2.7.18-6

3.7.10-3
None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-23336 None

CVE-2023-40548 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40548
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:7.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


1.1    07-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.2    08-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.3    09-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.4    10-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.5    11-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.6    12-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.7    13-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.8    14-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.9    15-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.0    16-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.1    17-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.2    18-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.3    19-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.4    20-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.5    21-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.6    22-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.7    23-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.8    24-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.9    25-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.0    26-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.1    27-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.2    28-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.3    29-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.4    30-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.5    31-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.6    01-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.7    02-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.8    03-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.9    04-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.0    05-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.1    06-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.2    07-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.3    08-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.4    09-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.5    10-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.6    11-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.7    12-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.8    13-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.9    15-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.0    16-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.1    17-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.2    18-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.3    19-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.4    20-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.5    21-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.6    22-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.7    23-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.8    24-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.9    25-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.0    27-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.1    28-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.2    29-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.3    30-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.4    01-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.5    02-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.6    03-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.7    04-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.8    05-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.9    07-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.0    08-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.1    09-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.2    10-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.3    11-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.4    12-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.5    13-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.6    14-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.7    15-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.8    16-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.9    17-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.0    18-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.1    19-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.2    20-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.3    21-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.4    22-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.5    23-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.6    24-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.7    25-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.8    26-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.9    27-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.0    28-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.1    01-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.2    02-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.3    03-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.4    04-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.5    05-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.6    06-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.7    08-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.8    09-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.9    10-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40548
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-3
None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-3
None
CBL Mariner 2.0 ARM shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-1
None
CBL Mariner 2.0 x64 shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40548 None

CVE-2023-40550 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40550
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


1.1    07-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.2    08-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.3    09-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.4    10-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.5    11-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.6    12-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.7    13-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.8    14-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


1.9    15-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.0    16-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.1    17-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.2    18-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.3    19-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.4    20-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.5    21-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.6    22-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.7    23-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.8    24-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


2.9    25-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.0    26-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.1    27-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.2    28-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.3    29-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.4    30-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.5    31-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.6    01-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.7    02-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.8    03-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.9    04-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.0    05-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.1    06-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.2    07-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.3    08-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.4    09-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.5    10-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.6    11-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.7    12-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.8    13-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.9    15-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.0    16-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.1    17-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.2    18-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.3    19-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.4    20-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.5    21-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.6    22-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.7    23-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.8    24-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.9    25-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.0    27-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.1    28-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.2    29-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.3    30-Jan-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.4    01-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.5    02-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.6    03-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.7    04-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.8    05-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


6.9    07-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.0    08-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.1    09-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.2    10-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.3    11-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.4    12-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.5    13-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.6    14-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.7    15-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.8    16-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


7.9    17-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.0    18-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.1    19-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.2    20-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.3    21-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.4    22-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.5    23-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.6    24-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.7    25-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.8    26-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


8.9    27-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.0    28-Feb-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.1    01-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.2    02-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.3    03-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.4    04-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.5    05-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.6    06-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.7    08-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.8    09-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


9.9    10-Mar-25    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40550
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-3
None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-3
None
CBL Mariner 2.0 ARM shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-1
None
CBL Mariner 2.0 x64 shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40550 None

CVE-2020-27840 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2020-27840
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    15-Oct-24    

Information published.


1.1    16-Oct-24    

Added samba to Azure Linux 3.0


1.2    17-Oct-24    

Added samba to Azure Linux 3.0


1.3    18-Oct-24    

Added samba to Azure Linux 3.0


1.4    19-Oct-24    

Added samba to Azure Linux 3.0


1.5    20-Oct-24    

Added samba to Azure Linux 3.0


1.6    21-Oct-24    

Added samba to Azure Linux 3.0


1.7    22-Oct-24    

Added samba to Azure Linux 3.0


1.8    23-Oct-24    

Added samba to Azure Linux 3.0


1.9    24-Oct-24    

Added samba to Azure Linux 3.0


2.0    25-Oct-24    

Added samba to Azure Linux 3.0


2.1    26-Oct-24    

Added samba to Azure Linux 3.0


2.2    27-Oct-24    

Added samba to Azure Linux 3.0


2.3    28-Oct-24    

Added samba to Azure Linux 3.0


2.4    29-Oct-24    

Added samba to Azure Linux 3.0


2.5    30-Oct-24    

Added samba to Azure Linux 3.0


2.6    31-Oct-24    

Added samba to Azure Linux 3.0


2.7    01-Nov-24    

Added samba to Azure Linux 3.0


2.8    02-Nov-24    

Added samba to Azure Linux 3.0


2.9    04-Nov-24    

Added samba to Azure Linux 3.0


3.0    05-Nov-24    

Added samba to Azure Linux 3.0


3.1    06-Nov-24    

Added samba to Azure Linux 3.0


3.2    07-Nov-24    

Added samba to Azure Linux 3.0


3.3    08-Nov-24    

Added samba to Azure Linux 3.0


3.4    09-Nov-24    

Added samba to Azure Linux 3.0


3.5    10-Nov-24    

Added samba to Azure Linux 3.0


3.6    11-Nov-24    

Added samba to Azure Linux 3.0


3.7    12-Nov-24    

Added samba to Azure Linux 3.0


3.8    13-Nov-24    

Added samba to Azure Linux 3.0


3.9    14-Nov-24    

Added samba to Azure Linux 3.0


4.0    15-Nov-24    

Added samba to Azure Linux 3.0


4.1    16-Nov-24    

Added samba to Azure Linux 3.0


4.2    17-Nov-24    

Added samba to Azure Linux 3.0


4.3    18-Nov-24    

Added samba to Azure Linux 3.0


4.4    19-Nov-24    

Added samba to Azure Linux 3.0


4.5    20-Nov-24    

Added samba to Azure Linux 3.0


4.6    21-Nov-24    

Added samba to Azure Linux 3.0


4.7    23-Nov-24    

Added samba to Azure Linux 3.0


4.8    24-Nov-24    

Added samba to Azure Linux 3.0


4.9    25-Nov-24    

Added samba to Azure Linux 3.0


5.0    26-Nov-24    

Added samba to Azure Linux 3.0


5.1    27-Nov-24    

Added samba to Azure Linux 3.0


5.2    28-Nov-24    

Added samba to Azure Linux 3.0


5.3    29-Nov-24    

Added samba to Azure Linux 3.0


5.4    30-Nov-24    

Added samba to Azure Linux 3.0


5.5    01-Dec-24    

Added samba to Azure Linux 3.0


5.6    02-Dec-24    

Added samba to Azure Linux 3.0


5.7    03-Dec-24    

Added samba to Azure Linux 3.0


5.8    04-Dec-24    

Added samba to Azure Linux 3.0


5.9    05-Dec-24    

Added samba to Azure Linux 3.0


6.0    07-Dec-24    

Added samba to Azure Linux 3.0


6.1    08-Dec-24    

Added samba to Azure Linux 3.0


6.2    09-Dec-24    

Added samba to Azure Linux 3.0


6.3    10-Dec-24    

Added samba to Azure Linux 3.0


6.4    11-Dec-24    

Added samba to Azure Linux 3.0


6.5    12-Dec-24    

Added samba to Azure Linux 3.0


6.6    13-Dec-24    

Added samba to Azure Linux 3.0


6.7    14-Dec-24    

Added samba to Azure Linux 3.0


6.8    15-Dec-24    

Added samba to Azure Linux 3.0


6.9    16-Dec-24    

Added samba to Azure Linux 3.0


7.0    17-Dec-24    

Added samba to Azure Linux 3.0


7.1    18-Dec-24    

Added samba to Azure Linux 3.0


7.2    19-Dec-24    

Added samba to Azure Linux 3.0


7.3    20-Dec-24    

Added samba to Azure Linux 3.0


7.4    21-Dec-24    

Added samba to Azure Linux 3.0


7.5    22-Dec-24    

Added samba to Azure Linux 3.0


7.6    23-Dec-24    

Added samba to Azure Linux 3.0


7.7    24-Dec-24    

Added samba to Azure Linux 3.0


7.8    25-Dec-24    

Added samba to Azure Linux 3.0


7.9    26-Dec-24    

Added samba to Azure Linux 3.0


8.0    27-Dec-24    

Added samba to Azure Linux 3.0


8.1    28-Dec-24    

Added samba to Azure Linux 3.0


8.2    29-Dec-24    

Added samba to Azure Linux 3.0


8.3    30-Dec-24    

Added samba to Azure Linux 3.0


8.4    31-Dec-24    

Added samba to Azure Linux 3.0


8.5    01-Jan-25    

Added samba to Azure Linux 3.0


8.6    02-Jan-25    

Added samba to Azure Linux 3.0


8.7    03-Jan-25    

Added samba to Azure Linux 3.0


8.8    04-Jan-25    

Added samba to Azure Linux 3.0


8.9    05-Jan-25    

Added samba to Azure Linux 3.0


9.0    06-Jan-25    

Added samba to Azure Linux 3.0


9.1    07-Jan-25    

Added samba to Azure Linux 3.0


9.2    08-Jan-25    

Added samba to Azure Linux 3.0


9.3    09-Jan-25    

Added samba to Azure Linux 3.0


9.4    10-Jan-25    

Added samba to Azure Linux 3.0


9.5    11-Jan-25    

Added samba to Azure Linux 3.0


9.6    12-Jan-25    

Added samba to Azure Linux 3.0


9.7    13-Jan-25    

Added samba to Azure Linux 3.0


9.8    15-Jan-25    

Added samba to Azure Linux 3.0


9.9    16-Jan-25    

Added samba to Azure Linux 3.0


10.0    17-Jan-25    

Added samba to Azure Linux 3.0


10.1    18-Jan-25    

Added samba to Azure Linux 3.0


10.2    19-Jan-25    

Added samba to Azure Linux 3.0


10.3    20-Jan-25    

Added samba to Azure Linux 3.0


10.4    21-Jan-25    

Added samba to Azure Linux 3.0


10.5    22-Jan-25    

Added samba to Azure Linux 3.0


10.6    23-Jan-25    

Added samba to Azure Linux 3.0


10.7    24-Jan-25    

Added samba to Azure Linux 3.0


10.8    25-Jan-25    

Added samba to Azure Linux 3.0


10.9    27-Jan-25    

Added samba to Azure Linux 3.0


11.0    28-Jan-25    

Added samba to Azure Linux 3.0


11.1    29-Jan-25    

Added samba to Azure Linux 3.0


11.2    30-Jan-25    

Added samba to Azure Linux 3.0


11.3    01-Feb-25    

Added samba to Azure Linux 3.0


11.4    02-Feb-25    

Added samba to Azure Linux 3.0


11.5    03-Feb-25    

Added samba to Azure Linux 3.0


11.6    04-Feb-25    

Added samba to Azure Linux 3.0


11.7    05-Feb-25    

Added samba to Azure Linux 3.0


11.8    07-Feb-25    

Added samba to Azure Linux 3.0


11.9    08-Feb-25    

Added samba to Azure Linux 3.0


12.0    09-Feb-25    

Added samba to Azure Linux 3.0


12.1    10-Feb-25    

Added samba to Azure Linux 3.0


12.2    11-Feb-25    

Added samba to Azure Linux 3.0


12.3    12-Feb-25    

Added samba to Azure Linux 3.0


12.4    13-Feb-25    

Added samba to Azure Linux 3.0


12.5    14-Feb-25    

Added samba to Azure Linux 3.0


12.6    15-Feb-25    

Added samba to Azure Linux 3.0


12.7    16-Feb-25    

Added samba to Azure Linux 3.0


12.8    17-Feb-25    

Added samba to Azure Linux 3.0


12.9    18-Feb-25    

Added samba to Azure Linux 3.0


13.0    19-Feb-25    

Added samba to Azure Linux 3.0


13.1    20-Feb-25    

Added samba to Azure Linux 3.0


13.2    21-Feb-25    

Added samba to Azure Linux 3.0


13.3    22-Feb-25    

Added samba to Azure Linux 3.0


13.4    23-Feb-25    

Added samba to Azure Linux 3.0


13.5    24-Feb-25    

Added samba to Azure Linux 3.0


13.6    25-Feb-25    

Added samba to Azure Linux 3.0


13.7    26-Feb-25    

Added samba to Azure Linux 3.0


13.8    27-Feb-25    

Added samba to Azure Linux 3.0


13.9    28-Feb-25    

Added samba to Azure Linux 3.0


14.0    01-Mar-25    

Added samba to Azure Linux 3.0


14.1    02-Mar-25    

Added samba to Azure Linux 3.0


14.2    03-Mar-25    

Added samba to Azure Linux 3.0


14.3    04-Mar-25    

Added samba to Azure Linux 3.0


14.4    05-Mar-25    

Added samba to Azure Linux 3.0


14.5    06-Mar-25    

Added samba to Azure Linux 3.0


14.6    08-Mar-25    

Added samba to Azure Linux 3.0


14.7    09-Mar-25    

Added samba to Azure Linux 3.0


14.8    10-Mar-25    

Added samba to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2020-27840
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM samba (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1
Unknown None
Azure Linux 3.0 x64 samba (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2020-27840 None

CVE-2024-5288 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-5288
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


1.1    12-Dec-24    

Added mariadb to CBL-Mariner 2.0 Added mariadb to Azure Linux 3.0


1.2    01-Mar-25    

Added mariadb to CBL-Mariner 2.0 Added mariadb to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-5288
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.11.10-1
Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.11.10-1
Unknown None
CBL Mariner 2.0 ARM mariadb (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.6.20-1
Unknown None
CBL Mariner 2.0 x64 mariadb (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.6.20-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-5288 None

CVE-2024-6104 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-6104
MITRE
NVD

Issuing CNA: security@hashicorp.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.1    15-Aug-24    

Information published.


1.2    16-Aug-24    

Information published.


1.3    17-Aug-24    

Information published.


1.4    18-Aug-24    

Information published.


1.5    19-Aug-24    

Information published.


1.6    20-Aug-24    

Information published.


1.7    21-Aug-24    

Information published.


1.8    22-Aug-24    

Information published.


1.9    23-Aug-24    

Information published.


2.0    24-Aug-24    

Information published.


2.1    25-Aug-24    

Information published.


2.2    26-Aug-24    

Information published.


2.3    27-Aug-24    

Information published.


2.4    28-Aug-24    

Information published.


2.5    29-Aug-24    

Information published.


2.6    30-Aug-24    

Information published.


2.7    31-Aug-24    

Information published.


2.8    01-Sep-24    

Information published.


2.9    02-Sep-24    

Information published.


3.0    03-Sep-24    

Information published.


3.1    05-Sep-24    

Information published.


3.2    06-Sep-24    

Information published.


3.3    07-Sep-24    

Information published.


3.4    08-Sep-24    

Information published.


3.5    11-Sep-24    

Information published.


3.6    13-Sep-24    

Information published.


3.7    14-Sep-24    

Information published.


3.8    15-Sep-24    

Information published.


3.9    16-Sep-24    

Information published.


4.0    17-Sep-24    

Information published.


4.1    18-Sep-24    

Information published.


4.2    19-Sep-24    

Information published.


4.3    20-Sep-24    

Information published.


4.4    21-Sep-24    

Information published.


4.5    22-Sep-24    

Information published.


4.6    23-Sep-24    

Information published.


4.7    24-Sep-24    

Information published.


4.8    25-Sep-24    

Information published.


4.9    26-Sep-24    

Information published.


5.0    27-Sep-24    

Information published.


5.1    28-Sep-24    

Information published.


5.2    29-Sep-24    

Information published.


5.3    30-Sep-24    

Information published.


5.4    01-Oct-24    

Information published.


5.5    02-Oct-24    

Information published.


5.6    03-Oct-24    

Information published.


5.7    04-Oct-24    

Information published.


5.8    05-Oct-24    

Information published.


5.9    06-Oct-24    

Information published.


6.0    07-Oct-24    

Information published.


6.1    08-Oct-24    

Information published.


6.2    09-Oct-24    

Information published.


6.3    11-Oct-24    

Information published.


6.4    12-Oct-24    

Information published.


6.5    13-Oct-24    

Information published.


6.6    14-Oct-24    

Information published.


6.7    15-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


6.8    16-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


6.9    17-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.0    18-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.1    19-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.2    20-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.3    21-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.4    22-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.5    23-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.6    24-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.7    25-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.8    26-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.9    27-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.0    28-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.1    29-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.2    30-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.3    31-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.4    01-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.5    02-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.6    04-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.7    05-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.8    06-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.9    07-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.0    08-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.1    09-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.2    10-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.3    11-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.4    12-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.5    13-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.6    14-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.7    15-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.8    16-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.9    17-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.0    18-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.1    19-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.2    20-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.3    21-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.4    23-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.5    24-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.6    25-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.7    26-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.8    27-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.9    28-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.0    29-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.1    30-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.2    01-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.3    02-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.4    03-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.5    04-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.6    05-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.7    07-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.8    08-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.9    09-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.0    10-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.1    11-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.2    12-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.3    13-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.4    14-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.5    15-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.6    16-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.7    17-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.8    18-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.9    19-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.0    20-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.1    21-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.2    22-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.3    23-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.4    24-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.5    25-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.6    26-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.7    27-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.8    28-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.9    29-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.0    30-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.1    31-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.2    01-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.3    02-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.4    03-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.5    04-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.6    05-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.7    06-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.8    07-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.9    08-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.0    09-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.1    10-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.2    11-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.3    12-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.4    13-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.5    15-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.6    16-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.7    17-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.8    18-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.9    19-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.0    20-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.1    21-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.2    22-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.3    23-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.4    24-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.5    25-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.6    27-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.7    28-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.8    29-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.9    30-Jan-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.0    01-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.1    02-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.2    03-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.3    04-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.4    05-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.5    07-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.6    08-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.7    09-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.8    10-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.9    11-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.0    12-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.1    13-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.2    14-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.3    15-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.4    16-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.5    17-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.6    18-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.7    19-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.8    20-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.9    21-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.0    22-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.1    23-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.2    24-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.3    25-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.4    26-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.5    27-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.6    28-Feb-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.7    01-Mar-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.8    02-Mar-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.9    03-Mar-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.0    04-Mar-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.1    05-Mar-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.2    06-Mar-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.3    08-Mar-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.4    09-Mar-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.5    10-Mar-25    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-6104
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libcontainers-common (CBL-Mariner)
cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
20240213-2

1.12.12-3
2.7.3-5
2.14.0-2
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
libcontainers-common (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1.12.12-3

2.7.3-5
2.14.0-2
20240213-2
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
packer (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1.11.2-12

2.6.1-15
2.4.0-22
1.9.5-2
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
packer (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1.11.2-12

2.6.1-15
2.4.0-22
1.9.5-2
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-6104 None

CVE-2023-45288 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-45288
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-24    

Information published.


1.1    20-Apr-24    

Information published.


1.2    30-Jun-24    

Information published.


1.3    02-Jul-24    

Information published.


1.4    12-Jul-24    

Information published.


1.5    07-Aug-24    

Information published.


1.6    08-Aug-24    

Information published.


1.7    09-Aug-24    

Information published.


1.8    10-Aug-24    

Information published.


1.9    11-Aug-24    

Information published.


2.0    12-Aug-24    

Information published.


2.1    15-Aug-24    

Information published.


2.2    16-Aug-24    

Information published.


2.3    17-Aug-24    

Information published.


2.4    18-Aug-24    

Information published.


2.5    19-Aug-24    

Information published.


2.6    20-Aug-24    

Information published.


2.7    21-Aug-24    

Information published.


2.8    22-Aug-24    

Information published.


2.9    23-Aug-24    

Information published.


3.0    24-Aug-24    

Information published.


3.1    25-Aug-24    

Information published.


3.2    26-Aug-24    

Information published.


3.3    11-Sep-24    

Information published.


3.4    13-Sep-24    

Information published.


3.5    14-Sep-24    

Information published.


3.6    15-Sep-24    

Information published.


3.7    16-Sep-24    

Information published.


3.8    17-Sep-24    

Information published.


3.9    18-Sep-24    

Information published.


4.0    19-Sep-24    

Information published.


4.1    20-Sep-24    

Information published.


4.2    21-Sep-24    

Information published.


4.3    22-Sep-24    

Information published.


4.4    23-Sep-24    

Information published.


4.5    24-Sep-24    

Information published.


4.6    25-Sep-24    

Information published.


4.7    26-Sep-24    

Information published.


4.8    27-Sep-24    

Information published.


4.9    28-Sep-24    

Information published.


5.0    29-Sep-24    

Information published.


5.1    30-Sep-24    

Information published.


5.2    01-Oct-24    

Information published.


5.3    02-Oct-24    

Information published.


5.4    03-Oct-24    

Information published.


5.5    04-Oct-24    

Information published.


5.6    05-Oct-24    

Information published.


5.7    06-Oct-24    

Information published.


5.8    07-Oct-24    

Information published.


5.9    09-Oct-24    

Information published.


6.0    10-Oct-24    

Information published.


6.1    11-Oct-24    

Information published.


6.2    12-Oct-24    

Information published.


6.3    13-Oct-24    

Information published.


6.4    14-Oct-24    

Information published.


6.5    15-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


6.6    16-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


6.7    17-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


6.8    18-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


6.9    19-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.0    20-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.1    21-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.2    22-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.3    23-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.4    24-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.5    25-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.6    26-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.7    27-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.8    28-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.9    29-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.0    30-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.1    31-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.2    01-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.3    02-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.4    04-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.5    05-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.6    06-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.7    07-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.8    08-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.9    09-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.0    10-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.1    11-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.2    12-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.3    13-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.4    14-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.5    15-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.6    16-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.7    17-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.8    18-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.9    19-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.0    20-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.1    21-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.2    23-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.3    24-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.4    25-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.5    26-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.6    27-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.7    28-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.8    29-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.9    30-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.0    01-Dec-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.1    02-Dec-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.2    03-Dec-24    

Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.3    04-Dec-24    

Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added nmi to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.4    05-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.5    07-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.6    08-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.7    09-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.8    10-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.9    11-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.0    12-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.1    13-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.2    14-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.3    15-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.4    16-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.5    17-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.6    18-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.7    19-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.8    20-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.9    21-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.0    22-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.1    23-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.2    24-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.3    25-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.4    26-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.5    27-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.6    28-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.7    29-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.8    30-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.9    31-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.0    01-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.1    02-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.2    03-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.3    04-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.4    05-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.5    06-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.6    07-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.7    08-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.8    09-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.9    10-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.0    11-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.1    12-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.2    13-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.3    15-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.4    16-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.5    17-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.6    18-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.7    19-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.8    20-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.9    21-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.0    22-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.1    23-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.2    24-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.3    25-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.4    27-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.5    28-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.6    29-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.7    30-Jan-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.8    01-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.9    02-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.0    03-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.1    04-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.2    05-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.3    07-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.4    08-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.5    09-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.6    10-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.7    11-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.8    12-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.9    13-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.0    15-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.1    16-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.2    17-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.3    18-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.4    19-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.5    20-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.6    21-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.7    22-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.8    23-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.9    24-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.0    25-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.1    26-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.2    27-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.3    28-Feb-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.4    01-Mar-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.5    02-Mar-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.6    03-Mar-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.7    04-Mar-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.8    05-Mar-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.9    06-Mar-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


20.0    08-Mar-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


20.1    09-Mar-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


20.2    10-Mar-25    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added containerd to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added cf-cli to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added flannel to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added kured to Azure Linux 3.0 Added local-path-provisioner to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added prometheus-node-exporter to Azure Linux 3.0 Added application-gateway-kubernetes-ingress to Azure Linux 3.0 Added etcd to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 Added git-lfs to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added gh to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-45288
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM application-gateway-kubernetes-ingress (CBL-Mariner)
azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.7.7-1

10.25.1-1
2.3.0-1
1.12.12-1
None
Azure Linux 3.0 x64 application-gateway-kubernetes-ingress (CBL-Mariner)
azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.7.7-1

10.25.1-1
2.3.0-1
1.12.12-1
None
CBL Mariner 2.0 ARM azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-1

2.1.2-3
1.11.2-9
1.11.1-8
None
CBL Mariner 2.0 x64 azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-1

2.1.2-3
1.11.2-9
1.11.1-8
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-45288 None

CVE-2019-20907 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-20907
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-20    

Information published.


1.6    30-Jun-24    

Information published.


1.7    08-Jul-24    

Information published.


1.8    09-Jul-24    

Information published.


1.9    10-Jul-24    

Information published.


2.0    12-Jul-24    

Information published.


2.1    13-Jul-24    

Information published.


2.2    14-Jul-24    

Information published.


2.3    15-Jul-24    

Information published.


2.4    16-Jul-24    

Information published.


2.5    17-Jul-24    

Information published.


2.6    19-Jul-24    

Information published.


2.7    20-Jul-24    

Information published.


2.8    21-Jul-24    

Information published.


2.9    22-Jul-24    

Information published.


3.0    23-Jul-24    

Information published.


3.1    24-Jul-24    

Information published.


3.2    25-Jul-24    

Information published.


3.3    26-Jul-24    

Information published.


3.4    27-Jul-24    

Information published.


3.5    28-Jul-24    

Information published.


3.6    29-Jul-24    

Information published.


3.7    02-Aug-24    

Information published.


3.8    03-Aug-24    

Information published.


3.9    04-Aug-24    

Information published.


4.0    05-Aug-24    

Information published.


4.1    06-Aug-24    

Information published.


4.2    07-Aug-24    

Information published.


4.3    08-Aug-24    

Information published.


4.4    09-Aug-24    

Information published.


4.5    10-Aug-24    

Information published.


4.6    11-Aug-24    

Information published.


4.7    12-Aug-24    

Information published.


4.8    15-Aug-24    

Information published.


4.9    16-Aug-24    

Information published.


5.0    17-Aug-24    

Information published.


5.1    18-Aug-24    

Information published.


5.2    19-Aug-24    

Information published.


5.3    20-Aug-24    

Information published.


5.4    21-Aug-24    

Information published.


5.5    22-Aug-24    

Information published.


5.6    23-Aug-24    

Information published.


5.7    24-Aug-24    

Information published.


5.8    25-Aug-24    

Information published.


5.9    26-Aug-24    

Information published.


6.0    27-Aug-24    

Information published.


6.1    28-Aug-24    

Information published.


6.2    29-Aug-24    

Information published.


6.3    30-Aug-24    

Information published.


6.4    31-Aug-24    

Information published.


6.5    01-Sep-24    

Information published.


6.6    02-Sep-24    

Information published.


6.7    03-Sep-24    

Information published.


6.8    05-Sep-24    

Information published.


6.9    06-Sep-24    

Information published.


7.0    07-Sep-24    

Information published.


7.1    08-Sep-24    

Information published.


7.2    11-Sep-24    

Information published.


7.3    12-Sep-24    

Information published.


7.4    13-Sep-24    

Information published.


7.5    14-Sep-24    

Information published.


7.6    15-Sep-24    

Information published.


7.7    16-Sep-24    

Information published.


7.8    17-Sep-24    

Information published.


7.9    18-Sep-24    

Information published.


8.0    19-Sep-24    

Information published.


8.1    20-Sep-24    

Information published.


8.2    21-Sep-24    

Information published.


8.3    22-Sep-24    

Information published.


8.4    23-Sep-24    

Information published.


8.5    24-Sep-24    

Information published.


8.6    25-Sep-24    

Information published.


8.7    26-Sep-24    

Information published.


8.8    27-Sep-24    

Information published.


8.9    28-Sep-24    

Information published.


9.0    29-Sep-24    

Information published.


9.1    30-Sep-24    

Information published.


9.2    01-Oct-24    

Information published.


9.3    02-Oct-24    

Information published.


9.4    03-Oct-24    

Information published.


9.5    04-Oct-24    

Information published.


9.6    05-Oct-24    

Information published.


9.7    06-Oct-24    

Information published.


9.8    07-Oct-24    

Information published.


9.9    08-Oct-24    

Information published.


10.0    09-Oct-24    

Information published.


10.1    10-Oct-24    

Information published.


10.2    11-Oct-24    

Information published.


10.3    12-Oct-24    

Information published.


10.4    13-Oct-24    

Information published.


10.5    14-Oct-24    

Information published.


10.6    15-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


10.7    16-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


10.8    17-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


10.9    18-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.0    19-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.1    20-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.2    21-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.3    22-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.4    23-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.5    24-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.6    25-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.7    26-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.8    27-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


11.9    28-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.0    29-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.1    30-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.2    31-Oct-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.3    01-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.4    02-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.5    04-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.6    05-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.7    06-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.8    07-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


12.9    08-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.0    09-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.1    10-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.2    11-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.3    12-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.4    13-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.5    14-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.6    15-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.7    16-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.8    17-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


13.9    18-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.0    19-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.1    20-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.2    21-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.3    23-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.4    24-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.5    25-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.6    26-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.7    27-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.8    28-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


14.9    29-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.0    30-Nov-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.1    01-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.2    02-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.3    03-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.4    04-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.5    05-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.6    07-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.7    08-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.8    09-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


15.9    10-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.0    11-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.1    12-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.2    13-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.3    14-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.4    15-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.5    16-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.6    17-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.7    18-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.8    19-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


16.9    20-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.0    21-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.1    22-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.2    23-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.3    24-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.4    25-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.5    26-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.6    27-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.7    28-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.8    29-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


17.9    30-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.0    31-Dec-24    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.1    01-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.2    02-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.3    03-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.4    04-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.5    05-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.6    06-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.7    07-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.8    08-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


18.9    09-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.0    10-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.1    11-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.2    12-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.3    13-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.4    15-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.5    16-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.6    17-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.7    18-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.8    19-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


19.9    20-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.0    21-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.1    22-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.2    23-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.3    24-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.4    25-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.5    27-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.6    28-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.7    29-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.8    30-Jan-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


20.9    01-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.0    02-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.1    03-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.2    04-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.3    05-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.4    07-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.5    08-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.6    09-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.7    10-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.8    11-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


21.9    12-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.0    13-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.1    14-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.2    15-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.3    16-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.4    17-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.5    18-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.6    19-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.7    20-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.8    21-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


22.9    22-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.0    23-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.1    24-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.2    25-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.3    26-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.4    27-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.5    28-Feb-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.6    01-Mar-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.7    02-Mar-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.8    03-Mar-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


23.9    04-Mar-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.0    05-Mar-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.1    06-Mar-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.2    08-Mar-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.3    09-Mar-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


24.4    10-Mar-25    

Added python3 to CBL-Mariner 1.0 Added python2 to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-20907
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5

3.7.10-3
None
CBL Mariner 1.0 x64 python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5

3.7.10-3
None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-20907 None

CVE-2019-9674 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-9674
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-20    

Information published.


1.6    30-Jun-24    

Information published.


1.7    08-Jul-24    

Information published.


1.8    09-Jul-24    

Information published.


1.9    10-Jul-24    

Information published.


2.0    12-Jul-24    

Information published.


2.1    13-Jul-24    

Information published.


2.2    14-Jul-24    

Information published.


2.3    15-Jul-24    

Information published.


2.4    16-Jul-24    

Information published.


2.5    17-Jul-24    

Information published.


2.6    19-Jul-24    

Information published.


2.7    20-Jul-24    

Information published.


2.8    21-Jul-24    

Information published.


2.9    22-Jul-24    

Information published.


3.0    23-Jul-24    

Information published.


3.1    24-Jul-24    

Information published.


3.2    25-Jul-24    

Information published.


3.3    26-Jul-24    

Information published.


3.4    27-Jul-24    

Information published.


3.5    28-Jul-24    

Information published.


3.6    29-Jul-24    

Information published.


3.7    02-Aug-24    

Information published.


3.8    03-Aug-24    

Information published.


3.9    04-Aug-24    

Information published.


4.0    05-Aug-24    

Information published.


4.1    06-Aug-24    

Information published.


4.2    07-Aug-24    

Information published.


4.3    08-Aug-24    

Information published.


4.4    09-Aug-24    

Information published.


4.5    10-Aug-24    

Information published.


4.6    11-Aug-24    

Information published.


4.7    12-Aug-24    

Information published.


4.8    15-Aug-24    

Information published.


4.9    16-Aug-24    

Information published.


5.0    17-Aug-24    

Information published.


5.1    18-Aug-24    

Information published.


5.2    19-Aug-24    

Information published.


5.3    20-Aug-24    

Information published.


5.4    21-Aug-24    

Information published.


5.5    22-Aug-24    

Information published.


5.6    23-Aug-24    

Information published.


5.7    24-Aug-24    

Information published.


5.8    25-Aug-24    

Information published.


5.9    26-Aug-24    

Information published.


6.0    27-Aug-24    

Information published.


6.1    28-Aug-24    

Information published.


6.2    29-Aug-24    

Information published.


6.3    30-Aug-24    

Information published.


6.4    31-Aug-24    

Information published.


6.5    01-Sep-24    

Information published.


6.6    02-Sep-24    

Information published.


6.7    03-Sep-24    

Information published.


6.8    05-Sep-24    

Information published.


6.9    06-Sep-24    

Information published.


7.0    07-Sep-24    

Information published.


7.1    08-Sep-24    

Information published.


7.2    11-Sep-24    

Information published.


7.3    12-Sep-24    

Information published.


7.4    13-Sep-24    

Information published.


7.5    14-Sep-24    

Information published.


7.6    15-Sep-24    

Information published.


7.7    16-Sep-24    

Information published.


7.8    17-Sep-24    

Information published.


7.9    18-Sep-24    

Information published.


8.0    19-Sep-24    

Information published.


8.1    20-Sep-24    

Information published.


8.2    21-Sep-24    

Information published.


8.3    22-Sep-24    

Information published.


8.4    23-Sep-24    

Information published.


8.5    24-Sep-24    

Information published.


8.6    25-Sep-24    

Information published.


8.7    26-Sep-24    

Information published.


8.8    27-Sep-24    

Information published.


8.9    28-Sep-24    

Information published.


9.0    29-Sep-24    

Information published.


9.1    30-Sep-24    

Information published.


9.2    01-Oct-24    

Information published.


9.3    02-Oct-24    

Information published.


9.4    03-Oct-24    

Information published.


9.5    04-Oct-24    

Information published.


9.6    05-Oct-24    

Information published.


9.7    06-Oct-24    

Information published.


9.8    07-Oct-24    

Information published.


9.9    08-Oct-24    

Information published.


10.0    09-Oct-24    

Information published.


10.1    10-Oct-24    

Information published.


10.2    11-Oct-24    

Information published.


10.3    12-Oct-24    

Information published.


10.4    13-Oct-24    

Information published.


10.5    14-Oct-24    

Information published.


10.6    15-Oct-24    

Added python2 to CBL-Mariner 1.0


10.7    16-Oct-24    

Added python2 to CBL-Mariner 1.0


10.8    17-Oct-24    

Added python2 to CBL-Mariner 1.0


10.9    18-Oct-24    

Added python2 to CBL-Mariner 1.0


11.0    19-Oct-24    

Added python2 to CBL-Mariner 1.0


11.1    20-Oct-24    

Added python2 to CBL-Mariner 1.0


11.2    21-Oct-24    

Added python2 to CBL-Mariner 1.0


11.3    22-Oct-24    

Added python2 to CBL-Mariner 1.0


11.4    23-Oct-24    

Added python2 to CBL-Mariner 1.0


11.5    24-Oct-24    

Added python2 to CBL-Mariner 1.0


11.6    25-Oct-24    

Added python2 to CBL-Mariner 1.0


11.7    26-Oct-24    

Added python2 to CBL-Mariner 1.0


11.8    27-Oct-24    

Added python2 to CBL-Mariner 1.0


11.9    28-Oct-24    

Added python2 to CBL-Mariner 1.0


12.0    29-Oct-24    

Added python2 to CBL-Mariner 1.0


12.1    30-Oct-24    

Added python2 to CBL-Mariner 1.0


12.2    31-Oct-24    

Added python2 to CBL-Mariner 1.0


12.3    01-Nov-24    

Added python2 to CBL-Mariner 1.0


12.4    02-Nov-24    

Added python2 to CBL-Mariner 1.0


12.5    04-Nov-24    

Added python2 to CBL-Mariner 1.0


12.6    05-Nov-24    

Added python2 to CBL-Mariner 1.0


12.7    06-Nov-24    

Added python2 to CBL-Mariner 1.0


12.8    07-Nov-24    

Added python2 to CBL-Mariner 1.0


12.9    08-Nov-24    

Added python2 to CBL-Mariner 1.0


13.0    09-Nov-24    

Added python2 to CBL-Mariner 1.0


13.1    10-Nov-24    

Added python2 to CBL-Mariner 1.0


13.2    11-Nov-24    

Added python2 to CBL-Mariner 1.0


13.3    12-Nov-24    

Added python2 to CBL-Mariner 1.0


13.4    13-Nov-24    

Added python2 to CBL-Mariner 1.0


13.5    14-Nov-24    

Added python2 to CBL-Mariner 1.0


13.6    15-Nov-24    

Added python2 to CBL-Mariner 1.0


13.7    16-Nov-24    

Added python2 to CBL-Mariner 1.0


13.8    17-Nov-24    

Added python2 to CBL-Mariner 1.0


13.9    18-Nov-24    

Added python2 to CBL-Mariner 1.0


14.0    19-Nov-24    

Added python2 to CBL-Mariner 1.0


14.1    20-Nov-24    

Added python2 to CBL-Mariner 1.0


14.2    21-Nov-24    

Added python2 to CBL-Mariner 1.0


14.3    23-Nov-24    

Added python2 to CBL-Mariner 1.0


14.4    24-Nov-24    

Added python2 to CBL-Mariner 1.0


14.5    25-Nov-24    

Added python2 to CBL-Mariner 1.0


14.6    26-Nov-24    

Added python2 to CBL-Mariner 1.0


14.7    27-Nov-24    

Added python2 to CBL-Mariner 1.0


14.8    28-Nov-24    

Added python2 to CBL-Mariner 1.0


14.9    29-Nov-24    

Added python2 to CBL-Mariner 1.0


15.0    30-Nov-24    

Added python2 to CBL-Mariner 1.0


15.1    01-Dec-24    

Added python2 to CBL-Mariner 1.0


15.2    02-Dec-24    

Added python2 to CBL-Mariner 1.0


15.3    03-Dec-24    

Added python2 to CBL-Mariner 1.0


15.4    04-Dec-24    

Added python2 to CBL-Mariner 1.0


15.5    05-Dec-24    

Added python2 to CBL-Mariner 1.0


15.6    07-Dec-24    

Added python2 to CBL-Mariner 1.0


15.7    08-Dec-24    

Added python2 to CBL-Mariner 1.0


15.8    09-Dec-24    

Added python2 to CBL-Mariner 1.0


15.9    10-Dec-24    

Added python2 to CBL-Mariner 1.0


16.0    11-Dec-24    

Added python2 to CBL-Mariner 1.0


16.1    12-Dec-24    

Added python2 to CBL-Mariner 1.0


16.2    13-Dec-24    

Added python2 to CBL-Mariner 1.0


16.3    14-Dec-24    

Added python2 to CBL-Mariner 1.0


16.4    15-Dec-24    

Added python2 to CBL-Mariner 1.0


16.5    16-Dec-24    

Added python2 to CBL-Mariner 1.0


16.6    17-Dec-24    

Added python2 to CBL-Mariner 1.0


16.7    18-Dec-24    

Added python2 to CBL-Mariner 1.0


16.8    19-Dec-24    

Added python2 to CBL-Mariner 1.0


16.9    20-Dec-24    

Added python2 to CBL-Mariner 1.0


17.0    21-Dec-24    

Added python2 to CBL-Mariner 1.0


17.1    22-Dec-24    

Added python2 to CBL-Mariner 1.0


17.2    23-Dec-24    

Added python2 to CBL-Mariner 1.0


17.3    24-Dec-24    

Added python2 to CBL-Mariner 1.0


17.4    25-Dec-24    

Added python2 to CBL-Mariner 1.0


17.5    26-Dec-24    

Added python2 to CBL-Mariner 1.0


17.6    27-Dec-24    

Added python2 to CBL-Mariner 1.0


17.7    28-Dec-24    

Added python2 to CBL-Mariner 1.0


17.8    29-Dec-24    

Added python2 to CBL-Mariner 1.0


17.9    30-Dec-24    

Added python2 to CBL-Mariner 1.0


18.0    31-Dec-24    

Added python2 to CBL-Mariner 1.0


18.1    01-Jan-25    

Added python2 to CBL-Mariner 1.0


18.2    02-Jan-25    

Added python2 to CBL-Mariner 1.0


18.3    03-Jan-25    

Added python2 to CBL-Mariner 1.0


18.4    04-Jan-25    

Added python2 to CBL-Mariner 1.0


18.5    05-Jan-25    

Added python2 to CBL-Mariner 1.0


18.6    06-Jan-25    

Added python2 to CBL-Mariner 1.0


18.7    07-Jan-25    

Added python2 to CBL-Mariner 1.0


18.8    08-Jan-25    

Added python2 to CBL-Mariner 1.0


18.9    09-Jan-25    

Added python2 to CBL-Mariner 1.0


19.0    10-Jan-25    

Added python2 to CBL-Mariner 1.0


19.1    11-Jan-25    

Added python2 to CBL-Mariner 1.0


19.2    12-Jan-25    

Added python2 to CBL-Mariner 1.0


19.3    13-Jan-25    

Added python2 to CBL-Mariner 1.0


19.4    15-Jan-25    

Added python2 to CBL-Mariner 1.0


19.5    16-Jan-25    

Added python2 to CBL-Mariner 1.0


19.6    17-Jan-25    

Added python2 to CBL-Mariner 1.0


19.7    18-Jan-25    

Added python2 to CBL-Mariner 1.0


19.8    19-Jan-25    

Added python2 to CBL-Mariner 1.0


19.9    20-Jan-25    

Added python2 to CBL-Mariner 1.0


20.0    21-Jan-25    

Added python2 to CBL-Mariner 1.0


20.1    22-Jan-25    

Added python2 to CBL-Mariner 1.0


20.2    23-Jan-25    

Added python2 to CBL-Mariner 1.0


20.3    24-Jan-25    

Added python2 to CBL-Mariner 1.0


20.4    25-Jan-25    

Added python2 to CBL-Mariner 1.0


20.5    27-Jan-25    

Added python2 to CBL-Mariner 1.0


20.6    28-Jan-25    

Added python2 to CBL-Mariner 1.0


20.7    29-Jan-25    

Added python2 to CBL-Mariner 1.0


20.8    30-Jan-25    

Added python2 to CBL-Mariner 1.0


20.9    01-Feb-25    

Added python2 to CBL-Mariner 1.0


21.0    02-Feb-25    

Added python2 to CBL-Mariner 1.0


21.1    03-Feb-25    

Added python2 to CBL-Mariner 1.0


21.2    04-Feb-25    

Added python2 to CBL-Mariner 1.0


21.3    05-Feb-25    

Added python2 to CBL-Mariner 1.0


21.4    07-Feb-25    

Added python2 to CBL-Mariner 1.0


21.5    08-Feb-25    

Added python2 to CBL-Mariner 1.0


21.6    09-Feb-25    

Added python2 to CBL-Mariner 1.0


21.7    10-Feb-25    

Added python2 to CBL-Mariner 1.0


21.8    11-Feb-25    

Added python2 to CBL-Mariner 1.0


21.9    12-Feb-25    

Added python2 to CBL-Mariner 1.0


22.0    13-Feb-25    

Added python2 to CBL-Mariner 1.0


22.1    14-Feb-25    

Added python2 to CBL-Mariner 1.0


22.2    15-Feb-25    

Added python2 to CBL-Mariner 1.0


22.3    16-Feb-25    

Added python2 to CBL-Mariner 1.0


22.4    17-Feb-25    

Added python2 to CBL-Mariner 1.0


22.5    18-Feb-25    

Added python2 to CBL-Mariner 1.0


22.6    19-Feb-25    

Added python2 to CBL-Mariner 1.0


22.7    20-Feb-25    

Added python2 to CBL-Mariner 1.0


22.8    21-Feb-25    

Added python2 to CBL-Mariner 1.0


22.9    22-Feb-25    

Added python2 to CBL-Mariner 1.0


23.0    23-Feb-25    

Added python2 to CBL-Mariner 1.0


23.1    24-Feb-25    

Added python2 to CBL-Mariner 1.0


23.2    25-Feb-25    

Added python2 to CBL-Mariner 1.0


23.3    26-Feb-25    

Added python2 to CBL-Mariner 1.0


23.4    27-Feb-25    

Added python2 to CBL-Mariner 1.0


23.5    28-Feb-25    

Added python2 to CBL-Mariner 1.0


23.6    01-Mar-25    

Added python2 to CBL-Mariner 1.0


23.7    02-Mar-25    

Added python2 to CBL-Mariner 1.0


23.8    03-Mar-25    

Added python2 to CBL-Mariner 1.0


23.9    04-Mar-25    

Added python2 to CBL-Mariner 1.0


24.0    05-Mar-25    

Added python2 to CBL-Mariner 1.0


24.1    06-Mar-25    

Added python2 to CBL-Mariner 1.0


24.2    08-Mar-25    

Added python2 to CBL-Mariner 1.0


24.3    09-Mar-25    

Added python2 to CBL-Mariner 1.0


24.4    10-Mar-25    

Added python2 to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-9674
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5
Unknown None
CBL Mariner 1.0 x64 python2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5
Unknown None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-9674 None

CVE-2012-2677 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2012-2677
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


1.1    27-Feb-25    

Added mysql to Azure Linux 3.0


1.2    28-Feb-25    

Added mysql to Azure Linux 3.0


1.3    01-Mar-25    

Added mysql to Azure Linux 3.0


1.4    02-Mar-25    

Added mysql to Azure Linux 3.0


1.5    03-Mar-25    

Added mysql to Azure Linux 3.0


1.6    04-Mar-25    

Added mysql to Azure Linux 3.0


1.7    05-Mar-25    

Added mysql to Azure Linux 3.0


1.8    06-Mar-25    

Added mysql to Azure Linux 3.0


1.9    08-Mar-25    

Added mysql to Azure Linux 3.0


2.0    09-Mar-25    

Added mysql to Azure Linux 3.0


2.1    10-Mar-25    

Added mysql to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2012-2677
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
8.0.40-4
Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
8.0.40-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2012-2677 None

CVE-2012-6708 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2012-6708
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


1.1    03-Feb-25    

Added slf4j to Azure Linux 3.0


1.2    04-Feb-25    

Added slf4j to Azure Linux 3.0


1.3    05-Feb-25    

Added slf4j to Azure Linux 3.0


1.4    07-Feb-25    

Added slf4j to Azure Linux 3.0


1.5    08-Feb-25    

Added slf4j to Azure Linux 3.0


1.6    09-Feb-25    

Added slf4j to Azure Linux 3.0


1.7    10-Feb-25    

Added slf4j to Azure Linux 3.0


1.8    11-Feb-25    

Added slf4j to Azure Linux 3.0


1.9    12-Feb-25    

Added slf4j to Azure Linux 3.0


2.0    13-Feb-25    

Added slf4j to Azure Linux 3.0


2.1    14-Feb-25    

Added slf4j to Azure Linux 3.0


2.2    15-Feb-25    

Added slf4j to Azure Linux 3.0


2.3    16-Feb-25    

Added slf4j to Azure Linux 3.0


2.4    17-Feb-25    

Added slf4j to Azure Linux 3.0


2.5    18-Feb-25    

Added slf4j to Azure Linux 3.0


2.6    19-Feb-25    

Added slf4j to Azure Linux 3.0


2.7    20-Feb-25    

Added slf4j to Azure Linux 3.0


2.8    21-Feb-25    

Added slf4j to Azure Linux 3.0


2.9    22-Feb-25    

Added slf4j to Azure Linux 3.0


3.0    23-Feb-25    

Added slf4j to Azure Linux 3.0


3.1    24-Feb-25    

Added slf4j to Azure Linux 3.0


3.2    25-Feb-25    

Added slf4j to Azure Linux 3.0


3.3    26-Feb-25    

Added slf4j to Azure Linux 3.0


3.4    27-Feb-25    

Added slf4j to Azure Linux 3.0


3.5    28-Feb-25    

Added slf4j to Azure Linux 3.0


3.6    01-Mar-25    

Added slf4j to Azure Linux 3.0


3.7    02-Mar-25    

Added slf4j to Azure Linux 3.0


3.8    03-Mar-25    

Added slf4j to Azure Linux 3.0


3.9    04-Mar-25    

Added slf4j to Azure Linux 3.0


4.0    05-Mar-25    

Added slf4j to Azure Linux 3.0


4.1    06-Mar-25    

Added slf4j to Azure Linux 3.0


4.2    08-Mar-25    

Added slf4j to Azure Linux 3.0


4.3    09-Mar-25    

Added slf4j to Azure Linux 3.0


4.4    10-Mar-25    

Added slf4j to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2012-6708
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM slf4j (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2.0.7-1
Unknown None
Azure Linux 3.0 x64 slf4j (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2.0.7-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2012-6708 None

CVE-2024-52338 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-52338
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    13-Dec-24    

Information published.


0.2    14-Dec-24    

Information published.


0.3    15-Dec-24    

Information published.


0.4    16-Dec-24    

Information published.


0.5    17-Dec-24    

Information published.


0.6    18-Dec-24    

Information published.


0.7    19-Dec-24    

Information published.


0.8    20-Dec-24    

Information published.


0.9    21-Dec-24    

Information published.


1.0    22-Dec-24    

Information published.


1.1    23-Dec-24    

Added libarrow to Azure Linux 3.0


1.2    24-Dec-24    

Added libarrow to Azure Linux 3.0


1.3    25-Dec-24    

Added libarrow to Azure Linux 3.0


1.4    26-Dec-24    

Added libarrow to Azure Linux 3.0


1.5    27-Dec-24    

Added libarrow to Azure Linux 3.0


1.6    28-Dec-24    

Added libarrow to Azure Linux 3.0


1.7    29-Dec-24    

Added libarrow to Azure Linux 3.0


1.8    30-Dec-24    

Added libarrow to Azure Linux 3.0


1.9    31-Dec-24    

Added libarrow to Azure Linux 3.0


2.0    01-Jan-25    

Added libarrow to Azure Linux 3.0


2.1    02-Jan-25    

Added libarrow to Azure Linux 3.0


2.2    03-Jan-25    

Added libarrow to Azure Linux 3.0


2.3    04-Jan-25    

Added libarrow to Azure Linux 3.0


2.4    05-Jan-25    

Added libarrow to Azure Linux 3.0


2.5    06-Jan-25    

Added libarrow to Azure Linux 3.0


2.6    07-Jan-25    

Added libarrow to Azure Linux 3.0


2.7    08-Jan-25    

Added libarrow to Azure Linux 3.0


2.8    09-Jan-25    

Added libarrow to Azure Linux 3.0


2.9    10-Jan-25    

Added libarrow to Azure Linux 3.0


3.0    11-Jan-25    

Added libarrow to Azure Linux 3.0


3.1    12-Jan-25    

Added libarrow to Azure Linux 3.0


3.2    13-Jan-25    

Added libarrow to Azure Linux 3.0


3.3    15-Jan-25    

Added libarrow to Azure Linux 3.0


3.4    16-Jan-25    

Added libarrow to Azure Linux 3.0


3.5    17-Jan-25    

Added libarrow to Azure Linux 3.0


3.6    18-Jan-25    

Added libarrow to Azure Linux 3.0


3.7    19-Jan-25    

Added libarrow to Azure Linux 3.0


3.8    20-Jan-25    

Added libarrow to Azure Linux 3.0


3.9    21-Jan-25    

Added libarrow to Azure Linux 3.0


4.0    22-Jan-25    

Added libarrow to Azure Linux 3.0


4.1    23-Jan-25    

Added libarrow to Azure Linux 3.0


4.2    24-Jan-25    

Added libarrow to Azure Linux 3.0


4.3    25-Jan-25    

Added libarrow to Azure Linux 3.0


4.4    27-Jan-25    

Added libarrow to Azure Linux 3.0


4.5    28-Jan-25    

Added libarrow to Azure Linux 3.0


4.6    29-Jan-25    

Added libarrow to Azure Linux 3.0


4.7    30-Jan-25    

Added libarrow to Azure Linux 3.0


4.8    01-Feb-25    

Added libarrow to Azure Linux 3.0


4.9    02-Feb-25    

Added libarrow to Azure Linux 3.0


5.0    03-Feb-25    

Added libarrow to Azure Linux 3.0


5.1    04-Feb-25    

Added libarrow to Azure Linux 3.0


5.2    05-Feb-25    

Added libarrow to Azure Linux 3.0


5.3    07-Feb-25    

Added libarrow to Azure Linux 3.0


5.4    08-Feb-25    

Added libarrow to Azure Linux 3.0


5.5    09-Feb-25    

Added libarrow to Azure Linux 3.0


5.6    10-Feb-25    

Added libarrow to Azure Linux 3.0


5.7    11-Feb-25    

Added libarrow to Azure Linux 3.0


5.8    12-Feb-25    

Added libarrow to Azure Linux 3.0


5.9    13-Feb-25    

Added libarrow to Azure Linux 3.0


6.0    14-Feb-25    

Added libarrow to Azure Linux 3.0


6.1    15-Feb-25    

Added libarrow to Azure Linux 3.0


6.2    16-Feb-25    

Added libarrow to Azure Linux 3.0


6.3    17-Feb-25    

Added libarrow to Azure Linux 3.0


6.4    18-Feb-25    

Added libarrow to Azure Linux 3.0


6.5    19-Feb-25    

Added libarrow to Azure Linux 3.0


6.6    20-Feb-25    

Added libarrow to Azure Linux 3.0


6.7    21-Feb-25    

Added libarrow to Azure Linux 3.0


6.8    22-Feb-25    

Added libarrow to Azure Linux 3.0


6.9    23-Feb-25    

Added libarrow to Azure Linux 3.0


7.0    24-Feb-25    

Added libarrow to Azure Linux 3.0


7.1    25-Feb-25    

Added libarrow to Azure Linux 3.0


7.2    26-Feb-25    

Added libarrow to Azure Linux 3.0


7.3    27-Feb-25    

Added libarrow to Azure Linux 3.0


7.4    28-Feb-25    

Added libarrow to Azure Linux 3.0


7.5    01-Mar-25    

Added libarrow to Azure Linux 3.0


7.6    02-Mar-25    

Added libarrow to Azure Linux 3.0


7.7    03-Mar-25    

Added libarrow to Azure Linux 3.0


7.8    04-Mar-25    

Added libarrow to Azure Linux 3.0


7.9    05-Mar-25    

Added libarrow to Azure Linux 3.0


8.0    06-Mar-25    

Added libarrow to Azure Linux 3.0


8.1    08-Mar-25    

Added libarrow to Azure Linux 3.0


8.2    09-Mar-25    

Added libarrow to Azure Linux 3.0


8.3    10-Mar-25    

Added libarrow to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-52338
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libarrow (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
15.0.0-7
Unknown None
Azure Linux 3.0 x64 libarrow (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
15.0.0-7
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-52338 None

CVE-2024-34062 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-34062
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.8/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-May-24    

Information published.


1.1    30-Jun-24    

Information published.


1.2    29-Aug-24    

Information published.


1.3    30-Aug-24    

Information published.


1.4    31-Aug-24    

Information published.


1.5    01-Sep-24    

Information published.


1.6    02-Sep-24    

Information published.


1.7    03-Sep-24    

Information published.


1.8    05-Sep-24    

Information published.


1.9    06-Sep-24    

Information published.


2.0    07-Sep-24    

Information published.


2.1    08-Sep-24    

Information published.


2.2    11-Sep-24    

Information published.


2.3    12-Sep-24    

Information published.


2.4    13-Sep-24    

Information published.


2.5    14-Sep-24    

Information published.


2.6    15-Sep-24    

Information published.


2.7    16-Sep-24    

Information published.


2.8    17-Sep-24    

Information published.


2.9    18-Sep-24    

Information published.


3.0    19-Sep-24    

Information published.


3.1    20-Sep-24    

Information published.


3.2    21-Sep-24    

Information published.


3.3    22-Sep-24    

Information published.


3.4    23-Sep-24    

Information published.


3.5    24-Sep-24    

Information published.


3.6    25-Sep-24    

Information published.


3.7    26-Sep-24    

Information published.


3.8    27-Sep-24    

Information published.


3.9    28-Sep-24    

Information published.


4.0    29-Sep-24    

Information published.


4.1    30-Sep-24    

Information published.


4.2    01-Oct-24    

Information published.


4.3    02-Oct-24    

Information published.


4.4    03-Oct-24    

Information published.


4.5    04-Oct-24    

Information published.


4.6    05-Oct-24    

Information published.


4.7    06-Oct-24    

Information published.


4.8    07-Oct-24    

Information published.


4.9    08-Oct-24    

Information published.


5.0    09-Oct-24    

Information published.


5.1    10-Oct-24    

Information published.


5.2    11-Oct-24    

Information published.


5.3    12-Oct-24    

Information published.


5.4    13-Oct-24    

Information published.


5.5    14-Oct-24    

Information published.


5.6    15-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


5.7    16-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


5.8    17-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


5.9    18-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


6.0    19-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


6.1    20-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


6.2    21-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


6.3    22-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


6.4    23-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


6.5    24-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


6.6    25-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


6.7    26-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


6.8    27-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


6.9    28-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


7.0    29-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


7.1    30-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


7.2    31-Oct-24    

Added python-tqdm to CBL-Mariner 2.0


7.3    01-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


7.4    02-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


7.5    04-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


7.6    05-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


7.7    06-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


7.8    07-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


7.9    08-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


8.0    09-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


8.1    10-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


8.2    11-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


8.3    12-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


8.4    13-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


8.5    14-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


8.6    15-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


8.7    16-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


8.8    17-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


8.9    18-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


9.0    19-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


9.1    20-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


9.2    21-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


9.3    23-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


9.4    24-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


9.5    25-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


9.6    26-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


9.7    27-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


9.8    28-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


9.9    29-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


10.0    30-Nov-24    

Added python-tqdm to CBL-Mariner 2.0


10.1    01-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


10.2    02-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


10.3    03-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


10.4    04-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


10.5    05-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


10.6    07-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


10.7    08-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


10.8    09-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


10.9    10-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


11.0    11-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


11.1    12-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


11.2    13-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


11.3    14-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


11.4    15-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


11.5    16-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


11.6    17-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


11.7    18-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


11.8    19-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


11.9    20-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


12.0    21-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


12.1    22-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


12.2    23-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


12.3    24-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


12.4    25-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


12.5    26-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


12.6    27-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


12.7    28-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


12.8    29-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


12.9    30-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


13.0    31-Dec-24    

Added python-tqdm to CBL-Mariner 2.0


13.1    01-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


13.2    02-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


13.3    03-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


13.4    04-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


13.5    05-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


13.6    06-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


13.7    07-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


13.8    08-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


13.9    09-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


14.0    10-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


14.1    11-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


14.2    12-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


14.3    13-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


14.4    15-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


14.5    16-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


14.6    17-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


14.7    18-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


14.8    19-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


14.9    20-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


15.0    21-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


15.1    22-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


15.2    23-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


15.3    24-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


15.4    25-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


15.5    27-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


15.6    28-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


15.7    29-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


15.8    30-Jan-25    

Added python-tqdm to CBL-Mariner 2.0


15.9    01-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


16.0    02-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


16.1    03-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


16.2    04-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


16.3    05-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


16.4    07-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


16.5    08-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


16.6    09-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


16.7    10-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


16.8    11-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


16.9    12-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


17.0    13-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


17.1    14-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


17.2    15-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


17.3    16-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


17.4    17-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


17.5    18-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


17.6    19-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


17.7    20-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


17.8    21-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


17.9    22-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


18.0    23-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


18.1    24-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


18.2    25-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


18.3    26-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


18.4    27-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


18.5    28-Feb-25    

Added python-tqdm to CBL-Mariner 2.0


18.6    01-Mar-25    

Added python-tqdm to CBL-Mariner 2.0


18.7    02-Mar-25    

Added python-tqdm to CBL-Mariner 2.0


18.8    03-Mar-25    

Added python-tqdm to CBL-Mariner 2.0


18.9    04-Mar-25    

Added python-tqdm to CBL-Mariner 2.0


19.0    05-Mar-25    

Added python-tqdm to CBL-Mariner 2.0


19.1    06-Mar-25    

Added python-tqdm to CBL-Mariner 2.0


19.2    08-Mar-25    

Added python-tqdm to CBL-Mariner 2.0


19.3    09-Mar-25    

Added python-tqdm to CBL-Mariner 2.0


19.4    10-Mar-25    

Added python-tqdm to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-34062
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Unknown Unknown None
CBL Mariner 2.0 ARM python-tqdm (CBL-Mariner) Unknown Unknown Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.63.1-3
Unknown None
CBL Mariner 2.0 x64 python-tqdm (CBL-Mariner) Unknown Unknown Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.63.1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-34062 None

CVE-2024-32020 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-32020
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:3.9/TemporalScore:3.9
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    17-May-24    

Information published.


1.1    30-Jun-24    

Information published.


1.2    29-Aug-24    

Information published.


1.3    30-Aug-24    

Information published.


1.4    31-Aug-24    

Information published.


1.5    01-Sep-24    

Information published.


1.6    02-Sep-24    

Information published.


1.7    03-Sep-24    

Information published.


1.8    05-Sep-24    

Information published.


1.9    06-Sep-24    

Information published.


2.0    07-Sep-24    

Information published.


2.1    08-Sep-24    

Information published.


2.2    11-Sep-24    

Information published.


2.3    12-Sep-24    

Information published.


2.4    13-Sep-24    

Information published.


2.5    14-Sep-24    

Information published.


2.6    15-Sep-24    

Information published.


2.7    16-Sep-24    

Information published.


2.8    17-Sep-24    

Information published.


2.9    18-Sep-24    

Information published.


3.0    19-Sep-24    

Information published.


3.1    20-Sep-24    

Information published.


3.2    21-Sep-24    

Information published.


3.3    22-Sep-24    

Information published.


3.4    23-Sep-24    

Information published.


3.5    24-Sep-24    

Information published.


3.6    25-Sep-24    

Information published.


3.7    26-Sep-24    

Information published.


3.8    27-Sep-24    

Information published.


3.9    28-Sep-24    

Information published.


4.0    29-Sep-24    

Information published.


4.1    30-Sep-24    

Information published.


4.2    01-Oct-24    

Information published.


4.3    02-Oct-24    

Information published.


4.4    03-Oct-24    

Information published.


4.5    04-Oct-24    

Information published.


4.6    05-Oct-24    

Information published.


4.7    06-Oct-24    

Information published.


4.8    07-Oct-24    

Information published.


4.9    08-Oct-24    

Information published.


5.0    09-Oct-24    

Information published.


5.1    10-Oct-24    

Information published.


5.2    11-Oct-24    

Information published.


5.3    12-Oct-24    

Information published.


5.4    13-Oct-24    

Information published.


5.5    14-Oct-24    

Information published.


5.6    15-Oct-24    

Added git to CBL-Mariner 2.0


5.7    16-Oct-24    

Added git to CBL-Mariner 2.0


5.8    17-Oct-24    

Added git to CBL-Mariner 2.0


5.9    18-Oct-24    

Added git to CBL-Mariner 2.0


6.0    19-Oct-24    

Added git to CBL-Mariner 2.0


6.1    20-Oct-24    

Added git to CBL-Mariner 2.0


6.2    21-Oct-24    

Added git to CBL-Mariner 2.0


6.3    22-Oct-24    

Added git to CBL-Mariner 2.0


6.4    23-Oct-24    

Added git to CBL-Mariner 2.0


6.5    24-Oct-24    

Added git to CBL-Mariner 2.0


6.6    25-Oct-24    

Added git to CBL-Mariner 2.0


6.7    26-Oct-24    

Added git to CBL-Mariner 2.0


6.8    27-Oct-24    

Added git to CBL-Mariner 2.0


6.9    28-Oct-24    

Added git to CBL-Mariner 2.0


7.0    29-Oct-24    

Added git to CBL-Mariner 2.0


7.1    30-Oct-24    

Added git to CBL-Mariner 2.0


7.2    31-Oct-24    

Added git to CBL-Mariner 2.0


7.3    01-Nov-24    

Added git to CBL-Mariner 2.0


7.4    02-Nov-24    

Added git to CBL-Mariner 2.0


7.5    04-Nov-24    

Added git to CBL-Mariner 2.0


7.6    05-Nov-24    

Added git to CBL-Mariner 2.0


7.7    06-Nov-24    

Added git to CBL-Mariner 2.0


7.8    07-Nov-24    

Added git to CBL-Mariner 2.0


7.9    08-Nov-24    

Added git to CBL-Mariner 2.0


8.0    09-Nov-24    

Added git to CBL-Mariner 2.0


8.1    10-Nov-24    

Added git to CBL-Mariner 2.0


8.2    11-Nov-24    

Added git to CBL-Mariner 2.0


8.3    12-Nov-24    

Added git to CBL-Mariner 2.0


8.4    13-Nov-24    

Added git to CBL-Mariner 2.0


8.5    14-Nov-24    

Added git to CBL-Mariner 2.0


8.6    15-Nov-24    

Added git to CBL-Mariner 2.0


8.7    16-Nov-24    

Added git to CBL-Mariner 2.0


8.8    17-Nov-24    

Added git to CBL-Mariner 2.0


8.9    18-Nov-24    

Added git to CBL-Mariner 2.0


9.0    19-Nov-24    

Added git to CBL-Mariner 2.0


9.1    20-Nov-24    

Added git to CBL-Mariner 2.0


9.2    21-Nov-24    

Added git to CBL-Mariner 2.0


9.3    23-Nov-24    

Added git to CBL-Mariner 2.0


9.4    24-Nov-24    

Added git to CBL-Mariner 2.0


9.5    25-Nov-24    

Added git to CBL-Mariner 2.0


9.6    26-Nov-24    

Added git to CBL-Mariner 2.0


9.7    27-Nov-24    

Added git to CBL-Mariner 2.0


9.8    28-Nov-24    

Added git to CBL-Mariner 2.0


9.9    29-Nov-24    

Added git to CBL-Mariner 2.0


10.0    30-Nov-24    

Added git to CBL-Mariner 2.0


10.1    01-Dec-24    

Added git to CBL-Mariner 2.0


10.2    02-Dec-24    

Added git to CBL-Mariner 2.0


10.3    03-Dec-24    

Added git to CBL-Mariner 2.0


10.4    04-Dec-24    

Added git to CBL-Mariner 2.0


10.5    05-Dec-24    

Added git to CBL-Mariner 2.0


10.6    07-Dec-24    

Added git to CBL-Mariner 2.0


10.7    08-Dec-24    

Added git to CBL-Mariner 2.0


10.8    09-Dec-24    

Added git to CBL-Mariner 2.0


10.9    10-Dec-24    

Added git to CBL-Mariner 2.0


11.0    11-Dec-24    

Added git to CBL-Mariner 2.0


11.1    12-Dec-24    

Added git to CBL-Mariner 2.0


11.2    13-Dec-24    

Added git to CBL-Mariner 2.0


11.3    14-Dec-24    

Added git to CBL-Mariner 2.0


11.4    15-Dec-24    

Added git to CBL-Mariner 2.0


11.5    16-Dec-24    

Added git to CBL-Mariner 2.0


11.6    17-Dec-24    

Added git to CBL-Mariner 2.0


11.7    18-Dec-24    

Added git to CBL-Mariner 2.0


11.8    19-Dec-24    

Added git to CBL-Mariner 2.0


11.9    20-Dec-24    

Added git to CBL-Mariner 2.0


12.0    21-Dec-24    

Added git to CBL-Mariner 2.0


12.1    22-Dec-24    

Added git to CBL-Mariner 2.0


12.2    23-Dec-24    

Added git to CBL-Mariner 2.0


12.3    24-Dec-24    

Added git to CBL-Mariner 2.0


12.4    25-Dec-24    

Added git to CBL-Mariner 2.0


12.5    26-Dec-24    

Added git to CBL-Mariner 2.0


12.6    27-Dec-24    

Added git to CBL-Mariner 2.0


12.7    28-Dec-24    

Added git to CBL-Mariner 2.0


12.8    29-Dec-24    

Added git to CBL-Mariner 2.0


12.9    30-Dec-24    

Added git to CBL-Mariner 2.0


13.0    31-Dec-24    

Added git to CBL-Mariner 2.0


13.1    01-Jan-25    

Added git to CBL-Mariner 2.0


13.2    02-Jan-25    

Added git to CBL-Mariner 2.0


13.3    03-Jan-25    

Added git to CBL-Mariner 2.0


13.4    04-Jan-25    

Added git to CBL-Mariner 2.0


13.5    05-Jan-25    

Added git to CBL-Mariner 2.0


13.6    06-Jan-25    

Added git to CBL-Mariner 2.0


13.7    07-Jan-25    

Added git to CBL-Mariner 2.0


13.8    08-Jan-25    

Added git to CBL-Mariner 2.0


13.9    09-Jan-25    

Added git to CBL-Mariner 2.0


14.0    10-Jan-25    

Added git to CBL-Mariner 2.0


14.1    11-Jan-25    

Added git to CBL-Mariner 2.0


14.2    12-Jan-25    

Added git to CBL-Mariner 2.0


14.3    13-Jan-25    

Added git to CBL-Mariner 2.0


14.4    15-Jan-25    

Added git to CBL-Mariner 2.0


14.5    16-Jan-25    

Added git to CBL-Mariner 2.0


14.6    17-Jan-25    

Added git to CBL-Mariner 2.0


14.7    18-Jan-25    

Added git to CBL-Mariner 2.0


14.8    19-Jan-25    

Added git to CBL-Mariner 2.0


14.9    20-Jan-25    

Added git to CBL-Mariner 2.0


15.0    21-Jan-25    

Added git to CBL-Mariner 2.0


15.1    22-Jan-25    

Added git to CBL-Mariner 2.0


15.2    23-Jan-25    

Added git to CBL-Mariner 2.0


15.3    24-Jan-25    

Added git to CBL-Mariner 2.0


15.4    25-Jan-25    

Added git to CBL-Mariner 2.0


15.5    27-Jan-25    

Added git to CBL-Mariner 2.0


15.6    28-Jan-25    

Added git to CBL-Mariner 2.0


15.7    29-Jan-25    

Added git to CBL-Mariner 2.0


15.8    30-Jan-25    

Added git to CBL-Mariner 2.0


15.9    01-Feb-25    

Added git to CBL-Mariner 2.0


16.0    02-Feb-25    

Added git to CBL-Mariner 2.0


16.1    03-Feb-25    

Added git to CBL-Mariner 2.0


16.2    04-Feb-25    

Added git to CBL-Mariner 2.0


16.3    05-Feb-25    

Added git to CBL-Mariner 2.0


16.4    07-Feb-25    

Added git to CBL-Mariner 2.0


16.5    08-Feb-25    

Added git to CBL-Mariner 2.0


16.6    09-Feb-25    

Added git to CBL-Mariner 2.0


16.7    10-Feb-25    

Added git to CBL-Mariner 2.0


16.8    11-Feb-25    

Added git to CBL-Mariner 2.0


16.9    12-Feb-25    

Added git to CBL-Mariner 2.0


17.0    13-Feb-25    

Added git to CBL-Mariner 2.0


17.1    14-Feb-25    

Added git to CBL-Mariner 2.0


17.2    15-Feb-25    

Added git to CBL-Mariner 2.0


17.3    16-Feb-25    

Added git to CBL-Mariner 2.0


17.4    17-Feb-25    

Added git to CBL-Mariner 2.0


17.5    18-Feb-25    

Added git to CBL-Mariner 2.0


17.6    19-Feb-25    

Added git to CBL-Mariner 2.0


17.7    20-Feb-25    

Added git to CBL-Mariner 2.0


17.8    21-Feb-25    

Added git to CBL-Mariner 2.0


17.9    22-Feb-25    

Added git to CBL-Mariner 2.0


18.0    23-Feb-25    

Added git to CBL-Mariner 2.0


18.1    24-Feb-25    

Added git to CBL-Mariner 2.0


18.2    25-Feb-25    

Added git to CBL-Mariner 2.0


18.3    26-Feb-25    

Added git to CBL-Mariner 2.0


18.4    27-Feb-25    

Added git to CBL-Mariner 2.0


18.5    28-Feb-25    

Added git to CBL-Mariner 2.0


18.6    01-Mar-25    

Added git to CBL-Mariner 2.0


18.7    02-Mar-25    

Added git to CBL-Mariner 2.0


18.8    03-Mar-25    

Added git to CBL-Mariner 2.0


18.9    04-Mar-25    

Added git to CBL-Mariner 2.0


19.0    05-Mar-25    

Added git to CBL-Mariner 2.0


19.1    06-Mar-25    

Added git to CBL-Mariner 2.0


19.2    08-Mar-25    

Added git to CBL-Mariner 2.0


19.3    09-Mar-25    

Added git to CBL-Mariner 2.0


19.4    10-Mar-25    

Added git to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-32020
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
Unknown Unknown None
CBL Mariner 2.0 ARM git (CBL-Mariner) Unknown Unknown Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
2.39.4-1
Unknown None
CBL Mariner 2.0 x64 git (CBL-Mariner) Unknown Unknown Base: 3.9
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
2.39.4-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-32020 None

CVE-2024-7383 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7383
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:7.4
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


1.1    15-Oct-24    

Added libnbd to CBL-Mariner 2.0


1.2    16-Oct-24    

Added libnbd to CBL-Mariner 2.0


1.3    17-Oct-24    

Added libnbd to CBL-Mariner 2.0


1.4    18-Oct-24    

Added libnbd to CBL-Mariner 2.0


1.5    19-Oct-24    

Added libnbd to CBL-Mariner 2.0


1.6    20-Oct-24    

Added libnbd to CBL-Mariner 2.0


1.7    21-Oct-24    

Added libnbd to CBL-Mariner 2.0


1.8    22-Oct-24    

Added libnbd to CBL-Mariner 2.0


1.9    23-Oct-24    

Added libnbd to CBL-Mariner 2.0


2.0    24-Oct-24    

Added libnbd to CBL-Mariner 2.0


2.1    25-Oct-24    

Added libnbd to CBL-Mariner 2.0


2.2    26-Oct-24    

Added libnbd to CBL-Mariner 2.0


2.3    27-Oct-24    

Added libnbd to CBL-Mariner 2.0


2.4    28-Oct-24    

Added libnbd to CBL-Mariner 2.0


2.5    29-Oct-24    

Added libnbd to CBL-Mariner 2.0


2.6    30-Oct-24    

Added libnbd to CBL-Mariner 2.0


2.7    31-Oct-24    

Added libnbd to CBL-Mariner 2.0


2.8    01-Nov-24    

Added libnbd to CBL-Mariner 2.0


2.9    02-Nov-24    

Added libnbd to CBL-Mariner 2.0


3.0    04-Nov-24    

Added libnbd to CBL-Mariner 2.0


3.1    05-Nov-24    

Added libnbd to CBL-Mariner 2.0


3.2    06-Nov-24    

Added libnbd to CBL-Mariner 2.0


3.3    07-Nov-24    

Added libnbd to CBL-Mariner 2.0


3.4    08-Nov-24    

Added libnbd to CBL-Mariner 2.0


3.5    09-Nov-24    

Added libnbd to CBL-Mariner 2.0


3.6    10-Nov-24    

Added libnbd to CBL-Mariner 2.0


3.7    11-Nov-24    

Added libnbd to CBL-Mariner 2.0


3.8    12-Nov-24    

Added libnbd to CBL-Mariner 2.0


3.9    13-Nov-24    

Added libnbd to CBL-Mariner 2.0


4.0    14-Nov-24    

Added libnbd to CBL-Mariner 2.0


4.1    15-Nov-24    

Added libnbd to CBL-Mariner 2.0


4.2    16-Nov-24    

Added libnbd to CBL-Mariner 2.0


4.3    17-Nov-24    

Added libnbd to CBL-Mariner 2.0


4.4    18-Nov-24    

Added libnbd to CBL-Mariner 2.0


4.5    19-Nov-24    

Added libnbd to CBL-Mariner 2.0


4.6    20-Nov-24    

Added libnbd to CBL-Mariner 2.0


4.7    21-Nov-24    

Added libnbd to CBL-Mariner 2.0


4.8    23-Nov-24    

Added libnbd to CBL-Mariner 2.0


4.9    24-Nov-24    

Added libnbd to CBL-Mariner 2.0


5.0    25-Nov-24    

Added libnbd to CBL-Mariner 2.0


5.1    26-Nov-24    

Added libnbd to CBL-Mariner 2.0


5.2    27-Nov-24    

Added libnbd to CBL-Mariner 2.0


5.3    28-Nov-24    

Added libnbd to CBL-Mariner 2.0


5.4    29-Nov-24    

Added libnbd to CBL-Mariner 2.0


5.5    30-Nov-24    

Added libnbd to CBL-Mariner 2.0


5.6    01-Dec-24    

Added libnbd to CBL-Mariner 2.0


5.7    02-Dec-24    

Added libnbd to CBL-Mariner 2.0


5.8    03-Dec-24    

Added libnbd to CBL-Mariner 2.0


5.9    04-Dec-24    

Added libnbd to CBL-Mariner 2.0


6.0    05-Dec-24    

Added libnbd to CBL-Mariner 2.0


6.1    07-Dec-24    

Added libnbd to CBL-Mariner 2.0


6.2    08-Dec-24    

Added libnbd to CBL-Mariner 2.0


6.3    09-Dec-24    

Added libnbd to CBL-Mariner 2.0


6.4    10-Dec-24    

Added libnbd to CBL-Mariner 2.0


6.5    11-Dec-24    

Added libnbd to CBL-Mariner 2.0


6.6    12-Dec-24    

Added libnbd to CBL-Mariner 2.0


6.7    13-Dec-24    

Added libnbd to CBL-Mariner 2.0


6.8    14-Dec-24    

Added libnbd to CBL-Mariner 2.0


6.9    15-Dec-24    

Added libnbd to CBL-Mariner 2.0


7.0    16-Dec-24    

Added libnbd to CBL-Mariner 2.0


7.1    17-Dec-24    

Added libnbd to CBL-Mariner 2.0


7.2    18-Dec-24    

Added libnbd to CBL-Mariner 2.0


7.3    19-Dec-24    

Added libnbd to CBL-Mariner 2.0


7.4    20-Dec-24    

Added libnbd to CBL-Mariner 2.0


7.5    21-Dec-24    

Added libnbd to CBL-Mariner 2.0


7.6    22-Dec-24    

Added libnbd to CBL-Mariner 2.0


7.7    23-Dec-24    

Added libnbd to CBL-Mariner 2.0


7.8    24-Dec-24    

Added libnbd to CBL-Mariner 2.0


7.9    25-Dec-24    

Added libnbd to CBL-Mariner 2.0


8.0    26-Dec-24    

Added libnbd to CBL-Mariner 2.0


8.1    27-Dec-24    

Added libnbd to CBL-Mariner 2.0


8.2    28-Dec-24    

Added libnbd to CBL-Mariner 2.0


8.3    29-Dec-24    

Added libnbd to CBL-Mariner 2.0


8.4    30-Dec-24    

Added libnbd to CBL-Mariner 2.0


8.5    31-Dec-24    

Added libnbd to CBL-Mariner 2.0


8.6    01-Jan-25    

Added libnbd to CBL-Mariner 2.0


8.7    02-Jan-25    

Added libnbd to CBL-Mariner 2.0


8.8    03-Jan-25    

Added libnbd to CBL-Mariner 2.0


8.9    04-Jan-25    

Added libnbd to CBL-Mariner 2.0


9.0    05-Jan-25    

Added libnbd to CBL-Mariner 2.0


9.1    06-Jan-25    

Added libnbd to CBL-Mariner 2.0


9.2    07-Jan-25    

Added libnbd to CBL-Mariner 2.0


9.3    08-Jan-25    

Added libnbd to CBL-Mariner 2.0


9.4    09-Jan-25    

Added libnbd to CBL-Mariner 2.0


9.5    10-Jan-25    

Added libnbd to CBL-Mariner 2.0


9.6    11-Jan-25    

Added libnbd to CBL-Mariner 2.0


9.7    12-Jan-25    

Added libnbd to CBL-Mariner 2.0


9.8    13-Jan-25    

Added libnbd to CBL-Mariner 2.0


9.9    15-Jan-25    

Added libnbd to CBL-Mariner 2.0


10.0    16-Jan-25    

Added libnbd to CBL-Mariner 2.0


10.1    17-Jan-25    

Added libnbd to CBL-Mariner 2.0


10.2    18-Jan-25    

Added libnbd to CBL-Mariner 2.0


10.3    19-Jan-25    

Added libnbd to CBL-Mariner 2.0


10.4    20-Jan-25    

Added libnbd to CBL-Mariner 2.0


10.5    21-Jan-25    

Added libnbd to CBL-Mariner 2.0


10.6    22-Jan-25    

Added libnbd to CBL-Mariner 2.0


10.7    23-Jan-25    

Added libnbd to CBL-Mariner 2.0


10.8    24-Jan-25    

Added libnbd to CBL-Mariner 2.0


10.9    25-Jan-25    

Added libnbd to CBL-Mariner 2.0


11.0    27-Jan-25    

Added libnbd to CBL-Mariner 2.0


11.1    28-Jan-25    

Added libnbd to CBL-Mariner 2.0


11.2    29-Jan-25    

Added libnbd to CBL-Mariner 2.0


11.3    30-Jan-25    

Added libnbd to CBL-Mariner 2.0


11.4    01-Feb-25    

Added libnbd to CBL-Mariner 2.0


11.5    02-Feb-25    

Added libnbd to CBL-Mariner 2.0


11.6    03-Feb-25    

Added libnbd to CBL-Mariner 2.0


11.7    04-Feb-25    

Added libnbd to CBL-Mariner 2.0


11.8    05-Feb-25    

Added libnbd to CBL-Mariner 2.0


11.9    07-Feb-25    

Added libnbd to CBL-Mariner 2.0


12.0    08-Feb-25    

Added libnbd to CBL-Mariner 2.0


12.1    09-Feb-25    

Added libnbd to CBL-Mariner 2.0


12.2    10-Feb-25    

Added libnbd to CBL-Mariner 2.0


12.3    11-Feb-25    

Added libnbd to CBL-Mariner 2.0


12.4    12-Feb-25    

Added libnbd to CBL-Mariner 2.0


12.5    13-Feb-25    

Added libnbd to CBL-Mariner 2.0


12.6    14-Feb-25    

Added libnbd to CBL-Mariner 2.0


12.7    15-Feb-25    

Added libnbd to CBL-Mariner 2.0


12.8    16-Feb-25    

Added libnbd to CBL-Mariner 2.0


12.9    17-Feb-25    

Added libnbd to CBL-Mariner 2.0


13.0    18-Feb-25    

Added libnbd to CBL-Mariner 2.0


13.1    19-Feb-25    

Added libnbd to CBL-Mariner 2.0


13.2    20-Feb-25    

Added libnbd to CBL-Mariner 2.0


13.3    21-Feb-25    

Added libnbd to CBL-Mariner 2.0


13.4    22-Feb-25    

Added libnbd to CBL-Mariner 2.0


13.5    23-Feb-25    

Added libnbd to CBL-Mariner 2.0


13.6    24-Feb-25    

Added libnbd to CBL-Mariner 2.0


13.7    25-Feb-25    

Added libnbd to CBL-Mariner 2.0


13.8    26-Feb-25    

Added libnbd to CBL-Mariner 2.0


13.9    27-Feb-25    

Added libnbd to CBL-Mariner 2.0


14.0    28-Feb-25    

Added libnbd to CBL-Mariner 2.0


14.1    01-Mar-25    

Added libnbd to CBL-Mariner 2.0


14.2    02-Mar-25    

Added libnbd to CBL-Mariner 2.0


14.3    03-Mar-25    

Added libnbd to CBL-Mariner 2.0


14.4    04-Mar-25    

Added libnbd to CBL-Mariner 2.0


14.5    05-Mar-25    

Added libnbd to CBL-Mariner 2.0


14.6    06-Mar-25    

Added libnbd to CBL-Mariner 2.0


14.7    08-Mar-25    

Added libnbd to CBL-Mariner 2.0


14.8    09-Mar-25    

Added libnbd to CBL-Mariner 2.0


14.9    10-Mar-25    

Added libnbd to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7383
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Unknown Unknown None
CBL Mariner 2.0 ARM libnbd (CBL-Mariner) Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1.12.1-4
Unknown None
CBL Mariner 2.0 x64 libnbd (CBL-Mariner) Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1.12.1-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7383 None

CVE-2022-40898 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-40898
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Sep-24    

Information published.


1.1    14-Sep-24    

Information published.


1.2    15-Sep-24    

Information published.


1.3    16-Sep-24    

Information published.


1.4    17-Sep-24    

Information published.


1.5    18-Sep-24    

Information published.


1.6    19-Sep-24    

Information published.


1.7    20-Sep-24    

Information published.


1.8    21-Sep-24    

Information published.


1.9    22-Sep-24    

Information published.


2.0    23-Sep-24    

Information published.


2.1    24-Sep-24    

Information published.


2.2    25-Sep-24    

Information published.


2.3    26-Sep-24    

Information published.


2.4    27-Sep-24    

Information published.


2.5    28-Sep-24    

Information published.


2.6    29-Sep-24    

Information published.


2.7    30-Sep-24    

Information published.


2.8    01-Oct-24    

Information published.


2.9    02-Oct-24    

Information published.


3.0    03-Oct-24    

Information published.


3.1    04-Oct-24    

Information published.


3.2    05-Oct-24    

Information published.


3.3    06-Oct-24    

Information published.


3.4    07-Oct-24    

Information published.


3.5    09-Oct-24    

Information published.


3.6    10-Oct-24    

Information published.


3.7    11-Oct-24    

Information published.


3.8    12-Oct-24    

Information published.


3.9    13-Oct-24    

Information published.


4.0    14-Oct-24    

Information published.


4.1    15-Oct-24    

Added python-wheel to CBL-Mariner 2.0


4.2    16-Oct-24    

Added python-wheel to CBL-Mariner 2.0


4.3    17-Oct-24    

Added python-wheel to CBL-Mariner 2.0


4.4    18-Oct-24    

Added python-wheel to CBL-Mariner 2.0


4.5    19-Oct-24    

Added python-wheel to CBL-Mariner 2.0


4.6    20-Oct-24    

Added python-wheel to CBL-Mariner 2.0


4.7    21-Oct-24    

Added python-wheel to CBL-Mariner 2.0


4.8    22-Oct-24    

Added python-wheel to CBL-Mariner 2.0


4.9    23-Oct-24    

Added python-wheel to CBL-Mariner 2.0


5.0    24-Oct-24    

Added python-wheel to CBL-Mariner 2.0


5.1    25-Oct-24    

Added python-wheel to CBL-Mariner 2.0


5.2    26-Oct-24    

Added python-wheel to CBL-Mariner 2.0


5.3    27-Oct-24    

Added python-wheel to CBL-Mariner 2.0


5.4    28-Oct-24    

Added python-wheel to CBL-Mariner 2.0


5.5    29-Oct-24    

Added python-wheel to CBL-Mariner 2.0


5.6    30-Oct-24    

Added python-wheel to CBL-Mariner 2.0


5.7    31-Oct-24    

Added python-wheel to CBL-Mariner 2.0


5.8    01-Nov-24    

Added python-wheel to CBL-Mariner 2.0


5.9    02-Nov-24    

Added python-wheel to CBL-Mariner 2.0


6.0    04-Nov-24    

Added python-wheel to CBL-Mariner 2.0


6.1    05-Nov-24    

Added python-wheel to CBL-Mariner 2.0


6.2    06-Nov-24    

Added python-wheel to CBL-Mariner 2.0


6.3    07-Nov-24    

Added python-wheel to CBL-Mariner 2.0


6.4    08-Nov-24    

Added python-wheel to CBL-Mariner 2.0


6.5    09-Nov-24    

Added python-wheel to CBL-Mariner 2.0


6.6    10-Nov-24    

Added python-wheel to CBL-Mariner 2.0


6.7    11-Nov-24    

Added python-wheel to CBL-Mariner 2.0


6.8    12-Nov-24    

Added python-wheel to CBL-Mariner 2.0


6.9    13-Nov-24    

Added python-wheel to CBL-Mariner 2.0


7.0    14-Nov-24    

Added python-wheel to CBL-Mariner 2.0


7.1    15-Nov-24    

Added python-wheel to CBL-Mariner 2.0


7.2    16-Nov-24    

Added python-wheel to CBL-Mariner 2.0


7.3    17-Nov-24    

Added python-wheel to CBL-Mariner 2.0


7.4    18-Nov-24    

Added python-wheel to CBL-Mariner 2.0


7.5    19-Nov-24    

Added python-wheel to CBL-Mariner 2.0


7.6    20-Nov-24    

Added python-wheel to CBL-Mariner 2.0


7.7    21-Nov-24    

Added python-wheel to CBL-Mariner 2.0


7.8    23-Nov-24    

Added python-wheel to CBL-Mariner 2.0


7.9    24-Nov-24    

Added python-wheel to CBL-Mariner 2.0


8.0    25-Nov-24    

Added python-wheel to CBL-Mariner 2.0


8.1    26-Nov-24    

Added python-wheel to CBL-Mariner 2.0


8.2    27-Nov-24    

Added python-wheel to CBL-Mariner 2.0


8.3    28-Nov-24    

Added python-wheel to CBL-Mariner 2.0


8.4    29-Nov-24    

Added python-wheel to CBL-Mariner 2.0


8.5    30-Nov-24    

Added python-wheel to CBL-Mariner 2.0


8.6    01-Dec-24    

Added python-wheel to CBL-Mariner 2.0


8.7    02-Dec-24    

Added python-wheel to CBL-Mariner 2.0


8.8    03-Dec-24    

Added python-wheel to CBL-Mariner 2.0


8.9    04-Dec-24    

Added python-wheel to CBL-Mariner 2.0


9.0    05-Dec-24    

Added python-wheel to CBL-Mariner 2.0


9.1    07-Dec-24    

Added python-wheel to CBL-Mariner 2.0


9.2    08-Dec-24    

Added python-wheel to CBL-Mariner 2.0


9.3    09-Dec-24    

Added python-wheel to CBL-Mariner 2.0


9.4    10-Dec-24    

Added python-wheel to CBL-Mariner 2.0


9.5    11-Dec-24    

Added python-wheel to CBL-Mariner 2.0


9.6    12-Dec-24    

Added python-wheel to CBL-Mariner 2.0


9.7    13-Dec-24    

Added python-wheel to CBL-Mariner 2.0


9.8    14-Dec-24    

Added python-wheel to CBL-Mariner 2.0


9.9    15-Dec-24    

Added python-wheel to CBL-Mariner 2.0


10.0    16-Dec-24    

Added python-wheel to CBL-Mariner 2.0


10.1    17-Dec-24    

Added python-wheel to CBL-Mariner 2.0


10.2    18-Dec-24    

Added python-wheel to CBL-Mariner 2.0


10.3    19-Dec-24    

Added python-wheel to CBL-Mariner 2.0


10.4    20-Dec-24    

Added python-wheel to CBL-Mariner 2.0


10.5    21-Dec-24    

Added python-wheel to CBL-Mariner 2.0


10.6    22-Dec-24    

Added python-wheel to CBL-Mariner 2.0


10.7    23-Dec-24    

Added python-wheel to CBL-Mariner 2.0


10.8    24-Dec-24    

Added python-wheel to CBL-Mariner 2.0


10.9    25-Dec-24    

Added python-wheel to CBL-Mariner 2.0


11.0    26-Dec-24    

Added python-wheel to CBL-Mariner 2.0


11.1    27-Dec-24    

Added python-wheel to CBL-Mariner 2.0


11.2    28-Dec-24    

Added python-wheel to CBL-Mariner 2.0


11.3    29-Dec-24    

Added python-wheel to CBL-Mariner 2.0


11.4    30-Dec-24    

Added python-wheel to CBL-Mariner 2.0


11.5    31-Dec-24    

Added python-wheel to CBL-Mariner 2.0


11.6    01-Jan-25    

Added python-wheel to CBL-Mariner 2.0


11.7    02-Jan-25    

Added python-wheel to CBL-Mariner 2.0


11.8    03-Jan-25    

Added python-wheel to CBL-Mariner 2.0


11.9    04-Jan-25    

Added python-wheel to CBL-Mariner 2.0


12.0    05-Jan-25    

Added python-wheel to CBL-Mariner 2.0


12.1    06-Jan-25    

Added python-wheel to CBL-Mariner 2.0


12.2    07-Jan-25    

Added python-wheel to CBL-Mariner 2.0


12.3    08-Jan-25    

Added python-wheel to CBL-Mariner 2.0


12.4    09-Jan-25    

Added python-wheel to CBL-Mariner 2.0


12.5    10-Jan-25    

Added python-wheel to CBL-Mariner 2.0


12.6    11-Jan-25    

Added python-wheel to CBL-Mariner 2.0


12.7    12-Jan-25    

Added python-wheel to CBL-Mariner 2.0


12.8    13-Jan-25    

Added python-wheel to CBL-Mariner 2.0


12.9    15-Jan-25    

Added python-wheel to CBL-Mariner 2.0


13.0    16-Jan-25    

Added python-wheel to CBL-Mariner 2.0


13.1    17-Jan-25    

Added python-wheel to CBL-Mariner 2.0


13.2    18-Jan-25    

Added python-wheel to CBL-Mariner 2.0


13.3    19-Jan-25    

Added python-wheel to CBL-Mariner 2.0


13.4    20-Jan-25    

Added python-wheel to CBL-Mariner 2.0


13.5    21-Jan-25    

Added python-wheel to CBL-Mariner 2.0


13.6    22-Jan-25    

Added python-wheel to CBL-Mariner 2.0


13.7    23-Jan-25    

Added python-wheel to CBL-Mariner 2.0


13.8    24-Jan-25    

Added python-wheel to CBL-Mariner 2.0


13.9    25-Jan-25    

Added python-wheel to CBL-Mariner 2.0


14.0    27-Jan-25    

Added python-wheel to CBL-Mariner 2.0


14.1    28-Jan-25    

Added python-wheel to CBL-Mariner 2.0


14.2    29-Jan-25    

Added python-wheel to CBL-Mariner 2.0


14.3    30-Jan-25    

Added python-wheel to CBL-Mariner 2.0


14.4    01-Feb-25    

Added python-wheel to CBL-Mariner 2.0


14.5    02-Feb-25    

Added python-wheel to CBL-Mariner 2.0


14.6    03-Feb-25    

Added python-wheel to CBL-Mariner 2.0


14.7    04-Feb-25    

Added python-wheel to CBL-Mariner 2.0


14.8    05-Feb-25    

Added python-wheel to CBL-Mariner 2.0


14.9    07-Feb-25    

Added python-wheel to CBL-Mariner 2.0


15.0    08-Feb-25    

Added python-wheel to CBL-Mariner 2.0


15.1    09-Feb-25    

Added python-wheel to CBL-Mariner 2.0


15.2    10-Feb-25    

Added python-wheel to CBL-Mariner 2.0


15.3    11-Feb-25    

Added python-wheel to CBL-Mariner 2.0


15.4    12-Feb-25    

Added python-wheel to CBL-Mariner 2.0


15.5    13-Feb-25    

Added python-wheel to CBL-Mariner 2.0


15.6    14-Feb-25    

Added python-wheel to CBL-Mariner 2.0


15.7    15-Feb-25    

Added python-wheel to CBL-Mariner 2.0


15.8    16-Feb-25    

Added python-wheel to CBL-Mariner 2.0


15.9    17-Feb-25    

Added python-wheel to CBL-Mariner 2.0


16.0    18-Feb-25    

Added python-wheel to CBL-Mariner 2.0


16.1    19-Feb-25    

Added python-wheel to CBL-Mariner 2.0


16.2    20-Feb-25    

Added python-wheel to CBL-Mariner 2.0


16.3    21-Feb-25    

Added python-wheel to CBL-Mariner 2.0


16.4    22-Feb-25    

Added python-wheel to CBL-Mariner 2.0


16.5    23-Feb-25    

Added python-wheel to CBL-Mariner 2.0


16.6    24-Feb-25    

Added python-wheel to CBL-Mariner 2.0


16.7    25-Feb-25    

Added python-wheel to CBL-Mariner 2.0


16.8    26-Feb-25    

Added python-wheel to CBL-Mariner 2.0


16.9    27-Feb-25    

Added python-wheel to CBL-Mariner 2.0


17.0    28-Feb-25    

Added python-wheel to CBL-Mariner 2.0


17.1    01-Mar-25    

Added python-wheel to CBL-Mariner 2.0


17.2    02-Mar-25    

Added python-wheel to CBL-Mariner 2.0


17.3    03-Mar-25    

Added python-wheel to CBL-Mariner 2.0


17.4    04-Mar-25    

Added python-wheel to CBL-Mariner 2.0


17.5    05-Mar-25    

Added python-wheel to CBL-Mariner 2.0


17.6    06-Mar-25    

Added python-wheel to CBL-Mariner 2.0


17.7    08-Mar-25    

Added python-wheel to CBL-Mariner 2.0


17.8    09-Mar-25    

Added python-wheel to CBL-Mariner 2.0


17.9    10-Mar-25    

Added python-wheel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-40898
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM python-wheel (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.33.6-8
Unknown None
CBL Mariner 2.0 x64 python-wheel (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.33.6-8
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-40898 None

CVE-2019-14584 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-14584
MITRE
NVD

Issuing CNA: secure@intel.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


1.1    08-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.2    09-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.3    10-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.4    11-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.5    12-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.6    13-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.7    14-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.8    15-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


1.9    16-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.0    17-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.1    18-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.2    19-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.3    20-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.4    21-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.5    22-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.6    23-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.7    24-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.8    25-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


2.9    26-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.0    27-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.1    28-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.2    29-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.3    30-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.4    31-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.5    01-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.6    02-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.7    03-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.8    04-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.9    05-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.0    06-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.1    07-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.2    08-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.3    09-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.4    10-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.5    11-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.6    12-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.7    13-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.8    15-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.9    16-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.0    17-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.1    18-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.2    19-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.3    20-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.4    21-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.5    22-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.6    23-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.7    24-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.8    25-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


5.9    27-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.0    28-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.1    29-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.2    30-Jan-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.3    01-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.4    02-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.5    03-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.6    04-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.7    05-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.8    07-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


6.9    08-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.0    09-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.1    10-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.2    11-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.3    12-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.4    13-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.5    14-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.6    15-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.7    16-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.8    17-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


7.9    18-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.0    19-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.1    20-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.2    21-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.3    22-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.4    23-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.5    24-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.6    25-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.7    26-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.8    27-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


8.9    28-Feb-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.0    01-Mar-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.1    02-Mar-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.2    03-Mar-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.3    04-Mar-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.4    05-Mar-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.5    06-Mar-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.6    08-Mar-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.7    09-Mar-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


9.8    10-Mar-25    

Added shim-unsigned-aarch64 to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-14584
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim-unsigned-aarch64 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
15.8-3
Unknown None
Azure Linux 3.0 x64 shim-unsigned-aarch64 (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
15.8-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-14584 None

CVE-2022-32746 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-32746
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:5.4
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    15-Oct-24    

Information published.


1.1    16-Oct-24    

Added samba to Azure Linux 3.0


1.2    17-Oct-24    

Added samba to Azure Linux 3.0


1.3    18-Oct-24    

Added samba to Azure Linux 3.0


1.4    19-Oct-24    

Added samba to Azure Linux 3.0


1.5    20-Oct-24    

Added samba to Azure Linux 3.0


1.6    21-Oct-24    

Added samba to Azure Linux 3.0


1.7    22-Oct-24    

Added samba to Azure Linux 3.0


1.8    23-Oct-24    

Added samba to Azure Linux 3.0


1.9    24-Oct-24    

Added samba to Azure Linux 3.0


2.0    25-Oct-24    

Added samba to Azure Linux 3.0


2.1    26-Oct-24    

Added samba to Azure Linux 3.0


2.2    27-Oct-24    

Added samba to Azure Linux 3.0


2.3    28-Oct-24    

Added samba to Azure Linux 3.0


2.4    29-Oct-24    

Added samba to Azure Linux 3.0


2.5    30-Oct-24    

Added samba to Azure Linux 3.0


2.6    31-Oct-24    

Added samba to Azure Linux 3.0


2.7    01-Nov-24    

Added samba to Azure Linux 3.0


2.8    02-Nov-24    

Added samba to Azure Linux 3.0


2.9    04-Nov-24    

Added samba to Azure Linux 3.0


3.0    05-Nov-24    

Added samba to Azure Linux 3.0


3.1    06-Nov-24    

Added samba to Azure Linux 3.0


3.2    07-Nov-24    

Added samba to Azure Linux 3.0


3.3    08-Nov-24    

Added samba to Azure Linux 3.0


3.4    09-Nov-24    

Added samba to Azure Linux 3.0


3.5    10-Nov-24    

Added samba to Azure Linux 3.0


3.6    11-Nov-24    

Added samba to Azure Linux 3.0


3.7    12-Nov-24    

Added samba to Azure Linux 3.0


3.8    13-Nov-24    

Added samba to Azure Linux 3.0


3.9    14-Nov-24    

Added samba to Azure Linux 3.0


4.0    15-Nov-24    

Added samba to Azure Linux 3.0


4.1    16-Nov-24    

Added samba to Azure Linux 3.0


4.2    17-Nov-24    

Added samba to Azure Linux 3.0


4.3    18-Nov-24    

Added samba to Azure Linux 3.0


4.4    19-Nov-24    

Added samba to Azure Linux 3.0


4.5    20-Nov-24    

Added samba to Azure Linux 3.0


4.6    21-Nov-24    

Added samba to Azure Linux 3.0


4.7    23-Nov-24    

Added samba to Azure Linux 3.0


4.8    24-Nov-24    

Added samba to Azure Linux 3.0


4.9    25-Nov-24    

Added samba to Azure Linux 3.0


5.0    26-Nov-24    

Added samba to Azure Linux 3.0


5.1    27-Nov-24    

Added samba to Azure Linux 3.0


5.2    28-Nov-24    

Added samba to Azure Linux 3.0


5.3    29-Nov-24    

Added samba to Azure Linux 3.0


5.4    30-Nov-24    

Added samba to Azure Linux 3.0


5.5    01-Dec-24    

Added samba to Azure Linux 3.0


5.6    02-Dec-24    

Added samba to Azure Linux 3.0


5.7    03-Dec-24    

Added samba to Azure Linux 3.0


5.8    04-Dec-24    

Added samba to Azure Linux 3.0


5.9    05-Dec-24    

Added samba to Azure Linux 3.0


6.0    07-Dec-24    

Added samba to Azure Linux 3.0


6.1    08-Dec-24    

Added samba to Azure Linux 3.0


6.2    09-Dec-24    

Added samba to Azure Linux 3.0


6.3    10-Dec-24    

Added samba to Azure Linux 3.0


6.4    11-Dec-24    

Added samba to Azure Linux 3.0


6.5    12-Dec-24    

Added samba to Azure Linux 3.0


6.6    13-Dec-24    

Added samba to Azure Linux 3.0


6.7    14-Dec-24    

Added samba to Azure Linux 3.0


6.8    15-Dec-24    

Added samba to Azure Linux 3.0


6.9    16-Dec-24    

Added samba to Azure Linux 3.0


7.0    17-Dec-24    

Added samba to Azure Linux 3.0


7.1    18-Dec-24    

Added samba to Azure Linux 3.0


7.2    19-Dec-24    

Added samba to Azure Linux 3.0


7.3    20-Dec-24    

Added samba to Azure Linux 3.0


7.4    21-Dec-24    

Added samba to Azure Linux 3.0


7.5    22-Dec-24    

Added samba to Azure Linux 3.0


7.6    23-Dec-24    

Added samba to Azure Linux 3.0


7.7    24-Dec-24    

Added samba to Azure Linux 3.0


7.8    25-Dec-24    

Added samba to Azure Linux 3.0


7.9    26-Dec-24    

Added samba to Azure Linux 3.0


8.0    27-Dec-24    

Added samba to Azure Linux 3.0


8.1    28-Dec-24    

Added samba to Azure Linux 3.0


8.2    29-Dec-24    

Added samba to Azure Linux 3.0


8.3    30-Dec-24    

Added samba to Azure Linux 3.0


8.4    31-Dec-24    

Added samba to Azure Linux 3.0


8.5    01-Jan-25    

Added samba to Azure Linux 3.0


8.6    02-Jan-25    

Added samba to Azure Linux 3.0


8.7    03-Jan-25    

Added samba to Azure Linux 3.0


8.8    04-Jan-25    

Added samba to Azure Linux 3.0


8.9    05-Jan-25    

Added samba to Azure Linux 3.0


9.0    06-Jan-25    

Added samba to Azure Linux 3.0


9.1    07-Jan-25    

Added samba to Azure Linux 3.0


9.2    08-Jan-25    

Added samba to Azure Linux 3.0


9.3    09-Jan-25    

Added samba to Azure Linux 3.0


9.4    10-Jan-25    

Added samba to Azure Linux 3.0


9.5    11-Jan-25    

Added samba to Azure Linux 3.0


9.6    12-Jan-25    

Added samba to Azure Linux 3.0


9.7    13-Jan-25    

Added samba to Azure Linux 3.0


9.8    15-Jan-25    

Added samba to Azure Linux 3.0


9.9    16-Jan-25    

Added samba to Azure Linux 3.0


10.0    17-Jan-25    

Added samba to Azure Linux 3.0


10.1    18-Jan-25    

Added samba to Azure Linux 3.0


10.2    19-Jan-25    

Added samba to Azure Linux 3.0


10.3    20-Jan-25    

Added samba to Azure Linux 3.0


10.4    21-Jan-25    

Added samba to Azure Linux 3.0


10.5    22-Jan-25    

Added samba to Azure Linux 3.0


10.6    23-Jan-25    

Added samba to Azure Linux 3.0


10.7    24-Jan-25    

Added samba to Azure Linux 3.0


10.8    25-Jan-25    

Added samba to Azure Linux 3.0


10.9    27-Jan-25    

Added samba to Azure Linux 3.0


11.0    28-Jan-25    

Added samba to Azure Linux 3.0


11.1    29-Jan-25    

Added samba to Azure Linux 3.0


11.2    30-Jan-25    

Added samba to Azure Linux 3.0


11.3    01-Feb-25    

Added samba to Azure Linux 3.0


11.4    02-Feb-25    

Added samba to Azure Linux 3.0


11.5    03-Feb-25    

Added samba to Azure Linux 3.0


11.6    04-Feb-25    

Added samba to Azure Linux 3.0


11.7    05-Feb-25    

Added samba to Azure Linux 3.0


11.8    07-Feb-25    

Added samba to Azure Linux 3.0


11.9    08-Feb-25    

Added samba to Azure Linux 3.0


12.0    09-Feb-25    

Added samba to Azure Linux 3.0


12.1    10-Feb-25    

Added samba to Azure Linux 3.0


12.2    11-Feb-25    

Added samba to Azure Linux 3.0


12.3    12-Feb-25    

Added samba to Azure Linux 3.0


12.4    13-Feb-25    

Added samba to Azure Linux 3.0


12.5    14-Feb-25    

Added samba to Azure Linux 3.0


12.6    15-Feb-25    

Added samba to Azure Linux 3.0


12.7    16-Feb-25    

Added samba to Azure Linux 3.0


12.8    17-Feb-25    

Added samba to Azure Linux 3.0


12.9    18-Feb-25    

Added samba to Azure Linux 3.0


13.0    19-Feb-25    

Added samba to Azure Linux 3.0


13.1    20-Feb-25    

Added samba to Azure Linux 3.0


13.2    21-Feb-25    

Added samba to Azure Linux 3.0


13.3    22-Feb-25    

Added samba to Azure Linux 3.0


13.4    23-Feb-25    

Added samba to Azure Linux 3.0


13.5    24-Feb-25    

Added samba to Azure Linux 3.0


13.6    25-Feb-25    

Added samba to Azure Linux 3.0


13.7    26-Feb-25    

Added samba to Azure Linux 3.0


13.8    27-Feb-25    

Added samba to Azure Linux 3.0


13.9    28-Feb-25    

Added samba to Azure Linux 3.0


14.0    01-Mar-25    

Added samba to Azure Linux 3.0


14.1    02-Mar-25    

Added samba to Azure Linux 3.0


14.2    03-Mar-25    

Added samba to Azure Linux 3.0


14.3    04-Mar-25    

Added samba to Azure Linux 3.0


14.4    05-Mar-25    

Added samba to Azure Linux 3.0


14.5    06-Mar-25    

Added samba to Azure Linux 3.0


14.6    08-Mar-25    

Added samba to Azure Linux 3.0


14.7    09-Mar-25    

Added samba to Azure Linux 3.0


14.8    10-Mar-25    

Added samba to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-32746
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM samba (CBL-Mariner) Unknown Unknown Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
4.18.3-1
Unknown None
Azure Linux 3.0 x64 samba (CBL-Mariner) Unknown Unknown Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
4.18.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-32746 None

CVE-2021-20277 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-20277
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    15-Oct-24    

Information published.


1.1    16-Oct-24    

Added samba to Azure Linux 3.0


1.2    17-Oct-24    

Added samba to Azure Linux 3.0


1.3    18-Oct-24    

Added samba to Azure Linux 3.0


1.4    19-Oct-24    

Added samba to Azure Linux 3.0


1.5    20-Oct-24    

Added samba to Azure Linux 3.0


1.6    21-Oct-24    

Added samba to Azure Linux 3.0


1.7    22-Oct-24    

Added samba to Azure Linux 3.0


1.8    23-Oct-24    

Added samba to Azure Linux 3.0


1.9    24-Oct-24    

Added samba to Azure Linux 3.0


2.0    25-Oct-24    

Added samba to Azure Linux 3.0


2.1    26-Oct-24    

Added samba to Azure Linux 3.0


2.2    27-Oct-24    

Added samba to Azure Linux 3.0


2.3    28-Oct-24    

Added samba to Azure Linux 3.0


2.4    29-Oct-24    

Added samba to Azure Linux 3.0


2.5    30-Oct-24    

Added samba to Azure Linux 3.0


2.6    31-Oct-24    

Added samba to Azure Linux 3.0


2.7    01-Nov-24    

Added samba to Azure Linux 3.0


2.8    02-Nov-24    

Added samba to Azure Linux 3.0


2.9    04-Nov-24    

Added samba to Azure Linux 3.0


3.0    05-Nov-24    

Added samba to Azure Linux 3.0


3.1    06-Nov-24    

Added samba to Azure Linux 3.0


3.2    07-Nov-24    

Added samba to Azure Linux 3.0


3.3    08-Nov-24    

Added samba to Azure Linux 3.0


3.4    09-Nov-24    

Added samba to Azure Linux 3.0


3.5    10-Nov-24    

Added samba to Azure Linux 3.0


3.6    11-Nov-24    

Added samba to Azure Linux 3.0


3.7    12-Nov-24    

Added samba to Azure Linux 3.0


3.8    13-Nov-24    

Added samba to Azure Linux 3.0


3.9    14-Nov-24    

Added samba to Azure Linux 3.0


4.0    15-Nov-24    

Added samba to Azure Linux 3.0


4.1    16-Nov-24    

Added samba to Azure Linux 3.0


4.2    17-Nov-24    

Added samba to Azure Linux 3.0


4.3    18-Nov-24    

Added samba to Azure Linux 3.0


4.4    19-Nov-24    

Added samba to Azure Linux 3.0


4.5    20-Nov-24    

Added samba to Azure Linux 3.0


4.6    21-Nov-24    

Added samba to Azure Linux 3.0


4.7    23-Nov-24    

Added samba to Azure Linux 3.0


4.8    24-Nov-24    

Added samba to Azure Linux 3.0


4.9    25-Nov-24    

Added samba to Azure Linux 3.0


5.0    26-Nov-24    

Added samba to Azure Linux 3.0


5.1    27-Nov-24    

Added samba to Azure Linux 3.0


5.2    28-Nov-24    

Added samba to Azure Linux 3.0


5.3    29-Nov-24    

Added samba to Azure Linux 3.0


5.4    30-Nov-24    

Added samba to Azure Linux 3.0


5.5    01-Dec-24    

Added samba to Azure Linux 3.0


5.6    02-Dec-24    

Added samba to Azure Linux 3.0


5.7    03-Dec-24    

Added samba to Azure Linux 3.0


5.8    04-Dec-24    

Added samba to Azure Linux 3.0


5.9    05-Dec-24    

Added samba to Azure Linux 3.0


6.0    07-Dec-24    

Added samba to Azure Linux 3.0


6.1    08-Dec-24    

Added samba to Azure Linux 3.0


6.2    09-Dec-24    

Added samba to Azure Linux 3.0


6.3    10-Dec-24    

Added samba to Azure Linux 3.0


6.4    11-Dec-24    

Added samba to Azure Linux 3.0


6.5    12-Dec-24    

Added samba to Azure Linux 3.0


6.6    13-Dec-24    

Added samba to Azure Linux 3.0


6.7    14-Dec-24    

Added samba to Azure Linux 3.0


6.8    15-Dec-24    

Added samba to Azure Linux 3.0


6.9    16-Dec-24    

Added samba to Azure Linux 3.0


7.0    17-Dec-24    

Added samba to Azure Linux 3.0


7.1    18-Dec-24    

Added samba to Azure Linux 3.0


7.2    19-Dec-24    

Added samba to Azure Linux 3.0


7.3    20-Dec-24    

Added samba to Azure Linux 3.0


7.4    21-Dec-24    

Added samba to Azure Linux 3.0


7.5    22-Dec-24    

Added samba to Azure Linux 3.0


7.6    23-Dec-24    

Added samba to Azure Linux 3.0


7.7    24-Dec-24    

Added samba to Azure Linux 3.0


7.8    25-Dec-24    

Added samba to Azure Linux 3.0


7.9    26-Dec-24    

Added samba to Azure Linux 3.0


8.0    27-Dec-24    

Added samba to Azure Linux 3.0


8.1    28-Dec-24    

Added samba to Azure Linux 3.0


8.2    29-Dec-24    

Added samba to Azure Linux 3.0


8.3    30-Dec-24    

Added samba to Azure Linux 3.0


8.4    31-Dec-24    

Added samba to Azure Linux 3.0


8.5    01-Jan-25    

Added samba to Azure Linux 3.0


8.6    02-Jan-25    

Added samba to Azure Linux 3.0


8.7    03-Jan-25    

Added samba to Azure Linux 3.0


8.8    04-Jan-25    

Added samba to Azure Linux 3.0


8.9    05-Jan-25    

Added samba to Azure Linux 3.0


9.0    06-Jan-25    

Added samba to Azure Linux 3.0


9.1    07-Jan-25    

Added samba to Azure Linux 3.0


9.2    08-Jan-25    

Added samba to Azure Linux 3.0


9.3    09-Jan-25    

Added samba to Azure Linux 3.0


9.4    10-Jan-25    

Added samba to Azure Linux 3.0


9.5    11-Jan-25    

Added samba to Azure Linux 3.0


9.6    12-Jan-25    

Added samba to Azure Linux 3.0


9.7    13-Jan-25    

Added samba to Azure Linux 3.0


9.8    15-Jan-25    

Added samba to Azure Linux 3.0


9.9    16-Jan-25    

Added samba to Azure Linux 3.0


10.0    17-Jan-25    

Added samba to Azure Linux 3.0


10.1    18-Jan-25    

Added samba to Azure Linux 3.0


10.2    19-Jan-25    

Added samba to Azure Linux 3.0


10.3    20-Jan-25    

Added samba to Azure Linux 3.0


10.4    21-Jan-25    

Added samba to Azure Linux 3.0


10.5    22-Jan-25    

Added samba to Azure Linux 3.0


10.6    23-Jan-25    

Added samba to Azure Linux 3.0


10.7    24-Jan-25    

Added samba to Azure Linux 3.0


10.8    25-Jan-25    

Added samba to Azure Linux 3.0


10.9    27-Jan-25    

Added samba to Azure Linux 3.0


11.0    28-Jan-25    

Added samba to Azure Linux 3.0


11.1    29-Jan-25    

Added samba to Azure Linux 3.0


11.2    30-Jan-25    

Added samba to Azure Linux 3.0


11.3    01-Feb-25    

Added samba to Azure Linux 3.0


11.4    02-Feb-25    

Added samba to Azure Linux 3.0


11.5    03-Feb-25    

Added samba to Azure Linux 3.0


11.6    04-Feb-25    

Added samba to Azure Linux 3.0


11.7    05-Feb-25    

Added samba to Azure Linux 3.0


11.8    07-Feb-25    

Added samba to Azure Linux 3.0


11.9    08-Feb-25    

Added samba to Azure Linux 3.0


12.0    09-Feb-25    

Added samba to Azure Linux 3.0


12.1    10-Feb-25    

Added samba to Azure Linux 3.0


12.2    11-Feb-25    

Added samba to Azure Linux 3.0


12.3    12-Feb-25    

Added samba to Azure Linux 3.0


12.4    13-Feb-25    

Added samba to Azure Linux 3.0


12.5    14-Feb-25    

Added samba to Azure Linux 3.0


12.6    15-Feb-25    

Added samba to Azure Linux 3.0


12.7    16-Feb-25    

Added samba to Azure Linux 3.0


12.8    17-Feb-25    

Added samba to Azure Linux 3.0


12.9    18-Feb-25    

Added samba to Azure Linux 3.0


13.0    19-Feb-25    

Added samba to Azure Linux 3.0


13.1    20-Feb-25    

Added samba to Azure Linux 3.0


13.2    21-Feb-25    

Added samba to Azure Linux 3.0


13.3    22-Feb-25    

Added samba to Azure Linux 3.0


13.4    23-Feb-25    

Added samba to Azure Linux 3.0


13.5    24-Feb-25    

Added samba to Azure Linux 3.0


13.6    25-Feb-25    

Added samba to Azure Linux 3.0


13.7    26-Feb-25    

Added samba to Azure Linux 3.0


13.8    27-Feb-25    

Added samba to Azure Linux 3.0


13.9    28-Feb-25    

Added samba to Azure Linux 3.0


14.0    01-Mar-25    

Added samba to Azure Linux 3.0


14.1    02-Mar-25    

Added samba to Azure Linux 3.0


14.2    03-Mar-25    

Added samba to Azure Linux 3.0


14.3    04-Mar-25    

Added samba to Azure Linux 3.0


14.4    05-Mar-25    

Added samba to Azure Linux 3.0


14.5    06-Mar-25    

Added samba to Azure Linux 3.0


14.6    08-Mar-25    

Added samba to Azure Linux 3.0


14.7    09-Mar-25    

Added samba to Azure Linux 3.0


14.8    10-Mar-25    

Added samba to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-20277
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM samba (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1
Unknown None
Azure Linux 3.0 x64 samba (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-20277 None

CVE-2019-3816 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-3816
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Apr-24    

Information published.


1.6    30-Jun-24    

Information published.


1.1    02-Jul-24    

Information published.


1.2    03-Jul-24    

Information published.


1.3    04-Jul-24    

Information published.


1.4    05-Jul-24    

Information published.


1.5    06-Jul-24    

Information published.


1.7    08-Jul-24    

Information published.


1.8    09-Jul-24    

Information published.


1.9    10-Jul-24    

Information published.


2.0    12-Jul-24    

Information published.


2.1    13-Jul-24    

Information published.


2.2    14-Jul-24    

Information published.


2.3    15-Jul-24    

Information published.


2.4    16-Jul-24    

Information published.


2.5    17-Jul-24    

Information published.


2.6    19-Jul-24    

Information published.


2.7    20-Jul-24    

Information published.


2.8    21-Jul-24    

Information published.


2.9    22-Jul-24    

Information published.


3.0    23-Jul-24    

Information published.


3.1    24-Jul-24    

Information published.


3.2    25-Jul-24    

Information published.


3.3    26-Jul-24    

Information published.


3.4    27-Jul-24    

Information published.


3.5    28-Jul-24    

Information published.


3.6    29-Jul-24    

Information published.


3.7    02-Aug-24    

Information published.


3.8    03-Aug-24    

Information published.


3.9    04-Aug-24    

Information published.


4.0    05-Aug-24    

Information published.


4.1    06-Aug-24    

Information published.


4.2    07-Aug-24    

Information published.


4.3    08-Aug-24    

Information published.


4.4    09-Aug-24    

Information published.


4.5    10-Aug-24    

Information published.


4.6    11-Aug-24    

Information published.


4.7    12-Aug-24    

Information published.


4.8    16-Aug-24    

Information published.


4.9    17-Aug-24    

Information published.


5.0    18-Aug-24    

Information published.


5.1    19-Aug-24    

Information published.


5.2    20-Aug-24    

Information published.


5.3    21-Aug-24    

Information published.


5.4    22-Aug-24    

Information published.


5.5    23-Aug-24    

Information published.


5.6    24-Aug-24    

Information published.


5.7    25-Aug-24    

Information published.


5.8    26-Aug-24    

Information published.


5.9    27-Aug-24    

Information published.


6.0    28-Aug-24    

Information published.


6.1    29-Aug-24    

Information published.


6.2    30-Aug-24    

Information published.


6.3    31-Aug-24    

Information published.


6.4    01-Sep-24    

Information published.


6.5    02-Sep-24    

Information published.


6.6    03-Sep-24    

Information published.


6.7    05-Sep-24    

Information published.


6.8    06-Sep-24    

Information published.


6.9    07-Sep-24    

Information published.


7.0    08-Sep-24    

Information published.


7.1    11-Sep-24    

Information published.


7.2    12-Sep-24    

Information published.


7.3    13-Sep-24    

Information published.


7.4    14-Sep-24    

Information published.


7.5    15-Sep-24    

Information published.


7.6    16-Sep-24    

Information published.


7.7    17-Sep-24    

Information published.


7.8    18-Sep-24    

Information published.


7.9    19-Sep-24    

Information published.


8.0    20-Sep-24    

Information published.


8.1    21-Sep-24    

Information published.


8.2    22-Sep-24    

Information published.


8.3    23-Sep-24    

Information published.


8.4    24-Sep-24    

Information published.


8.5    25-Sep-24    

Information published.


8.6    26-Sep-24    

Information published.


8.7    27-Sep-24    

Information published.


8.8    28-Sep-24    

Information published.


8.9    29-Sep-24    

Information published.


9.0    30-Sep-24    

Information published.


9.1    01-Oct-24    

Information published.


9.2    02-Oct-24    

Information published.


9.3    03-Oct-24    

Information published.


9.4    04-Oct-24    

Information published.


9.5    05-Oct-24    

Information published.


9.6    06-Oct-24    

Information published.


9.7    07-Oct-24    

Information published.


9.8    08-Oct-24    

Information published.


9.9    09-Oct-24    

Information published.


10.0    10-Oct-24    

Information published.


10.1    11-Oct-24    

Information published.


10.2    12-Oct-24    

Information published.


10.3    13-Oct-24    

Information published.


10.4    14-Oct-24    

Information published.


10.5    15-Oct-24    

Added openwsman to CBL-Mariner 2.0


10.6    16-Oct-24    

Added openwsman to CBL-Mariner 2.0


10.7    17-Oct-24    

Added openwsman to CBL-Mariner 2.0


10.8    18-Oct-24    

Added openwsman to CBL-Mariner 2.0


10.9    19-Oct-24    

Added openwsman to CBL-Mariner 2.0


11.0    20-Oct-24    

Added openwsman to CBL-Mariner 2.0


11.1    21-Oct-24    

Added openwsman to CBL-Mariner 2.0


11.2    22-Oct-24    

Added openwsman to CBL-Mariner 2.0


11.3    23-Oct-24    

Added openwsman to CBL-Mariner 2.0


11.4    24-Oct-24    

Added openwsman to CBL-Mariner 2.0


11.5    25-Oct-24    

Added openwsman to CBL-Mariner 2.0


11.6    26-Oct-24    

Added openwsman to CBL-Mariner 2.0


11.7    27-Oct-24    

Added openwsman to CBL-Mariner 2.0


11.8    28-Oct-24    

Added openwsman to CBL-Mariner 2.0


11.9    29-Oct-24    

Added openwsman to CBL-Mariner 2.0


12.0    30-Oct-24    

Added openwsman to CBL-Mariner 2.0


12.1    31-Oct-24    

Added openwsman to CBL-Mariner 2.0


12.2    01-Nov-24    

Added openwsman to CBL-Mariner 2.0


12.3    02-Nov-24    

Added openwsman to CBL-Mariner 2.0


12.4    04-Nov-24    

Added openwsman to CBL-Mariner 2.0


12.5    05-Nov-24    

Added openwsman to CBL-Mariner 2.0


12.6    06-Nov-24    

Added openwsman to CBL-Mariner 2.0


12.7    07-Nov-24    

Added openwsman to CBL-Mariner 2.0


12.8    08-Nov-24    

Added openwsman to CBL-Mariner 2.0


12.9    09-Nov-24    

Added openwsman to CBL-Mariner 2.0


13.0    10-Nov-24    

Added openwsman to CBL-Mariner 2.0


13.1    11-Nov-24    

Added openwsman to CBL-Mariner 2.0


13.2    12-Nov-24    

Added openwsman to CBL-Mariner 2.0


13.3    13-Nov-24    

Added openwsman to CBL-Mariner 2.0


13.4    14-Nov-24    

Added openwsman to CBL-Mariner 2.0


13.5    15-Nov-24    

Added openwsman to CBL-Mariner 2.0


13.6    16-Nov-24    

Added openwsman to CBL-Mariner 2.0


13.7    17-Nov-24    

Added openwsman to CBL-Mariner 2.0


13.8    18-Nov-24    

Added openwsman to CBL-Mariner 2.0


13.9    19-Nov-24    

Added openwsman to CBL-Mariner 2.0


14.0    20-Nov-24    

Added openwsman to CBL-Mariner 2.0


14.1    21-Nov-24    

Added openwsman to CBL-Mariner 2.0


14.2    23-Nov-24    

Added openwsman to CBL-Mariner 2.0


14.3    24-Nov-24    

Added openwsman to CBL-Mariner 2.0


14.4    25-Nov-24    

Added openwsman to CBL-Mariner 2.0


14.5    26-Nov-24    

Added openwsman to CBL-Mariner 2.0


14.6    27-Nov-24    

Added openwsman to CBL-Mariner 2.0


14.7    28-Nov-24    

Added openwsman to CBL-Mariner 2.0


14.8    29-Nov-24    

Added openwsman to CBL-Mariner 2.0


14.9    30-Nov-24    

Added openwsman to CBL-Mariner 2.0


15.0    01-Dec-24    

Added openwsman to CBL-Mariner 2.0


15.1    02-Dec-24    

Added openwsman to CBL-Mariner 2.0


15.2    03-Dec-24    

Added openwsman to CBL-Mariner 2.0


15.3    04-Dec-24    

Added openwsman to CBL-Mariner 2.0


15.4    05-Dec-24    

Added openwsman to CBL-Mariner 2.0


15.5    07-Dec-24    

Added openwsman to CBL-Mariner 2.0


15.6    08-Dec-24    

Added openwsman to CBL-Mariner 2.0


15.7    09-Dec-24    

Added openwsman to CBL-Mariner 2.0


15.8    10-Dec-24    

Added openwsman to CBL-Mariner 2.0


15.9    11-Dec-24    

Added openwsman to CBL-Mariner 2.0


16.0    12-Dec-24    

Added openwsman to CBL-Mariner 2.0


16.1    13-Dec-24    

Added openwsman to CBL-Mariner 2.0


16.2    14-Dec-24    

Added openwsman to CBL-Mariner 2.0


16.3    15-Dec-24    

Added openwsman to CBL-Mariner 2.0


16.4    16-Dec-24    

Added openwsman to CBL-Mariner 2.0


16.5    17-Dec-24    

Added openwsman to CBL-Mariner 2.0


16.6    18-Dec-24    

Added openwsman to CBL-Mariner 2.0


16.7    19-Dec-24    

Added openwsman to CBL-Mariner 2.0


16.8    20-Dec-24    

Added openwsman to CBL-Mariner 2.0


16.9    21-Dec-24    

Added openwsman to CBL-Mariner 2.0


17.0    22-Dec-24    

Added openwsman to CBL-Mariner 2.0


17.1    23-Dec-24    

Added openwsman to CBL-Mariner 2.0


17.2    24-Dec-24    

Added openwsman to CBL-Mariner 2.0


17.3    25-Dec-24    

Added openwsman to CBL-Mariner 2.0


17.4    26-Dec-24    

Added openwsman to CBL-Mariner 2.0


17.5    27-Dec-24    

Added openwsman to CBL-Mariner 2.0


17.6    28-Dec-24    

Added openwsman to CBL-Mariner 2.0


17.7    29-Dec-24    

Added openwsman to CBL-Mariner 2.0


17.8    30-Dec-24    

Added openwsman to CBL-Mariner 2.0


17.9    31-Dec-24    

Added openwsman to CBL-Mariner 2.0


18.0    01-Jan-25    

Added openwsman to CBL-Mariner 2.0


18.1    02-Jan-25    

Added openwsman to CBL-Mariner 2.0


18.2    03-Jan-25    

Added openwsman to CBL-Mariner 2.0


18.3    04-Jan-25    

Added openwsman to CBL-Mariner 2.0


18.4    05-Jan-25    

Added openwsman to CBL-Mariner 2.0


18.5    06-Jan-25    

Added openwsman to CBL-Mariner 2.0


18.6    07-Jan-25    

Added openwsman to CBL-Mariner 2.0


18.7    08-Jan-25    

Added openwsman to CBL-Mariner 2.0


18.8    09-Jan-25    

Added openwsman to CBL-Mariner 2.0


18.9    10-Jan-25    

Added openwsman to CBL-Mariner 2.0


19.0    11-Jan-25    

Added openwsman to CBL-Mariner 2.0


19.1    12-Jan-25    

Added openwsman to CBL-Mariner 2.0


19.2    13-Jan-25    

Added openwsman to CBL-Mariner 2.0


19.3    15-Jan-25    

Added openwsman to CBL-Mariner 2.0


19.4    16-Jan-25    

Added openwsman to CBL-Mariner 2.0


19.5    17-Jan-25    

Added openwsman to CBL-Mariner 2.0


19.6    18-Jan-25    

Added openwsman to CBL-Mariner 2.0


19.7    19-Jan-25    

Added openwsman to CBL-Mariner 2.0


19.8    20-Jan-25    

Added openwsman to CBL-Mariner 2.0


19.9    21-Jan-25    

Added openwsman to CBL-Mariner 2.0


20.0    22-Jan-25    

Added openwsman to CBL-Mariner 2.0


20.1    23-Jan-25    

Added openwsman to CBL-Mariner 2.0


20.2    24-Jan-25    

Added openwsman to CBL-Mariner 2.0


20.3    25-Jan-25    

Added openwsman to CBL-Mariner 2.0


20.4    27-Jan-25    

Added openwsman to CBL-Mariner 2.0


20.5    28-Jan-25    

Added openwsman to CBL-Mariner 2.0


20.6    29-Jan-25    

Added openwsman to CBL-Mariner 2.0


20.7    30-Jan-25    

Added openwsman to CBL-Mariner 2.0


20.8    01-Feb-25    

Added openwsman to CBL-Mariner 2.0


20.9    02-Feb-25    

Added openwsman to CBL-Mariner 2.0


21.0    03-Feb-25    

Added openwsman to CBL-Mariner 2.0


21.1    04-Feb-25    

Added openwsman to CBL-Mariner 2.0


21.2    05-Feb-25    

Added openwsman to CBL-Mariner 2.0


21.3    07-Feb-25    

Added openwsman to CBL-Mariner 2.0


21.4    08-Feb-25    

Added openwsman to CBL-Mariner 2.0


21.5    09-Feb-25    

Added openwsman to CBL-Mariner 2.0


21.6    10-Feb-25    

Added openwsman to CBL-Mariner 2.0


21.7    11-Feb-25    

Added openwsman to CBL-Mariner 2.0


21.8    12-Feb-25    

Added openwsman to CBL-Mariner 2.0


21.9    13-Feb-25    

Added openwsman to CBL-Mariner 2.0


22.0    14-Feb-25    

Added openwsman to CBL-Mariner 2.0


22.1    15-Feb-25    

Added openwsman to CBL-Mariner 2.0


22.2    16-Feb-25    

Added openwsman to CBL-Mariner 2.0


22.3    17-Feb-25    

Added openwsman to CBL-Mariner 2.0


22.4    18-Feb-25    

Added openwsman to CBL-Mariner 2.0


22.5    19-Feb-25    

Added openwsman to CBL-Mariner 2.0


22.6    20-Feb-25    

Added openwsman to CBL-Mariner 2.0


22.7    21-Feb-25    

Added openwsman to CBL-Mariner 2.0


22.8    22-Feb-25    

Added openwsman to CBL-Mariner 2.0


22.9    23-Feb-25    

Added openwsman to CBL-Mariner 2.0


23.0    24-Feb-25    

Added openwsman to CBL-Mariner 2.0


23.1    25-Feb-25    

Added openwsman to CBL-Mariner 2.0


23.2    26-Feb-25    

Added openwsman to CBL-Mariner 2.0


23.3    27-Feb-25    

Added openwsman to CBL-Mariner 2.0


23.4    28-Feb-25    

Added openwsman to CBL-Mariner 2.0


23.5    01-Mar-25    

Added openwsman to CBL-Mariner 2.0


23.6    02-Mar-25    

Added openwsman to CBL-Mariner 2.0


23.7    03-Mar-25    

Added openwsman to CBL-Mariner 2.0


23.8    04-Mar-25    

Added openwsman to CBL-Mariner 2.0


23.9    05-Mar-25    

Added openwsman to CBL-Mariner 2.0


24.0    06-Mar-25    

Added openwsman to CBL-Mariner 2.0


24.1    08-Mar-25    

Added openwsman to CBL-Mariner 2.0


24.2    09-Mar-25    

Added openwsman to CBL-Mariner 2.0


24.3    10-Mar-25    

Added openwsman to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-3816
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Unknown Unknown None
CBL Mariner 2.0 ARM openwsman (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.6.8-13
Unknown None
CBL Mariner 2.0 x64 openwsman (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.6.8-13
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-3816 None

CVE-2025-26466 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26466
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    02-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26466
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM openssh (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
9.8p1-3
Unknown None
Azure Linux 3.0 x64 openssh (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
9.8p1-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26466 None

CVE-2024-50608 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-50608
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    04-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-50608
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.6-2
Unknown None
CBL Mariner 2.0 x64 fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.6-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-50608 None

CVE-2025-26618 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26618
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    04-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26618
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM erlang (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
25.2-3
Unknown None
CBL Mariner 2.0 x64 erlang (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
25.2-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26618 None

CVE-2024-1454 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1454
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:3.4/TemporalScore:3.4
Base score metrics
Attack VectorPhysical
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jun-24    

Information published.


1.1    04-Mar-25    

Added opensc to CBL-Mariner 2.0 Added opensc to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1454
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM opensc (CBL-Mariner) Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
0.25.1-3
Unknown None
Azure Linux 3.0 x64 opensc (CBL-Mariner) Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
0.25.1-3
Unknown None
CBL Mariner 2.0 ARM opensc (CBL-Mariner) Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
0.23.0-4
Unknown None
CBL Mariner 2.0 x64 opensc (CBL-Mariner) Unknown Unknown Base: 3.4
Temporal: 3.4
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
0.23.0-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1454 None

CVE-2024-9681 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-9681
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    29-Jan-25    

Information published.


0.2    30-Jan-25    

Information published.


0.3    01-Feb-25    

Information published.


0.4    13-Feb-25    

Information published.


0.5    23-Feb-25    

Information published.


0.6    04-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-9681
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
3.30.3-4

8.8.0-4
8.0.40-5
None
Azure Linux 3.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
3.30.3-4

8.8.0-4
8.0.40-5
None
CBL Mariner 2.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
rust (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
3.21.4-16

8.8.0-5
8.0.40-3
1.72.0-10
None
CBL Mariner 2.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
rust (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
3.21.4-16

8.8.0-5
8.0.40-3
1.72.0-10
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-9681 None

CVE-2025-27144 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27144
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    04-Mar-25    

Information published.


0.2    05-Mar-25    

Information published.


0.3    06-Mar-25    

Information published.


0.4    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27144
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
kube-vip-cloud-provider (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
1.11.2-20

2.6.1-21
2.4.0-27
0.0.2-20
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
kube-vip-cloud-provider (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
1.11.2-20

2.6.1-21
2.4.0-27
0.0.2-20
None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27144 None

CVE-2024-50609 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-50609
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    04-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-50609
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.6-2
Unknown None
CBL Mariner 2.0 x64 fluent-bit (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.6-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-50609 None

CVE-2023-52917 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-52917
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Nov-24    

Information published.


1.1    12-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


1.2    04-Mar-25    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-52917
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.56.1-5
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.56.1-5
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.173.1-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.173.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-52917 None

CVE-2021-36373 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-36373
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    17-Jul-21    

Information published.


1.1    30-Jun-24    

Information published.


1.2    04-Mar-25    

Added javapackages-bootstrap to CBL-Mariner 2.0 Added javapackages-bootstrap to Azure Linux 3.0 Added ant to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-36373
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.14.0-2
Unknown None
Azure Linux 3.0 x64 javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.14.0-2
Unknown None
CBL Mariner 1.0 ARM ant (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.10.11-1
Unknown None
CBL Mariner 1.0 x64 ant (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.10.11-1
Unknown None
CBL Mariner 2.0 ARM javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.5.0-6
Unknown None
CBL Mariner 2.0 x64 javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.5.0-6
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-36373 None

CVE-2021-36374 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-36374
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    17-Jul-21    

Information published.


1.1    30-Jun-24    

Information published.


1.2    04-Mar-25    

Added javapackages-bootstrap to CBL-Mariner 2.0 Added javapackages-bootstrap to Azure Linux 3.0 Added ant to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-36374
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.14.0-2
Unknown None
Azure Linux 3.0 x64 javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.14.0-2
Unknown None
CBL Mariner 1.0 ARM ant (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.10.11-1
Unknown None
CBL Mariner 1.0 x64 ant (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.10.11-1
Unknown None
CBL Mariner 2.0 ARM javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.5.0-6
Unknown None
CBL Mariner 2.0 x64 javapackages-bootstrap (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.5.0-6
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-36374 None

CVE-2023-40660 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40660
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:6.6
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jun-24    

Information published.


1.1    04-Mar-25    

Added opensc to CBL-Mariner 2.0 Added opensc to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40660
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM opensc (CBL-Mariner) Unknown Unknown Base: 6.6
Temporal: 6.6
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.25.1-3
Unknown None
Azure Linux 3.0 x64 opensc (CBL-Mariner) Unknown Unknown Base: 6.6
Temporal: 6.6
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.25.1-3
Unknown None
CBL Mariner 2.0 ARM opensc (CBL-Mariner) Unknown Unknown Base: 6.6
Temporal: 6.6
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.23.0-4
Unknown None
CBL Mariner 2.0 x64 opensc (CBL-Mariner) Unknown Unknown Base: 6.6
Temporal: 6.6
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.23.0-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40660 None

CVE-2024-50181 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-50181
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Dec-24    

Information published.


1.1    04-Mar-25    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-50181
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.173.1-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.173.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-50181 None

CVE-2024-56741 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56741
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    29-Jan-25    

Information published.


0.2    04-Mar-25    

Information published.


0.3    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56741
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56741 None

CVE-2024-39908 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39908
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    15-Oct-24    

Information published.


1.1    19-Dec-24    

Added ruby to Azure Linux 3.0 Added rubygem-rexml to Azure Linux 3.0


1.2    04-Mar-25    

Added rubygem-rexml to CBL-Mariner 2.0 Added ruby to Azure Linux 3.0 Added rubygem-rexml to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39908
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM ruby (CBL-Mariner)
rubygem-rexml (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
3.3.5-1

3.3.4-1
None
Azure Linux 3.0 x64 ruby (CBL-Mariner)
rubygem-rexml (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
3.3.5-1

3.3.4-1
None
CBL Mariner 2.0 ARM rubygem-rexml (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
3.2.7-4
Unknown None
CBL Mariner 2.0 x64 rubygem-rexml (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
3.2.7-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39908 None

CVE-2025-0840 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-0840
MITRE
NVD

Issuing CNA: cna@vuldb.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    16-Feb-25    

Information published.


0.2    05-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-0840
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2.37-11
Unknown None
CBL Mariner 2.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2.37-11
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-0840 None

CVE-2024-26973 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26973
MITRE
NVD

Issuing CNA: cve@kernel.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-May-24    

Information published.


1.1    29-Aug-24    

Information published.


1.2    30-Aug-24    

Information published.


1.3    31-Aug-24    

Information published.


1.4    01-Sep-24    

Information published.


1.5    02-Sep-24    

Information published.


1.6    03-Sep-24    

Information published.


1.7    05-Sep-24    

Information published.


1.8    06-Sep-24    

Information published.


1.9    07-Sep-24    

Information published.


2.0    08-Sep-24    

Information published.


2.1    11-Sep-24    

Information published.


2.2    05-Mar-25    

Added hyperv-daemons to CBL-Mariner 2.0 Added hyperv-daemons to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26973
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1
Unknown None
Azure Linux 3.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1
Unknown None
CBL Mariner 2.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.158.1-1
Unknown None
CBL Mariner 2.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.158.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26973 None

CVE-2024-53150 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53150
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    29-Jan-25    

Information published.


0.2    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53150
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53150 None

CVE-2024-53151 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53151
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    29-Jan-25    

Information published.


0.2    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53151
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53151 None

CVE-2024-53215 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53215
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53215
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53215 None

CVE-2024-53180 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-53180
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    29-Jan-25    

Information published.


0.2    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-53180
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-53180 None

CVE-2024-56568 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56568
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56568
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56568 None

CVE-2024-56567 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56567
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    29-Jan-25    

Information published.


0.2    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56567
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56567 None

CVE-2024-56598 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56598
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56598
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56598 None

CVE-2024-56634 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56634
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56634
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56634 None

CVE-2024-56640 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56640
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56640
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56640 None

CVE-2024-56720 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56720
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    29-Jan-25    

Information published.


0.2    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56720
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56720 None

CVE-2024-56754 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-56754
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    29-Jan-25    

Information published.


0.2    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-56754
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.64.2-1
Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-56754 None

CVE-2024-57802 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57802
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57802
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57802 None

CVE-2024-57807 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57807
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
0.1    08-Mar-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-57807
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.176.3-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-57807 None

CVE-2024-57900 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-57900
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary: