Msrc Cbl Mariner 2.0 Arm vulnerabilities
1,677 known vulnerabilities affecting msrc/cbl_mariner_2.0_arm.
Total CVEs
1,677
CISA KEV
8
actively exploited
Public exploits
14
Exploited in wild
8
Severity breakdown
CRITICAL92HIGH705MEDIUM842LOW38
Vulnerabilities
Page 1 of 84
CVE-2025-25199HIGHCVSS 7.52025-02-11
CVE-2025-25199 [HIGH] CWE-401 BCryptGenerateSymmetricKey memory leak
BCryptGenerateSymmetricKey memory leak
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2025-25199
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the o
msrc
CVE-2023-32002HIGHCVSS 9.82025-02-11
CVE-2023-32002 [CRITICAL] HackerOne: CVE-2023-32002 Node.js `Module._load()` policy Remote Code Execution Vulnerability
HackerOne: CVE-2023-32002 Node.js `Module._load()` policy Remote Code Execution Vulnerability
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2023-32002
FAQ: Why is this HackerOne CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in Node.js software which is consumed by Microsoft Visual Studio. It is being documented in the Security U
msrc
CVE-2007-4559CRITICALCVSS 9.82024-12-10
CVE-2007-4559 [CRITICAL] CVE-2007-4559: NIST NVD Details: https://nvd
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2007-4559
Mariner: Mariner
[email protected]: [email protected]
Customer Action Required: Yes
Exploit Status: DOS:N/A
Remediation: python3
Reference: https://nvd.nist.gov/vuln/detail/CVE-2007-4559
Remediation: python2
msrc
CVE-2024-50074HIGHCVSS 7.82024-12-10
CVE-2024-50074 [HIGH] CVE-2024-50074: NIST NVD Details: https://nvd
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-50074
Mariner: Mariner
416baaa9-dc9f-4396-8d5f-8c081fb06d67: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Customer Action Required: Yes
Exploit Status: DOS:N/A
Remediation: kernel
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-50074
msrc
CVE-2024-2881HIGHCVSS 8.82024-12-10
CVE-2024-2881 [MEDIUM] CVE-2024-2881: NIST NVD Details: https://nvd
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-2881
Mariner: Mariner
[email protected]: [email protected]
Customer Action Required: Yes
Exploit Status: DOS:N/A
Remediation: mariadb
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-2881
msrc
CVE-2024-38472HIGHCVSS 7.5PoC2024-12-10
CVE-2024-38472 [HIGH] CVE-2024-38472: NIST NVD Details: https://nvd
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-38472
Mariner: Mariner
[email protected]: [email protected]
Customer Action Required: Yes
Exploit Status: DOS:N/A
Remediation: httpd
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-38472
msrc
CVE-2024-49966HIGHCVSS 7.82024-12-10
CVE-2024-49966 [HIGH] CVE-2024-49966: NIST NVD Details: https://nvd
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-49966
Mariner: Mariner
416baaa9-dc9f-4396-8d5f-8c081fb06d67: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Customer Action Required: Yes
Exploit Status: DOS:N/A
Remediation: kernel
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-49966
msrc
CVE-2024-49967HIGHCVSS 7.82024-12-10
CVE-2024-49967 [HIGH] CVE-2024-49967: NIST NVD Details: https://nvd
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-49967
Mariner: Mariner
416baaa9-dc9f-4396-8d5f-8c081fb06d67: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Customer Action Required: Yes
Exploit Status: DOS:N/A
Remediation: kernel
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-49967
msrc
CVE-2024-42072HIGHCVSS 7.82024-12-10
CVE-2024-42072 [HIGH] CVE-2024-42072: NIST NVD Details: https://nvd
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-42072
Mariner: Mariner
416baaa9-dc9f-4396-8d5f-8c081fb06d67: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Customer Action Required: Yes
Exploit Status: DOS:N/A
Remediation: kernel
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-42072
msrc
CVE-2024-43790MEDIUMCVSS 4.52024-12-10
CVE-2024-43790 [MEDIUM] CVE-2024-43790: NIST NVD Details: https://nvd
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-43790
Mariner: Mariner
[email protected]: [email protected]
Customer Action Required: Yes
Exploit Status: DOS:N/A
Remediation: vim
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-43790
msrc
CVE-2024-45159CRITICALCVSS 9.82024-11-12
CVE-2024-45159 [CRITICAL] CVE-2024-45159: NIST NVD Details: https://nvd
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-45159
Mariner: Mariner
[email protected]: [email protected]
Customer Action Required: Yes
Remediation: hvloader
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-45159
msrc
CVE-2024-30166CRITICALCVSS 9.12024-11-12
CVE-2024-30166 [CRITICAL] CVE-2024-30166: NIST NVD Details: https://nvd
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-30166
Mariner: Mariner
[email protected]: [email protected]
Customer Action Required: Yes
Remediation: hvloader
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-30166
msrc
CVE-2024-11236CRITICALCVSS 9.82024-11-12
CVE-2024-11236 [CRITICAL] CWE-787 Integer overflow in the firebird and dblib quoters causing OOB writes
Integer overflow in the firebird and dblib quoters causing OOB writes
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the op
msrc
CVE-2024-8932CRITICALCVSS 9.82024-11-12
CVE-2024-8932 [CRITICAL] CWE-787 OOB access in ldap_escape
OOB access in ldap_escape
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transpar
msrc
CVE-2024-5535CRITICALCVSS 9.12024-11-12
CVE-2024-5535 [CRITICAL] CWE-1395 OpenSSL: CVE-2024-5535 SSL_select_next_proto buffer overread
OpenSSL: CVE-2024-5535 SSL_select_next_proto buffer overread
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2024-5535
Description: We are republishing this OpenSSL CVE to document that the latest version Microsoft Defender for Endpoint has been updated to protect against this OpenSSL library vulnerability.
FAQ: How could an attacker exploit this vulnerability?
Exploitation of this vulnerabil
msrc
CVE-2024-11233HIGHCVSS 8.22024-11-12
CVE-2024-11233 [MEDIUM] CWE-122 Single byte overread with convert.quoted-printable-decode filter
Single byte overread with convert.quoted-printable-decode filter
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source li
msrc
CVE-2024-50143HIGHCVSS 7.82024-11-12
CVE-2024-50143 [HIGH] udf: fix uninit-value use in udf_get_fileshortad
udf: fix uninit-value use in udf_get_fileshortad
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed.
msrc
CVE-2024-50230HIGHCVSS 7.82024-11-12
CVE-2024-50230 [HIGH] nilfs2: fix kernel bug due to missing clearing of checked flag
nilfs2: fix kernel bug due to missing clearing of checked flag
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with w
msrc
CVE-2024-50247HIGHCVSS 7.12024-11-12
CVE-2024-50247 [HIGH] fs/ntfs3: Check if more than chunk-size bytes are written
fs/ntfs3: Check if more than chunk-size bytes are written
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the d
msrc
CVE-2024-50193HIGHCVSS 7.12024-11-12
CVE-2024-50193 [HIGH] x86/entry_32: Clear CPU buffers after register restore in NMI return
x86/entry_32: Clear CPU buffers after register restore in NMI return
FAQ: Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?
One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libr
msrc
1 / 84Next →