<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Newest  Plugins from Tenable</title>
        <link>https://www.tenable.com/plugins/feeds?sort=newest&amp;type=</link>
        <description>Get the latest plugin updates from Tenable</description>
        <lastBuildDate>Tue, 14 Apr 2026 16:25:17 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Tenable Plugins</generator>
        <image>
            <title>Newest  Plugins from Tenable</title>
            <url>https://www.tenable.com/themes/custom/tenable/img/favicons/apple-touch-icon.png</url>
            <link>https://www.tenable.com/plugins/feeds?sort=newest&amp;type=</link>
        </image>
        <copyright>Copyright 2026 Tenable, Inc. All rights reserved.</copyright>
        <atom:link href="https://www.tenable.com/plugins/feeds?sort=newest&amp;type=" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[Siemens (CVE-2020-26145)]]></title>
            <link>https://www.tenable.com/plugins/ot/505319</link>
            <guid>https://www.tenable.com/plugins/ot/505319</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Tenable OT Security Plugin ID 505319 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote OT asset is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.<br /></span><span><br /></span><span>This plugin only works with Tenable.ot.<br /></span><span>Please visit https://www.tenable.com/products/tenable-ot for more information.<br /></span>
      <h3>Solution</h3>
      <span>Refer to the vendor advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/ot/505319">https://www.tenable.com/plugins/ot/505319</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : golang-github-openprinting-ipp-usb (RHSA-2026:7992)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306360</link>
            <guid>https://www.tenable.com/plugins/nessus/306360</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306360 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for golang-github-openprinting-ipp-usb.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has a package installed that is affected by a vulnerability as referenced in the RHSA-2026:7992 advisory.<br /></span><span><br /></span><span>    HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables      driverless support for USB devices capable of using IPP-over-USB protocol.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL golang-github-openprinting-ipp-usb package based on the guidance in RHSA-2026:7992.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306360">https://www.tenable.com/plugins/nessus/306360</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 24.04 LTS : Redis, Lua vulnerabilities (USN-8169-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306359</link>
            <guid>https://www.tenable.com/plugins/nessus/306359</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306359 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 24.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8169-1 advisory.<br /></span><span><br /></span><span>    It was discovered that Redis incorrectly handled certain specially crafted Lua scripts. A remote attacker     could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only     addressed in lua5.1 on Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2025-49844)<br /></span><span><br /></span><span>    It was discovered that Redis incorrectly handled certain specially crafted Lua scripts. A remote attacker     could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only     addressed in lua-bitop on Ubuntu 20.04 LTS and Ubuntu 22.04 LTS and in redis on Ubuntu 16.04 LTS, Ubuntu     18.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-31449)<br /></span><span><br /></span><span>    Seiya Nakata and Yudai Fujiwara discovered that Redis incorrectly handled certain specially crafted Lua     scripts. An attacker could possibly use this issue to cause heap corruption and execute arbitrary code.<br /></span><span>    This issue was only addressed in lua-cjson on Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-24834)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306359">https://www.tenable.com/plugins/nessus/306359</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 8 : perl-XML-Parser (RLSA-2026:7681)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306358</link>
            <guid>https://www.tenable.com/plugins/nessus/306358</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306358 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:7681 advisory.<br /></span><span><br /></span><span>    * perl-xml-parser: XML::Parser: Memory corruption via deeply nested XML files (CVE-2006-10003)<br /></span><span><br /></span><span>    * perl-xml-parser: XML::Parser for Perl: Heap corruption and denial of service from crafted XML input     (CVE-2006-10002)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected perl-XML-Parser, perl-XML-Parser-debuginfo and / or perl-XML-Parser-debugsource packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306358">https://www.tenable.com/plugins/nessus/306358</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Libtiff PHSA-2026-5.0-0794]]></title>
            <link>https://www.tenable.com/plugins/nessus/306357</link>
            <guid>https://www.tenable.com/plugins/nessus/306357</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306357 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the libtiff package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306357">https://www.tenable.com/plugins/nessus/306357</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 4.0: Libtiff PHSA-2025-4.0-0870]]></title>
            <link>https://www.tenable.com/plugins/nessus/306356</link>
            <guid>https://www.tenable.com/plugins/nessus/306356</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306356 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the libtiff package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306356">https://www.tenable.com/plugins/nessus/306356</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 4.0: Libtiff PHSA-2026-4.0-0995]]></title>
            <link>https://www.tenable.com/plugins/nessus/306355</link>
            <guid>https://www.tenable.com/plugins/nessus/306355</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306355 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the libtiff package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306355">https://www.tenable.com/plugins/nessus/306355</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 4.0: Libpng PHSA-2026-4.0-0994]]></title>
            <link>https://www.tenable.com/plugins/nessus/306354</link>
            <guid>https://www.tenable.com/plugins/nessus/306354</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306354 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the libpng package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306354">https://www.tenable.com/plugins/nessus/306354</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 4.0: Nginx PHSA-2026-4.0-0994]]></title>
            <link>https://www.tenable.com/plugins/nessus/306353</link>
            <guid>https://www.tenable.com/plugins/nessus/306353</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306353 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the nginx package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306353">https://www.tenable.com/plugins/nessus/306353</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 4.0: Linux PHSA-2026-4.0-0959]]></title>
            <link>https://www.tenable.com/plugins/nessus/306352</link>
            <guid>https://www.tenable.com/plugins/nessus/306352</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306352 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the linux package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306352">https://www.tenable.com/plugins/nessus/306352</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 4.0: Libtiff PHSA-2026-4.0-0984]]></title>
            <link>https://www.tenable.com/plugins/nessus/306351</link>
            <guid>https://www.tenable.com/plugins/nessus/306351</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306351 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the libtiff package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306351">https://www.tenable.com/plugins/nessus/306351</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Docker PHSA-2026-5.0-0809]]></title>
            <link>https://www.tenable.com/plugins/nessus/306350</link>
            <guid>https://www.tenable.com/plugins/nessus/306350</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306350 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the docker package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306350">https://www.tenable.com/plugins/nessus/306350</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Sudo PHSA-2026-5.0-0815]]></title>
            <link>https://www.tenable.com/plugins/nessus/306349</link>
            <guid>https://www.tenable.com/plugins/nessus/306349</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306349 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the sudo package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306349">https://www.tenable.com/plugins/nessus/306349</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Libtiff PHSA-2026-5.0-0815]]></title>
            <link>https://www.tenable.com/plugins/nessus/306348</link>
            <guid>https://www.tenable.com/plugins/nessus/306348</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306348 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the libtiff package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306348">https://www.tenable.com/plugins/nessus/306348</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Python3 PHSA-2026-5.0-0813]]></title>
            <link>https://www.tenable.com/plugins/nessus/306347</link>
            <guid>https://www.tenable.com/plugins/nessus/306347</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306347 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the python3 package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306347">https://www.tenable.com/plugins/nessus/306347</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Perl PHSA-2026-5.0-0812]]></title>
            <link>https://www.tenable.com/plugins/nessus/306346</link>
            <guid>https://www.tenable.com/plugins/nessus/306346</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306346 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the perl package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306346">https://www.tenable.com/plugins/nessus/306346</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Vim PHSA-2026-5.0-0812]]></title>
            <link>https://www.tenable.com/plugins/nessus/306345</link>
            <guid>https://www.tenable.com/plugins/nessus/306345</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306345 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the vim package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306345">https://www.tenable.com/plugins/nessus/306345</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Libtiff PHSA-2025-5.0-0620]]></title>
            <link>https://www.tenable.com/plugins/nessus/306344</link>
            <guid>https://www.tenable.com/plugins/nessus/306344</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306344 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the libtiff package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306344">https://www.tenable.com/plugins/nessus/306344</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Nginx PHSA-2026-5.0-0811]]></title>
            <link>https://www.tenable.com/plugins/nessus/306343</link>
            <guid>https://www.tenable.com/plugins/nessus/306343</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306343 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the nginx package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306343">https://www.tenable.com/plugins/nessus/306343</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Systemd PHSA-2026-5.0-0819]]></title>
            <link>https://www.tenable.com/plugins/nessus/306342</link>
            <guid>https://www.tenable.com/plugins/nessus/306342</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306342 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the systemd package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306342">https://www.tenable.com/plugins/nessus/306342</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MiracleLinux 8 : vim-8.0.1763-22.el8_10.1.ML.1 (AXSA:2026-423:06)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306341</link>
            <guid>https://www.tenable.com/plugins/nessus/306341</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306341 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote MiracleLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote MiracleLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the AXSA:2026-423:06 advisory.<br /></span><span><br /></span><span>    * vim: Vim: Arbitrary code execution via OS command injection in the netrw plugin (CVE-2026-28417)<br /></span><span>      * vim: Vim: Denial of service and information disclosure via crafted swap file (CVE-2026-28421)<br /></span><span>      * vim: Vim: Arbitrary code execution via command injection in glob() function (CVE-2026-33412)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306341">https://www.tenable.com/plugins/nessus/306341</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : chromium (2026-952f3c3d9e)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306340</link>
            <guid>https://www.tenable.com/plugins/nessus/306340</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306340 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-952f3c3d9e advisory.<br /></span><span><br /></span><span>    Update to 147.0.7727.55<br /></span><span><br /></span><span>      * Critical CVE-2026-5858: Heap buffer overflow in WebML<br /></span><span>      * Critical CVE-2026-5859: Integer overflow in WebML<br /></span><span>      * High CVE-2026-5860: Use after free in WebRTC<br /></span><span>      * High CVE-2026-5861: Use after free in V8<br /></span><span>      * High CVE-2026-5862: Inappropriate implementation in V8<br /></span><span>      * High CVE-2026-5863: Inappropriate implementation in V8<br /></span><span>      * High CVE-2026-5864: Heap buffer overflow in WebAudio<br /></span><span>      * High CVE-2026-5865: Type Confusion in V8<br /></span><span>      * High CVE-2026-5866: Use after free in Media<br /></span><span>      * High CVE-2026-5867: Heap buffer overflow in WebML<br /></span><span>      * High CVE-2026-5868: Heap buffer overflow in ANGLE<br /></span><span>      * High CVE-2026-5869: Heap buffer overflow in WebML<br /></span><span>      * High CVE-2026-5870: Integer overflow in Skia<br /></span><span>      * High CVE-2026-5871: Type Confusion in V8<br /></span><span>      * High CVE-2026-5872: Use after free in Blink<br /></span><span>      * High CVE-2026-5873: Out of bounds read and write in V8<br /></span><span>      * Medium CVE-2026-5874: Use after free in PrivateAI<br /></span><span>      * Medium CVE-2026-5875: Policy bypass in Blink<br /></span><span>      * Medium CVE-2026-5876: Side-channel information leakage in Navigation<br /></span><span>      * Medium CVE-2026-5877: Use after free in Navigation<br /></span><span>      * Medium CVE-2026-5878: Incorrect security UI in Blink<br /></span><span>      * Medium CVE-2026-5879: Insufficient validation of untrusted input in ANGLE<br /></span><span>      * Medium CVE-2026-5880: Incorrect security UI in browser UI<br /></span><span>      * Medium CVE-2026-5881: Policy bypass in LocalNetworkAccess<br /></span><span>      * Medium CVE-2026-5882: Incorrect security UI in Fullscreen<br /></span><span>      * Medium CVE-2026-5883: Use after free in Media<br /></span><span>      * Medium CVE-2026-5884: Insufficient validation of untrusted input in Media<br /></span><span>      * Medium CVE-2026-5885: Insufficient validation of untrusted input in WebML<br /></span><span>      * Medium CVE-2026-5886: Out of bounds read in WebAudio<br /></span><span>      * Medium CVE-2026-5887: Insufficient validation of untrusted input in Downloads<br /></span><span>      * Medium CVE-2026-5888: Uninitialized Use in WebCodecs<br /></span><span>      * Medium CVE-2026-5889: Cryptographic Flaw in PDFium<br /></span><span>      * Medium CVE-2026-5890: Race in WebCodecs<br /></span><span>      * Medium CVE-2026-5891: Insufficient policy enforcement in browser UI<br /></span><span>      * Medium CVE-2026-5892: Insufficient policy enforcement in PWAs<br /></span><span>      * Medium CVE-2026-5893: Race in V8<br /></span><span>      * Low CVE-2026-5894: Inappropriate implementation in PDF<br /></span><span>      * Low CVE-2026-5895: Incorrect security UI in Omnibox<br /></span><span>      * Low CVE-2026-5896: Policy bypass in Audio<br /></span><span>      * Low CVE-2026-5897: Incorrect security UI in Downloads<br /></span><span>      * Low CVE-2026-5898: Incorrect security UI in Omnibox<br /></span><span>      * Low CVE-2026-5899: Incorrect security UI in History Navigation<br /></span><span>      * Low CVE-2026-5900: Policy bypass in Downloads<br /></span><span>      * Low CVE-2026-5901: Policy bypass in DevTools<br /></span><span>      * Low CVE-2026-5902: Race in Media<br /></span><span>      * Low CVE-2026-5903: Policy bypass in IFrameSandbox<br /></span><span>      * Low CVE-2026-5904: Use after free in V8<br /></span><span>      * Low CVE-2026-5905: Incorrect security UI in Permissions<br /></span><span>      * Low CVE-2026-5906: Incorrect security UI in Omnibox<br /></span><span>      * Low CVE-2026-5907: Insufficient data validation in Media<br /></span><span>      * Low CVE-2026-5908: Integer overflow in Media<br /></span><span>      * Low CVE-2026-5909: Integer overflow in Media<br /></span><span>      * Low CVE-2026-5910: Integer overflow in Media<br /></span><span>      * Low CVE-2026-5911: Policy bypass in ServiceWorkers<br /></span><span>      * Low CVE-2026-5912: Integer overflow in WebRTC<br /></span><span>      * Low CVE-2026-5913: Out of bounds read in Blink<br /></span><span>      * Low CVE-2026-5914: Type Confusion in CSS<br /></span><span>      * Low CVE-2026-5915: Insufficient validation of untrusted input in WebML<br /></span><span>      * Low CVE-2026-5918: Inappropriate implementation in Navigation<br /></span><span>      * Low CVE-2026-5919: Insufficient validation of untrusted input in WebSockets<br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected chromium package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306340">https://www.tenable.com/plugins/nessus/306340</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : flatpak (2026-5286084b44)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306339</link>
            <guid>https://www.tenable.com/plugins/nessus/306339</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306339 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-5286084b44 advisory.<br /></span><span><br /></span><span>    Update to 1.16.6<br /></span><span><br /></span><span>    Fixes for CVE-2026-34078, CVE-2026-34079, GHSA-2fxp-43j9-pwvc and GHSA-89xm-3m96-w3jg<br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected flatpak package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306339">https://www.tenable.com/plugins/nessus/306339</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 19 for SUSE Linux Enterprise 15 SP6) (SUSE-SU-2026:1274-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306338</link>
            <guid>https://www.tenable.com/plugins/nessus/306338</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306338 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1274-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.84 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>    The following non security issue was fixed:<br /></span><span><br /></span><span>    - Fix NULL pointer dereference in smb2_query_server_interfaces Livepatch for to restore a null check of       server->ops->query_server_interfaces that was dropped by mistake. (bsc#1259896 bsc#1259962).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150600_23_84-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306338">https://www.tenable.com/plugins/nessus/306338</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) (SUSE-SU-2026:1269-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306337</link>
            <guid>https://www.tenable.com/plugins/nessus/306337</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306337 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1269-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.153 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150400_24_153-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306337">https://www.tenable.com/plugins/nessus/306337</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP7) (SUSE-SU-2026:1262-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306336</link>
            <guid>https://www.tenable.com/plugins/nessus/306336</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306336 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1262-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150700.53.31 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>    The following non security issue was fixed:<br /></span><span><br /></span><span>    - Fix NULL pointer dereference in smb2_query_server_interfaces Livepatch for to restore a null check of       server->ops->query_server_interfaces that was dropped by mistake. (bsc#1259896 bsc#1259962).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150700_53_31-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306336">https://www.tenable.com/plugins/nessus/306336</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP7) (SUSE-SU-2026:1284-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306335</link>
            <guid>https://www.tenable.com/plugins/nessus/306335</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306335 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1284-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150700.53.25 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150700_53_25-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306335">https://www.tenable.com/plugins/nessus/306335</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) (SUSE-SU-2026:1298-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306334</link>
            <guid>https://www.tenable.com/plugins/nessus/306334</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306334 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1298-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 4.12.14-122.272 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2023-53794: cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1255235).<br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kgraft-patch-4_12_14-122_272-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306334">https://www.tenable.com/plugins/nessus/306334</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) (SUSE-SU-2026:1283-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306333</link>
            <guid>https://www.tenable.com/plugins/nessus/306333</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306333 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1283-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.60 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253404).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150600_23_60-default and / or kernel-livepatch-6_4_0-150700_51-default packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306333">https://www.tenable.com/plugins/nessus/306333</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4) (SUSE-SU-2026:1280-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306332</link>
            <guid>https://www.tenable.com/plugins/nessus/306332</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306332 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1280-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.167 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150400_24_167-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306332">https://www.tenable.com/plugins/nessus/306332</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : openssl-1_1 (SUSE-SU-2026:1290-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306331</link>
            <guid>https://www.tenable.com/plugins/nessus/306331</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306331 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1290-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-28387: Potential use-after-free in DANE client code (bsc#1260441).<br /></span><span>    - CVE-2026-28388: NULL Pointer Dereference When Processing a Delta CRL (bsc#1260442).<br /></span><span>    - CVE-2026-28389: Possible NULL dereference when processing CMS KeyAgreeRecipientInfo (bsc#1260443).<br /></span><span>    - CVE-2026-31789: Heap buffer overflow in hexadecimal conversion (bsc#1260444).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306331">https://www.tenable.com/plugins/nessus/306331</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : MozillaFirefox (SUSE-SU-2026:1273-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306330</link>
            <guid>https://www.tenable.com/plugins/nessus/306330</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306330 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1273-1 advisory.<br /></span><span><br /></span><span>    - Update to 149.0.2 and 140.9.1esr (bsc#1261663).<br /></span><span>    - CVE-2026-5731: Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird ESR     140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2.<br /></span><span>    - CVE-2026-5732: Incorrect boundary conditions, integer overflow in the Graphics: Text component.<br /></span><span>    - CVE-2026-5734: Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2     and Thunderbird 149.0.2.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected MozillaFirefox, MozillaFirefox-devel and / or MozillaFirefox-translations-common packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306330">https://www.tenable.com/plugins/nessus/306330</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 14 for SUSE Linux Enterprise 15 SP6) (SUSE-SU-2026:1271-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306329</link>
            <guid>https://www.tenable.com/plugins/nessus/306329</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306329 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1271-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.65 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253404).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150600_23_65-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306329">https://www.tenable.com/plugins/nessus/306329</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : nodejs24 (SUSE-SU-2026:1299-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306328</link>
            <guid>https://www.tenable.com/plugins/nessus/306328</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306328 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1299-1 advisory.<br /></span><span><br /></span><span>    - Update to 24.14.1<br /></span><span>    - CVE-2026-21637: synchronous exceptions thrown during certain callbacks bypass the standard TLS error     handling paths and can cause a denial of service (bsc#1256576).<br /></span><span>    - CVE-2026-21710: uncaught TypeError exception can cause a denial of service (bsc#1260455).<br /></span><span>    - CVE-2026-21712: malformed URL format can lead to a crash (bsc#1260460).<br /></span><span>    - CVE-2026-21713: timing side-channel in HMAC verification via memcmp can lead to potential MAC forgery     (bsc#1260463).<br /></span><span>    - CVE-2026-21714: WINDOW_UPDATE frames on stream 0 can lead to memory leak (bsc#1260480).<br /></span><span>    - CVE-2026-21715: permission model bypass in realpathSync.native can allow file existence disclosure     (bsc#1260482).<br /></span><span>    - CVE-2026-21716: promise-based FileHandle methods can be used to modify file permissions and ownership     (bsc#1260462).<br /></span><span>    - CVE-2026-21717: crafted request can lead to trivially predictable hash collisions (bsc#1260494).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected nodejs24, nodejs24-devel, nodejs24-docs and / or npm24 packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306328">https://www.tenable.com/plugins/nessus/306328</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) (SUSE-SU-2026:1259-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306327</link>
            <guid>https://www.tenable.com/plugins/nessus/306327</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306327 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1259-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.42 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253404).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150600_23_42-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306327">https://www.tenable.com/plugins/nessus/306327</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 46 for SUSE Linux Enterprise 15 SP4) (SUSE-SU-2026:1265-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306326</link>
            <guid>https://www.tenable.com/plugins/nessus/306326</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306326 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1265-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.184 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150400_24_184-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306326">https://www.tenable.com/plugins/nessus/306326</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5) (SUSE-SU-2026:1270-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306325</link>
            <guid>https://www.tenable.com/plugins/nessus/306325</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306325 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1270-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150500.55.130 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150500_55_130-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306325">https://www.tenable.com/plugins/nessus/306325</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 38 for SUSE Linux Enterprise 15 SP4) (SUSE-SU-2026:1268-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306324</link>
            <guid>https://www.tenable.com/plugins/nessus/306324</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306324 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1268-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.158 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150400_24_158-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306324">https://www.tenable.com/plugins/nessus/306324</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7) (SUSE-SU-2026:1279-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306323</link>
            <guid>https://www.tenable.com/plugins/nessus/306323</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306323 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1279-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150700.53.28 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150700_53_28-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306323">https://www.tenable.com/plugins/nessus/306323</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : kernel (Live Patch 68 for SUSE Linux Enterprise 12 SP5) (SUSE-SU-2026:1285-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306322</link>
            <guid>https://www.tenable.com/plugins/nessus/306322</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306322 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1285-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 4.12.14-122.258 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2023-53794: cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1255235).<br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kgraft-patch-4_12_14-122_258-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306322">https://www.tenable.com/plugins/nessus/306322</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : GraphicsMagick (SUSE-SU-2026:1300-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306321</link>
            <guid>https://www.tenable.com/plugins/nessus/306321</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306321 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1300-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-26284: heap overflow in pcd decoder leads to out of bounds read (bsc#1258765).<br /></span><span>    - CVE-2026-28690: missing bounds check in the MNG encoder can lead to a stack buffer overflow     (bsc#1259456).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306321">https://www.tenable.com/plugins/nessus/306321</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) (SUSE-SU-2026:1281-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306320</link>
            <guid>https://www.tenable.com/plugins/nessus/306320</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306320 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1281-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.170 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150400_24_170-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306320">https://www.tenable.com/plugins/nessus/306320</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : kernel (Live Patch 75 for SUSE Linux Enterprise 12 SP5) (SUSE-SU-2026:1293-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306319</link>
            <guid>https://www.tenable.com/plugins/nessus/306319</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306319 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1293-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 4.12.14-122.283 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2023-53794: cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1255235).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kgraft-patch-4_12_14-122_283-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306319">https://www.tenable.com/plugins/nessus/306319</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) (SUSE-SU-2026:1263-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306318</link>
            <guid>https://www.tenable.com/plugins/nessus/306318</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306318 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1263-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150500.55.103 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150500_55_103-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306318">https://www.tenable.com/plugins/nessus/306318</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : kernel (Live Patch 77 for SUSE Linux Enterprise 12 SP5) (SUSE-SU-2026:1294-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306317</link>
            <guid>https://www.tenable.com/plugins/nessus/306317</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306317 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1294-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 4.12.14-122.293 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2023-53794: cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1255235).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kgraft-patch-4_12_14-122_293-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306317">https://www.tenable.com/plugins/nessus/306317</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP6) (SUSE-SU-2026:1266-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306316</link>
            <guid>https://www.tenable.com/plugins/nessus/306316</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306316 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1266-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.87 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>    The following non security issue was fixed:<br /></span><span><br /></span><span>    - Fix NULL pointer dereference in smb2_query_server_interfaces Livepatch for to restore a null check of       server->ops->query_server_interfaces that was dropped by mistake. (bsc#1259896 bsc#1259962).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150600_23_87-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306316">https://www.tenable.com/plugins/nessus/306316</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : kernel (Live Patch 70 for SUSE Linux Enterprise 12 SP5) (SUSE-SU-2026:1287-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306315</link>
            <guid>https://www.tenable.com/plugins/nessus/306315</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306315 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1287-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 4.12.14-122.266 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2023-53794: cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1255235).<br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kgraft-patch-4_12_14-122_266-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306315">https://www.tenable.com/plugins/nessus/306315</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) (SUSE-SU-2026:1297-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306314</link>
            <guid>https://www.tenable.com/plugins/nessus/306314</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306314 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1297-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 4.12.14-122.269 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2023-53794: cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1255235).<br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kgraft-patch-4_12_14-122_269-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306314">https://www.tenable.com/plugins/nessus/306314</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) (SUSE-SU-2026:1278-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306313</link>
            <guid>https://www.tenable.com/plugins/nessus/306313</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306313 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1278-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150700.53.19 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253404).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150700_53_19-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306313">https://www.tenable.com/plugins/nessus/306313</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 / openSUSE 15 Security Update : openssl-1_0_0 (SUSE-SU-2026:1291-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306312</link>
            <guid>https://www.tenable.com/plugins/nessus/306312</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306312 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1291-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-28387: Potential use-after-free in DANE client code (bsc#1260441).<br /></span><span>    - CVE-2026-28388: NULL Pointer Dereference When Processing a Delta CRL (bsc#1260442).<br /></span><span>    - CVE-2026-28389: Possible NULL dereference when processing CMS KeyAgreeRecipientInfo (bsc#1260443).<br /></span><span>    - CVE-2026-31789: Heap buffer overflow in hexadecimal conversion (bsc#1260444).<br /></span><span>    - CVE-2026-31790: Incorrect failure handling in RSA KEM RSASVE encapsulation (bsc#1260445).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306312">https://www.tenable.com/plugins/nessus/306312</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 18 for SUSE Linux Enterprise 15 SP6) (SUSE-SU-2026:1272-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306311</link>
            <guid>https://www.tenable.com/plugins/nessus/306311</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306311 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1272-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.81 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150600_23_81-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306311">https://www.tenable.com/plugins/nessus/306311</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : kernel (Live Patch 74 for SUSE Linux Enterprise 12 SP5) (SUSE-SU-2026:1288-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306310</link>
            <guid>https://www.tenable.com/plugins/nessus/306310</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306310 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1288-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 4.12.14-122.280 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2023-53794: cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1255235).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kgraft-patch-4_12_14-122_280-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306310">https://www.tenable.com/plugins/nessus/306310</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 / openSUSE 15 Security Update : python312 (SUSE-SU-2026:1292-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306309</link>
            <guid>https://www.tenable.com/plugins/nessus/306309</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306309 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1292-1 advisory.<br /></span><span><br /></span><span>    - CVE-2025-13462: incorrect parsing of TarInfo when GNU long name and type AREGTYPE are combined can lead     to       misinterpretation of tar archives (bsc#1259611).<br /></span><span>    - CVE-2026-3479: improper resource argument validation in `pkgutil.get_data()` can lead to path traversal     (bsc#1259989).<br /></span><span>    - CVE-2026-3644: incomplete control character validation in http.cookies can lead to input validation     bypass       (bsc#1259734).<br /></span><span>    - CVE-2026-4224: parsing XML with deeply nested DTD content models can lead to C stack overflow     (bsc#1259735).<br /></span><span>    - CVE-2026-4519: failure to sanitize leading dashes in URLs in the `webbrowser.open()` API can lead to web     browser       command line option injection (bsc#1260026).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306309">https://www.tenable.com/plugins/nessus/306309</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP5) (SUSE-SU-2026:1258-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306308</link>
            <guid>https://www.tenable.com/plugins/nessus/306308</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306308 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1258-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150500.55.136 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150500_55_136-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306308">https://www.tenable.com/plugins/nessus/306308</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 17 for SUSE Linux Enterprise 15 SP6) (SUSE-SU-2026:1261-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306307</link>
            <guid>https://www.tenable.com/plugins/nessus/306307</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306307 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1261-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.78 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253404).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150600_23_78-default and / or kernel-livepatch-6_4_0-150700_53_22-default packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306307">https://www.tenable.com/plugins/nessus/306307</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 / openSUSE 15 Security Update : python39 (SUSE-SU-2026:1296-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306306</link>
            <guid>https://www.tenable.com/plugins/nessus/306306</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306306 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1296-1 advisory.<br /></span><span><br /></span><span>    - CVE-2025-13462: incorrect parsing of TarInfo when GNU long name and type AREGTYPE are combined can lead     to       misinterpretation of tar archives (bsc#1259611).<br /></span><span>    - CVE-2026-3644: incomplete control character validation in http.cookies can lead to input validation     bypass       (bsc#1259734).<br /></span><span>    - CVE-2026-4224: parsing XML with deeply nested DTD content models can lead to C stack overflow     (bsc#1259735).<br /></span><span>    - CVE-2026-4519: failure to sanitize leading dashes in URLs in the `webbrowser.open()` API can lead to web     browser       command line option injection (bsc#1260026).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306306">https://www.tenable.com/plugins/nessus/306306</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : bind9.18 (RHSA-2026:7915)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306305</link>
            <guid>https://www.tenable.com/plugins/nessus/306305</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306305 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for bind9.18.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:7915 advisory.<br /></span><span><br /></span><span>    BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND     includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for     applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating     properly.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone (CVE-2026-1519)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL bind9.18 package based on the guidance in RHSA-2026:7915.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306305">https://www.tenable.com/plugins/nessus/306305</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 22.04 LTS / 25.10 : Corosync vulnerabilities (USN-8170-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306304</link>
            <guid>https://www.tenable.com/plugins/nessus/306304</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306304 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 22.04 LTS / 25.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8170-1 advisory.<br /></span><span><br /></span><span>    It was discovered that Corosync incorrectly handled the membership commit token validity check. A remote     attacker could use this issue to cause Corosync to crash, resulting in a denial of service, or to possibly     obtain a small quantity of sensitive information. (CVE-2026-35091)<br /></span><span><br /></span><span>    It was discovered that Corosync incorrectly handled join message validation. A remote attacker could     possibly use this issue to cause Corosync to crash, resulting in a denial of service. (CVE-2026-35092)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306304">https://www.tenable.com/plugins/nessus/306304</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : libtiff, --advisory ALAS2-2026-3235 (ALAS-2026-3235)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306303</link>
            <guid>https://www.tenable.com/plugins/nessus/306303</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306303 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of libtiff installed on the remote host is prior to 4.0.3-35. It is, therefore, affected by a vulnerability as referenced in the ALAS2-2026-3235 advisory.<br /></span><span><br /></span><span>    A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow     vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This     flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially     causing a denial of service (application crash) or arbitrary code execution. (CVE-2026-4775)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update libtiff' or   or 'yum update --advisory ALAS2-2026-3235' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306303">https://www.tenable.com/plugins/nessus/306303</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : cri-tools, --advisory ALAS2-2026-3236 (ALAS-2026-3236)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306302</link>
            <guid>https://www.tenable.com/plugins/nessus/306302</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306302 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of cri-tools installed on the remote host is prior to 1.32.0-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3236 advisory.<br /></span><span><br /></span><span>    The Delete function fails to properly validate offsets when processing malformed JSON input. This can lead     to a negative slice index and a runtime panic, allowing a denial of service attack. (CVE-2026-32285)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update cri-tools' or   or 'yum update --advisory ALAS2-2026-3236' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306302">https://www.tenable.com/plugins/nessus/306302</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : libpng12, --advisory ALAS2-2026-3243 (ALAS-2026-3243)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306301</link>
            <guid>https://www.tenable.com/plugins/nessus/306301</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306301 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of libpng12 installed on the remote host is prior to 1.2.50-10. It is, therefore, affected by a vulnerability as referenced in the ALAS2-2026-3243 advisory.<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE`     each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across     two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng     1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS`     sets `png_ptr->trans_alpha = info_ptr->trans_alpha` (256-byte buffer) and `png_set_PLTE` sets     `info_ptr->palette = png_ptr->palette` (768-byte buffer). In both cases, calling `png_free_data` (with     `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr`     pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to     the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both     functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes     the issue.<br /></span><span><br /></span><span>    NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7jNOTE:<br /></span><span>    https://github.com/pnggroup/libpng/pull/824NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/23019269764e35ed8458e517f1897bd3c54820eb (v1.6.56)NOTE: Fixed     by: https://github.com/pnggroup/libpng/commit/a3a21443ed12bfa1ef46fa0d4fb2b74a0fa34a25 (v1.6.56)NOTE:<br /></span><span>    Fixed by: https://github.com/pnggroup/libpng/commit/7ea9eea884a2328cc7fdcb3c0c00246a50d90667     (v1.6.56)NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/c1b0318b393c90679e6fa5bc1d329fd5d5012ec1 (v1.6.56)     (CVE-2026-33416)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update libpng12' or   or 'yum update --advisory ALAS2-2026-3243' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306301">https://www.tenable.com/plugins/nessus/306301</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : squid, --advisory ALAS2-2026-3242 (ALAS-2026-3242)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306300</link>
            <guid>https://www.tenable.com/plugins/nessus/306300</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306300 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of squid installed on the remote host is prior to 3.5.20-17. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3242 advisory.<br /></span><span><br /></span><span>    Squid is a caching proxy for the Web. Prior to version 7.5, due to premature release of resource during     expected lifetime and heap Use-After-Free bugs, Squid is vulnerable to Denial of Service when handling ICP     traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service     attack against the Squid service using ICP protocol. This attack is limited to Squid deployments that     explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem _cannot_ be mitigated by     denying ICP queries using `icp_access` rules. This bug is fixed in Squid version 7.5.<br /></span><span><br /></span><span>    NOTE: https://www.openwall.com/lists/oss-security/2026/03/25/3NOTE: Fixed by: https://github.com/squid-     cache/squid/commit/703e07d25ca6fa11f52d20bf0bb879e22ab7481b (SQUID_7_5) (CVE-2026-32748)<br /></span><span><br /></span><span>    Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-After-Free, Squid is     vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to     perform a reliable and repeatable Denial of Service attack against the Squid service using ICP protocol.<br /></span><span>    This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero     `icp_port`). This problem _cannot_ be mitigated by denying ICP queries using `icp_access` rules. Version     7.5 contains a patch.<br /></span><span><br /></span><span>    NOTE: https://www.openwall.com/lists/oss-security/2026/03/25/2NOTE: Fixed by: https://github.com/squid-     cache/squid/commit/8a7d42f9d44befb8fcbbb619505587c8de6a1e91 (SQUID_7_5) (CVE-2026-33526)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update squid' or   or 'yum update --advisory ALAS2-2026-3242' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306300">https://www.tenable.com/plugins/nessus/306300</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : amazon-ecr-credential-helper, --advisory ALAS2ECS-2026-103 (ALASECS-2026-103)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306299</link>
            <guid>https://www.tenable.com/plugins/nessus/306299</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306299 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of amazon-ecr-credential-helper installed on the remote host is prior to 0.12.0-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2ECS-2026-103 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update amazon-ecr-credential-helper' or   or 'yum update --advisory ALAS2ECS-2026-103' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306299">https://www.tenable.com/plugins/nessus/306299</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : libvncserver, --advisory ALAS2-2026-3247 (ALAS-2026-3247)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306298</link>
            <guid>https://www.tenable.com/plugins/nessus/306298</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306298 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of libvncserver installed on the remote host is prior to 0.9.9-14. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3247 advisory.<br /></span><span><br /></span><span>    LibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read     vulnerability in the UltraZip encoding handler that allows a malicious VNC server to cause information     disclosure or application crash. Attackers can exploit improper bounds checking in the HandleUltraZipBPP()     function by manipulating subrectangle header counts to read beyond the allocated heap buffer.<br /></span><span>    (CVE-2026-32853)<br /></span><span><br /></span><span>    LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference     vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote     attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit     missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null     pointer dereferences and crash the server when httpd and proxy features are enabled. (CVE-2026-32854)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update libvncserver' or   or 'yum update --advisory ALAS2-2026-3247' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306298">https://www.tenable.com/plugins/nessus/306298</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : oci-add-hooks, --advisory ALAS2NITRO-ENCLAVES-2026-096 (ALASNITRO-ENCLAVES-2026-096)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306297</link>
            <guid>https://www.tenable.com/plugins/nessus/306297</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306297 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of oci-add-hooks installed on the remote host is prior to 0-0.8.20200504git325a340. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2NITRO-ENCLAVES-2026-096 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update oci-add-hooks' or   or 'yum update --advisory ALAS2NITRO-ENCLAVES-2026-096' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306297">https://www.tenable.com/plugins/nessus/306297</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : rust, --advisory ALAS2-2026-3246 (ALAS-2026-3246)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306296</link>
            <guid>https://www.tenable.com/plugins/nessus/306296</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306296 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of rust installed on the remote host is prior to 1.94.0-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3246 advisory.<br /></span><span><br /></span><span>    A flaw in the gix-date library can generate invalid non-UTF8 strings, leading to undefined behavior when     processed. The most likely impact from a successful attack is to data integrity, by the malicious data     being able to corrupt data being hold in memory and to system availability as it eventually may lead to     the software using the gix_date library to crash. (CVE-2026-0810)<br /></span><span><br /></span><span>    tar-rs is a tar archive reading/writing library for Rust. Versions 0.4.44 and below have conditional logic     that skips the PAX size header in cases where the base header size is nonzero. As part of CVE-2025-62518,     the astral-tokio-tar project was changed to correctly honor PAX size headers in the case where it was     different from the base header. This is almost the inverse of the astral-tokio-tar issue. Any discrepancy     in how tar parsers honor file size can be used to create archives that appear differently when unpacked by     different archivers. In this case, the tar-rs (Rust tar) crate is an outlier in checking for the header     size - other tar parsers (including e.g. Go archive/tar) unconditionally use the PAX size override. This     can affect anything that uses the tar crate to parse archives and expects to have a consistent view with     other parsers. This issue has been fixed in version 0.4.45. (CVE-2026-33055)<br /></span><span><br /></span><span>    tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and below, when unpacking a     tar archive, the tar crate's unpack_dir function uses fs::metadata() to check whether a path that already     exists is a directory. Because fs::metadata() follows symbolic links, a crafted tarball containing a     symlink entry followed by a directory entry with the same name causes the crate to treat the symlink     target as a valid existing directory -- and subsequently apply chmod to it. This allows an attacker to     modify the permissions of arbitrary directories outside the extraction root. This issue has been fixed in     version 0.4.45. (CVE-2026-33056)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update rust' or   or 'yum update --advisory ALAS2-2026-3246' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306296">https://www.tenable.com/plugins/nessus/306296</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : openssl11, --advisory ALAS2-2026-3249 (ALAS-2026-3249)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306295</link>
            <guid>https://www.tenable.com/plugins/nessus/306295</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306295 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of openssl11 installed on the remote host is prior to 1.1.1zg-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3249 advisory.<br /></span><span><br /></span><span>    Potential use-after-free in DANE client code (CVE-2026-28387)<br /></span><span><br /></span><span>    NULL Pointer Dereference When Processing a Delta CRL<br /></span><span><br /></span><span>    NOTE: https://openssl-library.org/news/secadv/20260407.txt (CVE-2026-28388)<br /></span><span><br /></span><span>    Possible NULL dereference when processing CMS KeyAgreeRecipientInfo (CVE-2026-28389)<br /></span><span><br /></span><span>    Possible NULL dereference when processing CMS KeyTransportRecipientInfo (CVE-2026-28390)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update openssl11' or   or 'yum update --advisory ALAS2-2026-3249' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306295">https://www.tenable.com/plugins/nessus/306295</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : runc, --advisory ALAS2ECS-2026-105 (ALASECS-2026-105)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306294</link>
            <guid>https://www.tenable.com/plugins/nessus/306294</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306294 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of runc installed on the remote host is prior to 1.3.4-3. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2ECS-2026-105 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update runc' or   or 'yum update --advisory ALAS2ECS-2026-105' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306294">https://www.tenable.com/plugins/nessus/306294</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : containerd, --advisory ALAS2ECS-2026-102 (ALASECS-2026-102)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306293</link>
            <guid>https://www.tenable.com/plugins/nessus/306293</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306293 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of containerd installed on the remote host is prior to 2.1.5-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2ECS-2026-102 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update containerd' or   or 'yum update --advisory ALAS2ECS-2026-102' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306293">https://www.tenable.com/plugins/nessus/306293</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : gimp, --advisory ALAS2GIMP-2026-013 (ALASGIMP-2026-013)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306292</link>
            <guid>https://www.tenable.com/plugins/nessus/306292</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306292 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of gimp installed on the remote host is prior to 2.8.22-1. It is, therefore, affected by a vulnerability as referenced in the ALAS2GIMP-2026-013 advisory.<br /></span><span><br /></span><span>    A flaw was found in GIMP. This issue is a heap buffer over-read in GIMP's PCX file loader due to an off-     by-one error. A remote attacker could exploit this by convincing a user to open a specially crafted PCX     image. Successful exploitation could lead to out-of-bounds memory disclosure and a possible application     crash, resulting in a Denial of Service (DoS). (CVE-2026-4887)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update gimp' or   or 'yum update --advisory ALAS2GIMP-2026-013' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306292">https://www.tenable.com/plugins/nessus/306292</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : freerdp, --advisory ALAS2-2026-3238 (ALAS-2026-3238)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306291</link>
            <guid>https://www.tenable.com/plugins/nessus/306291</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306291 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of freerdp installed on the remote host is prior to 2.11.7-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3238 advisory.<br /></span><span><br /></span><span>    DoS via WINPR_ASSERT in rts_read_auth_verifier_no_checks<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4v4p-9v5x-hc93 (CVE-2026-33952)<br /></span><span><br /></span><span>    DoS via WINPR_ASSERT in IMA ADPCM audio decoder (dsp.c:331)<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8f2g-3q27-6xm5 (CVE-2026-33977)<br /></span><span><br /></span><span>    Progressive Codec Quant BYTE Underflow - UB + CPU DoS<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4gfm-4p52-h478 (CVE-2026-33983)<br /></span><span><br /></span><span>    ClearCodec resize_vbar_entry() Heap OOB Write<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8469-2xcx-frf6 (CVE-2026-33984)<br /></span><span><br /></span><span>    ClearCodec Glyph Cache Count Desync - Heap OOB Read<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x6gr-8p7h-5h85 (CVE-2026-33985)<br /></span><span><br /></span><span>    H.264 YUV Buffer Dimension Desync - Heap OOB Write<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h6qw-wxvm-hf97 (CVE-2026-33986)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update freerdp' or   or 'yum update --advisory ALAS2-2026-3238' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306291">https://www.tenable.com/plugins/nessus/306291</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : containerd, --advisory ALAS2DOCKER-2026-104 (ALASDOCKER-2026-104)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306290</link>
            <guid>https://www.tenable.com/plugins/nessus/306290</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306290 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of containerd installed on the remote host is prior to 2.1.5-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2DOCKER-2026-104 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update containerd' or   or 'yum update --advisory ALAS2DOCKER-2026-104' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306290">https://www.tenable.com/plugins/nessus/306290</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : docker, --advisory ALAS2DOCKER-2026-108 (ALASDOCKER-2026-108)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306289</link>
            <guid>https://www.tenable.com/plugins/nessus/306289</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306289 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of docker installed on the remote host is prior to 25.0.14-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2DOCKER-2026-108 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>    Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been     detected that allows plugins privilege validation to be bypassed during docker plugin install. Due to an     error in the daemon's privilege comparison logic, the daemon may incorrectly accept a privilege set that     differs from the one approved by the user. Plugins that request exactly one privilege are also affected,     because no comparison is performed at all. This issue has been patched in version 29.3.1. (CVE-2026-33997)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update docker' or   or 'yum update --advisory ALAS2DOCKER-2026-108' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306289">https://www.tenable.com/plugins/nessus/306289</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : runc, --advisory ALAS2DOCKER-2026-105 (ALASDOCKER-2026-105)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306288</link>
            <guid>https://www.tenable.com/plugins/nessus/306288</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306288 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of runc installed on the remote host is prior to 1.3.4-3. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2DOCKER-2026-105 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update runc' or   or 'yum update --advisory ALAS2DOCKER-2026-105' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306288">https://www.tenable.com/plugins/nessus/306288</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : plexus-utils, --advisory ALAS2-2026-3233 (ALAS-2026-3233)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306287</link>
            <guid>https://www.tenable.com/plugins/nessus/306287</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306287 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of plexus-utils installed on the remote host is prior to 3.0.9-9. It is, therefore, affected by a vulnerability as referenced in the ALAS2-2026-3233 advisory.<br /></span><span><br /></span><span>    Directory Traversal vulnerability in the extractFile method of org.codehaus.plexus.util.Expand in plexus-     utils before 6d780b3378829318ba5c2d29547e0012d5b29642. This allows an attacker to execute arbitrary code     (CVE-2025-67030)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update plexus-utils' or   or 'yum update --advisory ALAS2-2026-3233' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306287">https://www.tenable.com/plugins/nessus/306287</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : tigervnc, --advisory ALAS2-2026-3231 (ALAS-2026-3231)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306286</link>
            <guid>https://www.tenable.com/plugins/nessus/306286</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306286 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of tigervnc installed on the remote host is prior to 1.8.0-24. It is, therefore, affected by a vulnerability as referenced in the ALAS2-2026-3231 advisory.<br /></span><span><br /></span><span>    In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen     contents, or cause an application crash, because of incorrect permissions. (CVE-2026-34352)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update tigervnc' or   or 'yum update --advisory ALAS2-2026-3231' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306286">https://www.tenable.com/plugins/nessus/306286</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : runfinch-finch, --advisory ALAS2DOCKER-2026-106 (ALASDOCKER-2026-106)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306285</link>
            <guid>https://www.tenable.com/plugins/nessus/306285</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306285 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of runfinch-finch installed on the remote host is prior to 1.15.1-1. It is, therefore, affected by a vulnerability as referenced in the ALAS2DOCKER-2026-106 advisory.<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update runfinch-finch' or   or 'yum update --advisory ALAS2DOCKER-2026-106' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306285">https://www.tenable.com/plugins/nessus/306285</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : nerdctl, --advisory ALAS2-2026-3229 (ALAS-2026-3229)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306284</link>
            <guid>https://www.tenable.com/plugins/nessus/306284</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306284 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of nerdctl installed on the remote host is prior to 2.2.1-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3229 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update nerdctl' or   or 'yum update --advisory ALAS2-2026-3229' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306284">https://www.tenable.com/plugins/nessus/306284</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : amazon-cloudwatch-agent, --advisory ALAS2-2026-3248 (ALAS-2026-3248)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306283</link>
            <guid>https://www.tenable.com/plugins/nessus/306283</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306283 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of amazon-cloudwatch-agent installed on the remote host is prior to 1.300064.2-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3248 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update amazon-cloudwatch-agent' or   or 'yum update --advisory ALAS2-2026-3248' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306283">https://www.tenable.com/plugins/nessus/306283</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : perl-XML-Parser, --advisory ALAS2-2026-3230 (ALAS-2026-3230)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306282</link>
            <guid>https://www.tenable.com/plugins/nessus/306282</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306282 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of perl-XML-Parser installed on the remote host is prior to 2.41-10. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3230 advisory.<br /></span><span><br /></span><span>    XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap     corruption (double free or corruption) and crashes.<br /></span><span><br /></span><span>    A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read()     returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-     allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.<br /></span><span>    (CVE-2006-10002)<br /></span><span><br /></span><span>    XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack.<br /></span><span><br /></span><span>    In the case (stackptr == stacksize - 1), the stack will NOT be expanded. Then the new value will be     written at location (++stackptr), which equals stacksize and therefore falls just outside the allocated     buffer.<br /></span><span><br /></span><span>    The bug can be observed when parsing an XML file with very deep element nesting (CVE-2006-10003)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update perl-XML-Parser' or   or 'yum update --advisory ALAS2-2026-3230' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306282">https://www.tenable.com/plugins/nessus/306282</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : thunderbird, --advisory ALAS2-2026-3241 (ALAS-2026-3241)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306281</link>
            <guid>https://www.tenable.com/plugins/nessus/306281</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306281 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of thunderbird installed on the remote host is prior to 140.9.0-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3241 advisory.<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE`     each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across     two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng     1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS`     sets `png_ptr->trans_alpha = info_ptr->trans_alpha` (256-byte buffer) and `png_set_PLTE` sets     `info_ptr->palette = png_ptr->palette` (768-byte buffer). In both cases, calling `png_free_data` (with     `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr`     pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to     the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both     functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes     the issue.<br /></span><span><br /></span><span>    NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7jNOTE:<br /></span><span>    https://github.com/pnggroup/libpng/pull/824NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/23019269764e35ed8458e517f1897bd3c54820eb (v1.6.56)NOTE: Fixed     by: https://github.com/pnggroup/libpng/commit/a3a21443ed12bfa1ef46fa0d4fb2b74a0fa34a25 (v1.6.56)NOTE:<br /></span><span>    Fixed by: https://github.com/pnggroup/libpng/commit/7ea9eea884a2328cc7fdcb3c0c00246a50d90667     (v1.6.56)NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/c1b0318b393c90679e6fa5bc1d329fd5d5012ec1 (v1.6.56)     (CVE-2026-33416)<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write     exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows     to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels     remain. Because the implementation works backward from the end of the row, the final iteration     dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the     same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG     input if Neon is enabled. Version 1.6.56 fixes the issue.<br /></span><span><br /></span><span>    NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2NOTE: Introduced with:<br /></span><span>    https://github.com/pnggroup/libpng/commit/7734cda20cf1236aef60f3bbd2267c97bbb40869 (v1.6.36)NOTE: Fixed     by: https://github.com/pnggroup/libpng/commit/aba9f18eba870d14fb52c5ba5d73451349e339c3 (v1.6.56)     (CVE-2026-33636)<br /></span><span><br /></span><span>    Spoofing issue in Thunderbird. This vulnerability affects Thunderbird < 149 and Thunderbird < 140.9.<br /></span><span>    (CVE-2026-3889)<br /></span><span><br /></span><span>    A malicious mail server could send malformed strings with negative lengths, causing the parser to read     memory outside the buffer. If a mail server or connection to a mail server were compromised, an attacker     could cause the parser to malfunction, potentially crashing Thunderbird or leaking sensitive data. This     vulnerability affects Thunderbird < 149 and Thunderbird < 140.9. (CVE-2026-4371)<br /></span><span><br /></span><span>    Race condition, use-after-free in the Graphics: WebRender component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4684)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4685)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4686)<br /></span><span><br /></span><span>    Sandbox escape due to incorrect boundary conditions in the Telemetry component. This vulnerability affects     Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4687)<br /></span><span><br /></span><span>    Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability affects     Firefox < 149 and Firefox ESR < 140.9. (CVE-2026-4688)<br /></span><span><br /></span><span>    Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This     vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4689)<br /></span><span><br /></span><span>    Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This     vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4690)<br /></span><span><br /></span><span>    Use-after-free in the CSS Parsing and Computation component. This vulnerability affects Firefox < 149,     Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4691)<br /></span><span><br /></span><span>    Sandbox escape in the Responsive Design Mode component. This vulnerability affects Firefox < 149, Firefox     ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4692)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: Playback component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4693)<br /></span><span><br /></span><span>    Incorrect boundary conditions, integer overflow in the Graphics component. This vulnerability affects     Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4694)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability affects Firefox     < 149 and Firefox ESR < 140.9. (CVE-2026-4695)<br /></span><span><br /></span><span>    Use-after-free in the Layout: Text and Fonts component. This vulnerability affects Firefox < 149, Firefox     ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4696)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability affects Firefox     < 149 and Firefox ESR < 140.9. (CVE-2026-4697)<br /></span><span><br /></span><span>    JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 149,     Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4698)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Layout: Text and Fonts component. This vulnerability affects Firefox     < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4699)<br /></span><span><br /></span><span>    Mitigation bypass in the Networking: HTTP component. This vulnerability affects Firefox < 149 and Firefox     ESR < 140.9. (CVE-2026-4700)<br /></span><span><br /></span><span>    Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149 and Firefox     ESR < 140.9. (CVE-2026-4701)<br /></span><span><br /></span><span>    JIT miscompilation in the JavaScript Engine component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4702)<br /></span><span><br /></span><span>    Denial-of-service in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and Firefox     ESR < 140.9. (CVE-2026-4704)<br /></span><span><br /></span><span>    Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4705)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4706)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4707)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4708)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 149,     Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4709)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4710)<br /></span><span><br /></span><span>    Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox < 149 and Firefox ESR <     140.9. (CVE-2026-4711)<br /></span><span><br /></span><span>    Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4712)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4713)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4714)<br /></span><span><br /></span><span>    Uninitialized memory in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4715)<br /></span><span><br /></span><span>    Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability     affects Firefox < 149 and Firefox ESR < 140.9. (CVE-2026-4716)<br /></span><span><br /></span><span>    Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 149 and Firefox ESR     < 140.9. (CVE-2026-4717)<br /></span><span><br /></span><span>    Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4718)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Text component. This vulnerability affects Firefox < 149     and Firefox ESR < 140.9. (CVE-2026-4719)<br /></span><span><br /></span><span>    Memory safety bugs present in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148.<br /></span><span>    Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of     these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4720)<br /></span><span><br /></span><span>    Memory safety bugs present in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148     and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with     enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects     Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4721)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update thunderbird' or   or 'yum update --advisory ALAS2-2026-3241' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306281">https://www.tenable.com/plugins/nessus/306281</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : python3, --advisory ALAS2-2026-3228 (ALAS-2026-3228)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306280</link>
            <guid>https://www.tenable.com/plugins/nessus/306280</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306280 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of python3 installed on the remote host is prior to 3.7.16-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3228 advisory.<br /></span><span><br /></span><span>    The tarfile module would still apply normalization of AREGTYPE (\x00) blocks to DIRTYPE, even while     processing a multi-block member such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. This could result in a     crafted tar archive being misinterpreted by the tarfile module compared to other implementations.<br /></span><span>    (CVE-2025-13462)<br /></span><span><br /></span><span>    pkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.<br /></span><span>    (CVE-2026-3479)<br /></span><span><br /></span><span>    The webbrowser.open() API would accept leading dashes in the URL whichcould be handled as command line     options for certain web browsers. Newbehavior rejects leading dashes. Users are recommended to sanitize     URLsprior to passing to webbrowser.open(). (CVE-2026-4519)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update python3' or   or 'yum update --advisory ALAS2-2026-3228' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306280">https://www.tenable.com/plugins/nessus/306280</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : gdk-pixbuf2, --advisory ALAS2-2026-3240 (ALAS-2026-3240)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306279</link>
            <guid>https://www.tenable.com/plugins/nessus/306279</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306279 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of gdk-pixbuf2 installed on the remote host is prior to 2.36.12-3. It is, therefore, affected by a vulnerability as referenced in the ALAS2-2026-3240 advisory.<br /></span><span><br /></span><span>    A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the     JPEG image loader due to improper validation of color component counts when processing a specially crafted     JPEG image. A remote attacker can exploit this flaw without user interaction, for example, via thumbnail     generation. Successful exploitation leads to application crashes and denial of service (DoS) conditions.<br /></span><span>    (CVE-2026-5201)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update gdk-pixbuf2' or   or 'yum update --advisory ALAS2-2026-3240' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306279">https://www.tenable.com/plugins/nessus/306279</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : freerdp, --advisory ALAS2-2026-3239 (ALAS-2026-3239)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306278</link>
            <guid>https://www.tenable.com/plugins/nessus/306278</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306278 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of freerdp installed on the remote host is prior to 2.11.7-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3239 advisory.<br /></span><span><br /></span><span>    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, a client-side heap     buffer overflow occurs in the FreeRDP client's AVC420/AVC444 YUV-to-RGB conversion path due to missing     horizontal bounds validation of H.264 metablock regionRects coordinates.  In yuv.c, the clamp() function     (line 347) only validates top/bottom against the surface/YUV height, but never checks left/right against     the surface width. When avc420_yuv_to_rgb (line 67) computes destination and source pointers using     rect->left, it performs unchecked pointer arithmetic that can reach far beyond the allocated surface     buffer. A malicious server sends a WIRE_TO_SURFACE_PDU_1 with AVC420 codec containing a regionRects entry     where left greatly exceeds the surface width (e.g., left=60000 on a 128px surface). The H.264 bitstream     decodes successfully, then yuv420_process_work_callback calls avc420_yuv_to_rgb which computes pDstPoint =     pDstData + rect->top * nDstStep + rect->left * 4, writing 16-byte SSE vectors 1888+ bytes past the     allocated heap region. This vulnerability is fixed in 3.24.0. (CVE-2026-29774)<br /></span><span><br /></span><span>    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, a client-side heap out-     of-bounds read/write occurs in FreeRDP's bitmap cache subsystem due to an off-by-one boundary check in     bitmap_cache_put. A malicious server can send a CACHE_BITMAP_ORDER (Rev1) with cacheId equal to maxCells,     bypassing the guard and accessing cells[] one element past the allocated array. This vulnerability is     fixed in 3.24.0. (CVE-2026-29775)<br /></span><span><br /></span><span>    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, Integer Underflow in     update_read_cache_bitmap_order Function of FreeRDP's Core Library This vulnerability is fixed in 3.24.0.<br /></span><span>    (CVE-2026-29776)<br /></span><span><br /></span><span>    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, a size_t underflow in     the IMA-ADPCM and MS-ADPCM audio decoders leads to heap-buffer-overflow write via the RDPSND audio     channel. In libfreerdp/codec/dsp.c, the IMA-ADPCM and MS-ADPCM decoders subtract block header sizes from a     size_t variable without checking for underflow. When nBlockAlign (received from the server) is set such     that size % block_size == 0 triggers the header parsing at a point where size is smaller than the header     (4 or 8 bytes), the subtraction wraps size to ~SIZE_MAX. The while (size > 0) loop then continues for an     astronomical number of iterations. This vulnerability is fixed in 3.24.0. (CVE-2026-31883)<br /></span><span><br /></span><span>    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, division by zero in MS-     ADPCM and IMA-ADPCM decoders when nBlockAlign is 0, leading to a crash. In libfreerdp/codec/dsp.c, both     ADPCM decoders use size % block_size where block_size = context->common.format.nBlockAlign. The     nBlockAlign value comes from the Server Audio Formats PDU on the RDPSND channel. The value 0 is not     validated anywhere before reaching the decoder. When nBlockAlign = 0, the modulo operation causes a SIGFPE     (floating point exception) crash. This vulnerability is fixed in 3.24.0. (CVE-2026-31884)<br /></span><span><br /></span><span>    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, there is an out-of-     bounds read in MS-ADPCM and IMA-ADPCM decoders due to unchecked predictor and step_index values from input     data. This vulnerability is fixed in 3.24.0. (CVE-2026-31885)<br /></span><span><br /></span><span>    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, there is an out-of-     bounds read in freerdp_bitmap_decompress_planar when SrcSize is 0. The function dereferences *srcp (which     points to pSrcData) without first verifying that SrcSize >= 1. When SrcSize is 0 and pSrcData is non-NULL,     this reads one byte past the end of the source buffer. This vulnerability is fixed in 3.24.0.<br /></span><span>    (CVE-2026-31897)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update freerdp' or   or 'yum update --advisory ALAS2-2026-3239' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306278">https://www.tenable.com/plugins/nessus/306278</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : docker, --advisory ALAS2ECS-2026-106 (ALASECS-2026-106)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306277</link>
            <guid>https://www.tenable.com/plugins/nessus/306277</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306277 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of docker installed on the remote host is prior to 25.0.14-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2ECS-2026-106 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>    Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been     detected that allows plugins privilege validation to be bypassed during docker plugin install. Due to an     error in the daemon's privilege comparison logic, the daemon may incorrectly accept a privilege set that     differs from the one approved by the user. Plugins that request exactly one privilege are also affected,     because no comparison is performed at all. This issue has been patched in version 29.3.1. (CVE-2026-33997)<br /></span><span><br /></span><span>    Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been     detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in     version 29.3.1. (CVE-2026-34040)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update docker' or   or 'yum update --advisory ALAS2ECS-2026-106' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306277">https://www.tenable.com/plugins/nessus/306277</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : nginx, --advisory ALAS2NGINX1-2026-011 (ALASNGINX1-2026-011)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306276</link>
            <guid>https://www.tenable.com/plugins/nessus/306276</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306276 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of nginx installed on the remote host is prior to 1.28.3-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2NGINX1-2026-011 advisory.<br /></span><span><br /></span><span>    When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed     requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP     authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait     response header. Note: Software versions which have reached End of Technical Support (EoTS) are not     evaluated. (CVE-2026-27651)<br /></span><span><br /></span><span>    NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow     an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in     termination of the NGINX worker process or modification of source or destination file names outside the     document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV     module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias     directives. The integrity impact is constrained because the NGINX worker process user has low privileges     and does not have access to the entire system. Note: Software versions which have reached End of Technical     Support (EoTS) are not evaluated. (CVE-2026-27654)<br /></span><span><br /></span><span>    The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module,     which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination,     using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with     the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the     attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the     ngx_http_mp4_module module.<br /></span><span><br /></span><span>    Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br /></span><span>    (CVE-2026-27784)<br /></span><span><br /></span><span>    NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the     improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to     inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note:<br /></span><span>    Software versions which have reached End of Technical Support (EoTS) are not evaluated. (CVE-2026-28753)<br /></span><span><br /></span><span>    NGINX Plus and NGINX Open Source have a vulnerability in the ngx_stream_ssl_module module due to the     improper handling of revoked certificates when configured with the ssl_verify_client on and ssl_ocsp on     directives, allowing the TLS handshake to succeed even after an OCSP check identifies the certificate as     revoked.<br /></span><span><br /></span><span>    Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br /></span><span>    (CVE-2026-28755)<br /></span><span><br /></span><span>    NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow     an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its     termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open     Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in     the configuration file. Additionally, the attack is possible only if an attacker can trigger the     processing of a specially crafted MP4 file with the ngx_http_mp4_module module.<br /></span><span><br /></span><span>    Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br /></span><span>    (CVE-2026-32647)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update nginx' or   or 'yum update --advisory ALAS2NGINX1-2026-011' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306276">https://www.tenable.com/plugins/nessus/306276</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : oci-add-hooks, --advisory ALAS2DOCKER-2026-110 (ALASDOCKER-2026-110)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306275</link>
            <guid>https://www.tenable.com/plugins/nessus/306275</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306275 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of oci-add-hooks installed on the remote host is prior to 0-0.8.20200504git325a340. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2DOCKER-2026-110 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update oci-add-hooks' or   or 'yum update --advisory ALAS2DOCKER-2026-110' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306275">https://www.tenable.com/plugins/nessus/306275</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : amazon-ecr-credential-helper, --advisory ALAS2NITRO-ENCLAVES-2026-095 (ALASNITRO-ENCLAVES-2026-095)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306274</link>
            <guid>https://www.tenable.com/plugins/nessus/306274</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306274 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of amazon-ecr-credential-helper installed on the remote host is prior to 0.12.0-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2NITRO-ENCLAVES-2026-095 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update amazon-ecr-credential-helper' or   or 'yum update --advisory ALAS2NITRO-ENCLAVES-2026-095' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306274">https://www.tenable.com/plugins/nessus/306274</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : python, --advisory ALAS2-2026-3227 (ALAS-2026-3227)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306273</link>
            <guid>https://www.tenable.com/plugins/nessus/306273</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306273 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of python installed on the remote host is prior to 2.7.18-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3227 advisory.<br /></span><span><br /></span><span>    The tarfile module would still apply normalization of AREGTYPE (\x00) blocks to DIRTYPE, even while     processing a multi-block member such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. This could result in a     crafted tar archive being misinterpreted by the tarfile module compared to other implementations.<br /></span><span>    (CVE-2025-13462)<br /></span><span><br /></span><span>    pkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.<br /></span><span>    (CVE-2026-3479)<br /></span><span><br /></span><span>    The webbrowser.open() API would accept leading dashes in the URL whichcould be handled as command line     options for certain web browsers. Newbehavior rejects leading dashes. Users are recommended to sanitize     URLsprior to passing to webbrowser.open(). (CVE-2026-4519)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update python' or   or 'yum update --advisory ALAS2-2026-3227' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306273">https://www.tenable.com/plugins/nessus/306273</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : soci-snapshotter, --advisory ALAS2DOCKER-2026-107 (ALASDOCKER-2026-107)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306272</link>
            <guid>https://www.tenable.com/plugins/nessus/306272</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306272 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of soci-snapshotter installed on the remote host is prior to 0.13.0-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2DOCKER-2026-107 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update soci-snapshotter' or   or 'yum update --advisory ALAS2DOCKER-2026-107' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306272">https://www.tenable.com/plugins/nessus/306272</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : amazon-ecr-credential-helper, --advisory ALAS2DOCKER-2026-109 (ALASDOCKER-2026-109)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306271</link>
            <guid>https://www.tenable.com/plugins/nessus/306271</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306271 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of amazon-ecr-credential-helper installed on the remote host is prior to 0.12.0-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2DOCKER-2026-109 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update amazon-ecr-credential-helper' or   or 'yum update --advisory ALAS2DOCKER-2026-109' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306271">https://www.tenable.com/plugins/nessus/306271</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : nghttp2, --advisory ALAS2-2026-3232 (ALAS-2026-3232)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306270</link>
            <guid>https://www.tenable.com/plugins/nessus/306270</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306270 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of nghttp2 installed on the remote host is prior to 1.41.0-1. It is, therefore, affected by a vulnerability as referenced in the ALAS2-2026-3232 advisory.<br /></span><span><br /></span><span>    nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1,     the nghttp2 library stops reading the incoming data when user facing public API     `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application.<br /></span><span>    They might be called internally by the library when it detects the situation that is subject to connection     error. Due to the missing internal state validation, the library keeps reading the rest of the data after     one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes     assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known     workarounds are available. (CVE-2026-27135)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update nghttp2' or   or 'yum update --advisory ALAS2-2026-3232' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306270">https://www.tenable.com/plugins/nessus/306270</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : ecs-init, --advisory ALAS2ECS-2026-101 (ALASECS-2026-101)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306269</link>
            <guid>https://www.tenable.com/plugins/nessus/306269</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306269 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of ecs-init installed on the remote host is prior to 1.102.2-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2ECS-2026-101 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update ecs-init' or   or 'yum update --advisory ALAS2ECS-2026-101' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306269">https://www.tenable.com/plugins/nessus/306269</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : amazon-efs-utils, --advisory ALAS2-2026-3245 (ALAS-2026-3245)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306268</link>
            <guid>https://www.tenable.com/plugins/nessus/306268</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306268 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of amazon-efs-utils installed on the remote host is prior to 3.0.0-4. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3245 advisory.<br /></span><span><br /></span><span>    time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is     provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion     is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC     2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario.<br /></span><span>    A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned     rather than exhausting the stack. (CVE-2026-25727)<br /></span><span><br /></span><span>    Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass     certificate chain verification when processing PKCS7 objects with multiple signers, except the final     signer.<br /></span><span><br /></span><span>    Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC     version 1.69.0. (CVE-2026-3336)<br /></span><span><br /></span><span>    Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to     potentially determine authentication tag validity via timing analysis.<br /></span><span><br /></span><span><br /></span><span><br /></span><span>    The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and     EVP_aes_256_ccm.<br /></span><span><br /></span><span><br /></span><span><br /></span><span>    Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC     version 1.69.0. (CVE-2026-3337)<br /></span><span><br /></span><span>    Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass     signature verification when processing PKCS7 objects with Authenticated Attributes.<br /></span><span><br /></span><span><br /></span><span><br /></span><span>    Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC     version 1.69.0. (CVE-2026-3338)<br /></span><span><br /></span><span>    A logic error in CRL distribution point validation in AWS-LC before 1.71.0 causes partitioned CRLs to be     incorrectly rejected as out of scope, which allows  a revoked certificate to bypass certificate revocation     checks.<br /></span><span><br /></span><span>    To remediate this issue, users should upgrade to AWS-LC 1.71.0 or AWS-LC-FIPS-3.3.0. (CVE-2026-4428)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update amazon-efs-utils' or   or 'yum update --advisory ALAS2-2026-3245' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306268">https://www.tenable.com/plugins/nessus/306268</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : compat-libtiff3, --advisory ALAS2-2026-3234 (ALAS-2026-3234)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306267</link>
            <guid>https://www.tenable.com/plugins/nessus/306267</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306267 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of compat-libtiff3 installed on the remote host is prior to 3.9.4-12. It is, therefore, affected by a vulnerability as referenced in the ALAS2-2026-3234 advisory.<br /></span><span><br /></span><span>    A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow     vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This     flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially     causing a denial of service (application crash) or arbitrary code execution. (CVE-2026-4775)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update compat-libtiff3' or   or 'yum update --advisory ALAS2-2026-3234' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306267">https://www.tenable.com/plugins/nessus/306267</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : docker, --advisory ALAS2NITRO-ENCLAVES-2026-094 (ALASNITRO-ENCLAVES-2026-094)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306266</link>
            <guid>https://www.tenable.com/plugins/nessus/306266</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306266 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of docker installed on the remote host is prior to 25.0.14-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2NITRO-ENCLAVES-2026-094 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>    Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been     detected that allows plugins privilege validation to be bypassed during docker plugin install. Due to an     error in the daemon's privilege comparison logic, the daemon may incorrectly accept a privilege set that     differs from the one approved by the user. Plugins that request exactly one privilege are also affected,     because no comparison is performed at all. This issue has been patched in version 29.3.1. (CVE-2026-33997)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update docker' or   or 'yum update --advisory ALAS2NITRO-ENCLAVES-2026-094' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306266">https://www.tenable.com/plugins/nessus/306266</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : runc, --advisory ALAS2NITRO-ENCLAVES-2026-093 (ALASNITRO-ENCLAVES-2026-093)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306265</link>
            <guid>https://www.tenable.com/plugins/nessus/306265</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306265 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of runc installed on the remote host is prior to 1.3.4-3. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2NITRO-ENCLAVES-2026-093 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update runc' or   or 'yum update --advisory ALAS2NITRO-ENCLAVES-2026-093' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306265">https://www.tenable.com/plugins/nessus/306265</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : libpng, --advisory ALAS2-2026-3244 (ALAS-2026-3244)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306264</link>
            <guid>https://www.tenable.com/plugins/nessus/306264</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306264 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of libpng installed on the remote host is prior to 1.5.13-8. It is, therefore, affected by a vulnerability as referenced in the ALAS2-2026-3244 advisory.<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE`     each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across     two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng     1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS`     sets `png_ptr->trans_alpha = info_ptr->trans_alpha` (256-byte buffer) and `png_set_PLTE` sets     `info_ptr->palette = png_ptr->palette` (768-byte buffer). In both cases, calling `png_free_data` (with     `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr`     pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to     the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both     functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes     the issue.<br /></span><span><br /></span><span>    NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7jNOTE:<br /></span><span>    https://github.com/pnggroup/libpng/pull/824NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/23019269764e35ed8458e517f1897bd3c54820eb (v1.6.56)NOTE: Fixed     by: https://github.com/pnggroup/libpng/commit/a3a21443ed12bfa1ef46fa0d4fb2b74a0fa34a25 (v1.6.56)NOTE:<br /></span><span>    Fixed by: https://github.com/pnggroup/libpng/commit/7ea9eea884a2328cc7fdcb3c0c00246a50d90667     (v1.6.56)NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/c1b0318b393c90679e6fa5bc1d329fd5d5012ec1 (v1.6.56)     (CVE-2026-33416)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update libpng' or   or 'yum update --advisory ALAS2-2026-3244' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306264">https://www.tenable.com/plugins/nessus/306264</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : oci-add-hooks, --advisory ALAS2ECS-2026-104 (ALASECS-2026-104)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306263</link>
            <guid>https://www.tenable.com/plugins/nessus/306263</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306263 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of oci-add-hooks installed on the remote host is prior to 0-0.8.20200504git325a340. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2ECS-2026-104 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update oci-add-hooks' or   or 'yum update --advisory ALAS2ECS-2026-104' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306263">https://www.tenable.com/plugins/nessus/306263</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : firefox, --advisory ALAS2FIREFOX-2026-056 (ALASFIREFOX-2026-056)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306262</link>
            <guid>https://www.tenable.com/plugins/nessus/306262</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306262 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of firefox installed on the remote host is prior to 140.9.0-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2FIREFOX-2026-056 advisory.<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE`     each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across     two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng     1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS`     sets `png_ptr->trans_alpha = info_ptr->trans_alpha` (256-byte buffer) and `png_set_PLTE` sets     `info_ptr->palette = png_ptr->palette` (768-byte buffer). In both cases, calling `png_free_data` (with     `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr`     pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to     the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both     functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes     the issue.<br /></span><span><br /></span><span>    NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7jNOTE:<br /></span><span>    https://github.com/pnggroup/libpng/pull/824NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/23019269764e35ed8458e517f1897bd3c54820eb (v1.6.56)NOTE: Fixed     by: https://github.com/pnggroup/libpng/commit/a3a21443ed12bfa1ef46fa0d4fb2b74a0fa34a25 (v1.6.56)NOTE:<br /></span><span>    Fixed by: https://github.com/pnggroup/libpng/commit/7ea9eea884a2328cc7fdcb3c0c00246a50d90667     (v1.6.56)NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/c1b0318b393c90679e6fa5bc1d329fd5d5012ec1 (v1.6.56)     (CVE-2026-33416)<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write     exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows     to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels     remain. Because the implementation works backward from the end of the row, the final iteration     dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the     same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG     input if Neon is enabled. Version 1.6.56 fixes the issue.<br /></span><span><br /></span><span>    NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2NOTE: Introduced with:<br /></span><span>    https://github.com/pnggroup/libpng/commit/7734cda20cf1236aef60f3bbd2267c97bbb40869 (v1.6.36)NOTE: Fixed     by: https://github.com/pnggroup/libpng/commit/aba9f18eba870d14fb52c5ba5d73451349e339c3 (v1.6.56)     (CVE-2026-33636)<br /></span><span><br /></span><span>    Race condition, use-after-free in the Graphics: WebRender component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4684)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4685)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4686)<br /></span><span><br /></span><span>    Sandbox escape due to incorrect boundary conditions in the Telemetry component. This vulnerability affects     Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4687)<br /></span><span><br /></span><span>    Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability affects     Firefox < 149 and Firefox ESR < 140.9. (CVE-2026-4688)<br /></span><span><br /></span><span>    Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This     vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4689)<br /></span><span><br /></span><span>    Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This     vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4690)<br /></span><span><br /></span><span>    Use-after-free in the CSS Parsing and Computation component. This vulnerability affects Firefox < 149,     Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4691)<br /></span><span><br /></span><span>    Sandbox escape in the Responsive Design Mode component. This vulnerability affects Firefox < 149, Firefox     ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4692)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: Playback component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4693)<br /></span><span><br /></span><span>    Incorrect boundary conditions, integer overflow in the Graphics component. This vulnerability affects     Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4694)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability affects Firefox     < 149 and Firefox ESR < 140.9. (CVE-2026-4695)<br /></span><span><br /></span><span>    Use-after-free in the Layout: Text and Fonts component. This vulnerability affects Firefox < 149, Firefox     ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4696)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability affects Firefox     < 149 and Firefox ESR < 140.9. (CVE-2026-4697)<br /></span><span><br /></span><span>    JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 149,     Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4698)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Layout: Text and Fonts component. This vulnerability affects Firefox     < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4699)<br /></span><span><br /></span><span>    Mitigation bypass in the Networking: HTTP component. This vulnerability affects Firefox < 149 and Firefox     ESR < 140.9. (CVE-2026-4700)<br /></span><span><br /></span><span>    Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149 and Firefox     ESR < 140.9. (CVE-2026-4701)<br /></span><span><br /></span><span>    JIT miscompilation in the JavaScript Engine component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4702)<br /></span><span><br /></span><span>    Denial-of-service in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and Firefox     ESR < 140.9. (CVE-2026-4704)<br /></span><span><br /></span><span>    Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4705)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4706)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4707)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4708)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 149,     Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4709)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4710)<br /></span><span><br /></span><span>    Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox < 149 and Firefox ESR <     140.9. (CVE-2026-4711)<br /></span><span><br /></span><span>    Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4712)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4713)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4714)<br /></span><span><br /></span><span>    Uninitialized memory in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4715)<br /></span><span><br /></span><span>    Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability     affects Firefox < 149 and Firefox ESR < 140.9. (CVE-2026-4716)<br /></span><span><br /></span><span>    Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 149 and Firefox ESR     < 140.9. (CVE-2026-4717)<br /></span><span><br /></span><span>    Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4718)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Text component. This vulnerability affects Firefox < 149     and Firefox ESR < 140.9. (CVE-2026-4719)<br /></span><span><br /></span><span>    Memory safety bugs present in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148.<br /></span><span>    Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of     these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4720)<br /></span><span><br /></span><span>    Memory safety bugs present in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148     and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with     enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects     Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4721)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update firefox' or   or 'yum update --advisory ALAS2FIREFOX-2026-056' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306262">https://www.tenable.com/plugins/nessus/306262</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 20.04 LTS / 22.04 LTS : kvmtool vulnerabilities (USN-8172-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306261</link>
            <guid>https://www.tenable.com/plugins/nessus/306261</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306261 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 20.04 LTS / 22.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-8172-1 advisory.<br /></span><span><br /></span><span>    It was discovered that kvmtool did not properly manage memory under certain circumstances. A malicious     guest attacker could use this issue to cause kvmtool to crash, leading to a denial of service, or possibly     execute arbitrary code on the host system. (CVE-2021-45464)<br /></span><span><br /></span><span>    It was discovered that kvmtool incorrectly handled the 9p passthrough file system. A malicious guest     attacker could possibly use this issue to open special files, escape the exported 9p tree, and execute     arbitrary code on the host system. (CVE-2023-2861)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kvmtool package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306261">https://www.tenable.com/plugins/nessus/306261</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 22.04 LTS / 25.10 : xdg-dbus-proxy vulnerability (USN-8167-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306260</link>
            <guid>https://www.tenable.com/plugins/nessus/306260</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306260 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 22.04 LTS / 25.10 host has packages installed that are affected by a vulnerability as referenced in the USN-8167-1 advisory.<br /></span><span><br /></span><span>    It was discovered that xdg-dbus-proxy incorrectly handled eavesdropping in policy rules. A local attacker     could possibly use this issue to intercept certain D-Bus messages.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected xdg-dbus-proxy and / or xdg-dbus-proxy-tests packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306260">https://www.tenable.com/plugins/nessus/306260</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 22.04 LTS / 25.10 : Rust vulnerability (USN-8168-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306259</link>
            <guid>https://www.tenable.com/plugins/nessus/306259</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306259 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 22.04 LTS / 25.10 host has packages installed that are affected by a vulnerability as referenced in the USN-8168-1 advisory.<br /></span><span><br /></span><span>    It was discovered that tar-rs embedded in rustc incorrectly handled symlinks when unpacking a tar archive.<br /></span><span>    If a user or automated system were tricked into processing a specially crafted tar archive, a remote     attacker could use this issue to modify permissions of arbitrary directories outside the extraction root,     and possibly escalate privileges.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306259">https://www.tenable.com/plugins/nessus/306259</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 14.04 LTS / 20.04 LTS / 22.04 LTS / 25.10 : Vim vulnerabilities (USN-8171-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306258</link>
            <guid>https://www.tenable.com/plugins/nessus/306258</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306258 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 14.04 LTS / 20.04 LTS / 22.04 LTS / 25.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8171-1 advisory.<br /></span><span><br /></span><span>    Nathan Mills discovered that Vim could crash when parsing certain regular expressions. An attacker could     possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu     25.10 (CVE-2026-32249)<br /></span><span><br /></span><span>    It was discovered that Vim did not properly sanitize user input. An attacker could possibly use this issue     to execute arbitrary commands. (CVE-2026-33412)<br /></span><span><br /></span><span>    Avishay Matayev discovered that Vim's modeline sandbox could be bypassed when opening a maliciously-     crafted file. An attacker could possibly use this issue to execute arbitrary commands. This issue only     affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 25.10. (CVE-2026-34982)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306258">https://www.tenable.com/plugins/nessus/306258</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0-M1 < 9.0.116 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115220</link>
            <guid>https://www.tenable.com/plugins/was/115220</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115220 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.0-M1 < 9.0.116 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.116, 10.1.0-M1 prior to 10.1.53 or 11.0.0-M1 prior to 11.0.20. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - The EncryptInterceptor used CBC by default which is vulnerable to a padding Oracle attack. (CVE-2026-29146)<br /></span><span><br /></span><span> - The validation of SNI name and host name did not take account of possible differences in case allowing the strict SNI checks to be bypassed. This is an incomplete fix for CVE-2025-66614. (CVE-2026-32990)<br /></span><span><br /></span><span> - CLIENT_CERT authentication did not fail OCSP checks as expected for some scenarios when soft fail was disabled. (CVE-2026-29145)<br /></span><span><br /></span><span> - The addition of the ability to configure TLS 1.3 cipher suites did not preserve the order of the configured cipher suites and ciphers. (CVE-2026-29129)<br /></span><span><br /></span><span> - When a Tomcat node in a cluster with the LoadBalancerDrainingValve was in the disabled (draining) state, a specially crafted URL could be used to trigger a redirect to a URI of the attacker's choice. (CVE-2026-25854)<br /></span><span><br /></span><span> - Tomcat did not validate the contents of HTTP/1.1 chunk extensions. This enabled a request smuggling attack if a reverse proxy in front of Tomcat allowed CRLF sequences in an otherwise valid chunk extension. (CVE-2026-24880)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.116 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115220">https://www.tenable.com/plugins/was/115220</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M1 < 10.1.53 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115219</link>
            <guid>https://www.tenable.com/plugins/was/115219</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115219 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M1 < 10.1.53 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.116, 10.1.0-M1 prior to 10.1.53 or 11.0.0-M1 prior to 11.0.20. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - The EncryptInterceptor used CBC by default which is vulnerable to a padding Oracle attack. (CVE-2026-29146)<br /></span><span><br /></span><span> - The validation of SNI name and host name did not take account of possible differences in case allowing the strict SNI checks to be bypassed. This is an incomplete fix for CVE-2025-66614. (CVE-2026-32990)<br /></span><span><br /></span><span> - CLIENT_CERT authentication did not fail OCSP checks as expected for some scenarios when soft fail was disabled. (CVE-2026-29145)<br /></span><span><br /></span><span> - The addition of the ability to configure TLS 1.3 cipher suites did not preserve the order of the configured cipher suites and ciphers. (CVE-2026-29129)<br /></span><span><br /></span><span> - When a Tomcat node in a cluster with the LoadBalancerDrainingValve was in the disabled (draining) state, a specially crafted URL could be used to trigger a redirect to a URI of the attacker's choice. (CVE-2026-25854)<br /></span><span><br /></span><span> - Tomcat did not validate the contents of HTTP/1.1 chunk extensions. This enabled a request smuggling attack if a reverse proxy in front of Tomcat allowed CRLF sequences in an otherwise valid chunk extension. (CVE-2026-24880)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.53 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115219">https://www.tenable.com/plugins/was/115219</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.20 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115218</link>
            <guid>https://www.tenable.com/plugins/was/115218</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115218 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.20 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.116, 10.1.0-M1 prior to 10.1.53 or 11.0.0-M1 prior to 11.0.20. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - The EncryptInterceptor used CBC by default which is vulnerable to a padding Oracle attack. (CVE-2026-29146)<br /></span><span><br /></span><span> - The validation of SNI name and host name did not take account of possible differences in case allowing the strict SNI checks to be bypassed. This is an incomplete fix for CVE-2025-66614. (CVE-2026-32990)<br /></span><span><br /></span><span> - CLIENT_CERT authentication did not fail OCSP checks as expected for some scenarios when soft fail was disabled. (CVE-2026-29145)<br /></span><span><br /></span><span> - The addition of the ability to configure TLS 1.3 cipher suites did not preserve the order of the configured cipher suites and ciphers. (CVE-2026-29129)<br /></span><span><br /></span><span> - When a Tomcat node in a cluster with the LoadBalancerDrainingValve was in the disabled (draining) state, a specially crafted URL could be used to trigger a redirect to a URI of the attacker's choice. (CVE-2026-25854)<br /></span><span><br /></span><span> - Tomcat did not validate the contents of HTTP/1.1 chunk extensions. This enabled a request smuggling attack if a reverse proxy in front of Tomcat allowed CRLF sequences in an otherwise valid chunk extension. (CVE-2026-24880)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.20 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115218">https://www.tenable.com/plugins/was/115218</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.13 < 9.0.117 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115217</link>
            <guid>https://www.tenable.com/plugins/was/115217</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115217 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.13 < 9.0.117 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.13 prior to 9.0.117, 10.1.0-M1 prior to 10.1.54 or 11.0.0-M1 prior to 11.0.21. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - An error in the fix for CVE-2026-29146 allowed the EncryptInterceptor to be bypassed. (CVE-2026-34486)<br /></span><span><br /></span><span> - CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used. (CVE-2026-34500)<br /></span><span><br /></span><span> - The cloud membership for clustering component exposed the Kubernetes bearer token in log messages. (CVE-2026-34487)<br /></span><span><br /></span><span> - Incomplete escaping when non-default values were used for the Connector attributes relaxedPathChars and/or relaxedQueryChars allowed the injection of arbitrary JSON into the JSON access log. (CVE-2026-34483)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.117 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115217">https://www.tenable.com/plugins/was/115217</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M1 < 10.1.54 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115216</link>
            <guid>https://www.tenable.com/plugins/was/115216</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115216 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M1 < 10.1.54 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.13 prior to 9.0.117, 10.1.0-M1 prior to 10.1.54 or 11.0.0-M1 prior to 11.0.21. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - An error in the fix for CVE-2026-29146 allowed the EncryptInterceptor to be bypassed. (CVE-2026-34486)<br /></span><span><br /></span><span> - CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used. (CVE-2026-34500)<br /></span><span><br /></span><span> - The cloud membership for clustering component exposed the Kubernetes bearer token in log messages. (CVE-2026-34487)<br /></span><span><br /></span><span> - Incomplete escaping when non-default values were used for the Connector attributes relaxedPathChars and/or relaxedQueryChars allowed the injection of arbitrary JSON into the JSON access log. (CVE-2026-34483)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.54 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115216">https://www.tenable.com/plugins/was/115216</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.21 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115215</link>
            <guid>https://www.tenable.com/plugins/was/115215</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115215 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.21 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.13 prior to 9.0.117, 10.1.0-M1 prior to 10.1.54 or 11.0.0-M1 prior to 11.0.21. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - An error in the fix for CVE-2026-29146 allowed the EncryptInterceptor to be bypassed. (CVE-2026-34486)<br /></span><span><br /></span><span> - CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used. (CVE-2026-34500)<br /></span><span><br /></span><span> - The cloud membership for clustering component exposed the Kubernetes bearer token in log messages. (CVE-2026-34487)<br /></span><span><br /></span><span> - Incomplete escaping when non-default values were used for the Connector attributes relaxedPathChars and/or relaxedQueryChars allowed the injection of arbitrary JSON into the JSON access log. (CVE-2026-34483)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.21 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115215">https://www.tenable.com/plugins/was/115215</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Axios < 1.15.0 Header Injection]]></title>
            <link>https://www.tenable.com/plugins/was/115214</link>
            <guid>https://www.tenable.com/plugins/was/115214</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115214 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Axios < 1.15.0 Header Injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Axios application running on the remote host is prior to 1.15.0. It is, therefore, affected by a Header Injection vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Axios version 1.15.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115214">https://www.tenable.com/plugins/was/115214</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fortinet Forticlient EMS 7.4.5 < 7.4.7 Improper Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/115213</link>
            <guid>https://www.tenable.com/plugins/was/115213</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115213 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Fortinet Forticlient EMS 7.4.5 < 7.4.7 Improper Access Control<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Fortinet Forticlient EMS running on the remote host is 7.4.5 prior to 7.4.7. It is, therefore, affected by an Improper Access Control that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Fortinet FortiClientEMS version 7.4.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115213">https://www.tenable.com/plugins/was/115213</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Eaton Discontinued Devices Detection]]></title>
            <link>https://www.tenable.com/plugins/ot/505318</link>
            <guid>https://www.tenable.com/plugins/ot/505318</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Tenable OT Security Plugin ID 505318 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Detection of Eaton devices that are discontinued and no longer supported.<br /></span>
      <h3>Description</h3>
      <span>The current plugin identifies Eaton devices that are currently discontinued.<br /></span><span>Eaton Lifecycle Statuses:<br /></span><span> - Active: Most current offering within a product category.<br /></span><span> - End of Life: Discontinued date announced - actively execute migrations and last time buys.<br /></span><span>Product generally orderable until the discontinued date.<br /></span><span> - Discontinued: Product no longer manufactured or procured. Repair/exchange services may be available.<br /></span>
      <h3>Solution</h3>
      <span>Migrate to a product that is actively supported.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/ot/505318">https://www.tenable.com/plugins/ot/505318</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Eaton End-of-Life Devices Detection]]></title>
            <link>https://www.tenable.com/plugins/ot/505317</link>
            <guid>https://www.tenable.com/plugins/ot/505317</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Tenable OT Security Plugin ID 505317 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Detection of Eaton devices that are still supported but have a discontinued date announced.<br /></span>
      <h3>Description</h3>
      <span>The current plugin identifies Eaton devices that are end-of-life, i.e., still supported but have a discontinued date announced.<br /></span><span>Eaton Lifecycle Statuses:<br /></span><span> - Active: Most current offering within a product category.<br /></span><span> - End of Life: Discontinued date announced - actively execute migrations and last time buys.<br /></span><span>Product generally orderable until the discontinued date.<br /></span><span> - Discontinued: Product no longer manufactured or procured. Repair/exchange services may be available.<br /></span>
      <h3>Solution</h3>
      <span>Plan and initiate the transition to an actively supported product before the discontinuation date.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/ot/505317">https://www.tenable.com/plugins/ot/505317</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Eaton Active Devices Detection]]></title>
            <link>https://www.tenable.com/plugins/ot/505316</link>
            <guid>https://www.tenable.com/plugins/ot/505316</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Tenable OT Security Plugin ID 505316 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Detection of active Eaton devices.<br /></span>
      <h3>Description</h3>
      <span>The current plugin identifies Eaton devices that are still under active support.<br /></span><span>Eaton Lifecycle Statuses:<br /></span><span> - Active: Most current offering within a product category.<br /></span><span> - End of Life: Discontinued date announced - actively execute migrations and last time buys.<br /></span><span>Product generally orderable until the discontinued date.<br /></span><span> - Discontinued: Product no longer manufactured or procured. Repair/exchange services may be available.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/ot/505316">https://www.tenable.com/plugins/ot/505316</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 9 : nodejs:20 (RLSA-2026:7896)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306257</link>
            <guid>https://www.tenable.com/plugins/nessus/306257</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306257 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:7896 advisory.<br /></span><span><br /></span><span>    * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)<br /></span><span><br /></span><span>    * minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions     (CVE-2026-27904)<br /></span><span><br /></span><span>    * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination     (CVE-2026-27135)<br /></span><span><br /></span><span>    * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected nodejs-nodemon, nodejs-packaging and / or nodejs-packaging-bundler packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306257">https://www.tenable.com/plugins/nessus/306257</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Slackware Linux 15.0 / current libarchive  Vulnerability (SSA:2026-103-01)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306256</link>
            <guid>https://www.tenable.com/plugins/nessus/306256</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306256 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Slackware Linux host is missing a security update to libarchive.<br /></span>
      <h3>Description</h3>
      <span>The version of libarchive installed on the remote host is prior to 3.8.7. It is, therefore, affected by a vulnerability as referenced in the SSA:2026-103-01 advisory.<br /></span><span><br /></span><span>    New libarchive packages are available for Slackware 15.0 and -current to fix security issues.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the libarchive security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the affected libarchive package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306256">https://www.tenable.com/plugins/nessus/306256</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 44 : ImageMagick / LibRaw / OpenImageIO / OpenImageIO2.5 / etc (2026-bef0050737)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306255</link>
            <guid>https://www.tenable.com/plugins/nessus/306255</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306255 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 44 host has packages installed that are affected by multiple vulnerabilities as referenced in the FEDORA-2026-bef0050737 advisory.<br /></span><span><br /></span><span>    LibRaw 0.22.1 and rebuilds<br /></span><span><br /></span><span>    ----<br /></span><span><br /></span><span>    Release 3.1.12.0 (Apr 1, 2026) -- compared to 3.1.11.0<br /></span><span><br /></span><span>    oiiotool: Better type understanding with -i:ch= and other cleanup #5056     texture: Fix texture overblur with st-blur parameters #5071 #5080 (by Pascal Lecocq) (3.1.12.0, 3.0.17.0)     IBA: Handle offset data windows in fillholes_pushpull #5105 (3.1.12.0, 3.0.17.0)     ImageInput: check_open fixes and new validity checks #5087 (3.1.12.0, 3.0.17.0)     bmp: Use check_open to guard against corrupt resolutions #5086 (3.1.12.0, 3.0.17.0)     heif: Fix invalid read writing 8-bit images with dimensions not a multiple of 64 #5095 (by Brecht Van     Lommel)     ico: Various validity checks and error handling for corruptions #5088 (3.1.12.0, 3.0.17.0)     jpeg: Improved safety and error reporting for jpeg and iptc #5081     jpeg2000: Suppress leak when reading with OpenJPH #5098     psd: Fixes against corrupt files with better validation #5089 (3.1.12.0, 3.0.17.0)     rla: Lots of additional validity checking and safety #5094 (3.1.12.0, 3.0.17.0)     tiff: Support GPS fields, and other metadata enhancements #5050     tiff: Fix buffer overrun and improve error reporting #5082, fix wrong number of values passed to     invert_photometric #5083, check for invalid bit depth in palette images #5091     ImageSpec: metadata_val improved safety #5096 (3.1.12.0, 3.0.17.0)     fix: Fix UB-sanitizer warning about alignment #5097     fix: Catch exceptions in print-uncaught-messages destructor #5103     fix: Enhanced exception safety for our use of OpenColorIO #5114     fix: Fix possible fmt exceptions where we might have passed null string #5115     build: Test building with clang 22.1, fix warnings uncovered #5067     build: Improve security by pinning auto-build dependencies by hash #5076     build: Include idiff in the python wheels we build #5104 (3.1.12.0, 3.0.17.0)     build(pybind11): Address new pybind11 float/int auto-conversion behavior #5058     build(win): Embed manifest in OIIO executables to enable long path handling #5066 (by Nathan Rusch)     ci: Add CI test for MSVS 2026 #5060 (3.1.12.0, 3.0.17.0)     ci: For security, replace workflow substitutions with safer env substitutions #5070     ci: Speed up slow benchmarks for debug and sanitizer CI tests #5077     ci: On Mac Intel CI variant, don't install openvdb, for speed #5065 (3.1.12.0, 3.0.17.0)     ci: Bump GitHub Actions to latest versions #5078 #5110 #5119     ci: Fix broken Mac CI and wheel building by specifying full compiler paths #5100 #5101 (3.1.12.0,     3.0.17.0)     ci: Update certificates to be able to install icc #5122 (3.1.12.0, 3.0.17.0)     ci: Turn off nightly workflows for user forks #5042     tests: New ref outputs for tiff-misc, heif no-avif, and ffmpeg 8.1 cases #5075 #5079 #5099 #5112     docs: Update description for dwaCompressionLevel #5074 (by Aamir Raza)     docs: Fix formatting examples for version macros #5073     docs: Keep TextureSystem docs in sync with ImageCache #5085 (3.1.12.0, 3.0.17.0)     docs: Fix typos and incorrect attribute name in a comment #5093 (3.1.12.0, 3.0.17.0)     docs: Fix misstatement about oiiotool --if #5102 (3.1.12.0, 3.0.17.0)     admin: Draft policy on use of AI coding assistants #5072 (3.1.12.0, 3.0.17.0)     ci: Freetype adjustments #4999<br /></span><span><br /></span><span>    ----<br /></span><span><br /></span><span>    Update to 5.1 (#2451401)<br /></span><span><br /></span><span>    ----<br /></span><span><br /></span><span>    Update to 5.0 (#2447841)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306255">https://www.tenable.com/plugins/nessus/306255</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 44 : flatpak (2026-24eedfaa6c)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306254</link>
            <guid>https://www.tenable.com/plugins/nessus/306254</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306254 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 44 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2026-24eedfaa6c advisory.<br /></span><span><br /></span><span>    Update to 1.17.6<br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected flatpak package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306254">https://www.tenable.com/plugins/nessus/306254</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : nodejs:20 (RHSA-2026:7896)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306253</link>
            <guid>https://www.tenable.com/plugins/nessus/306253</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306253 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for nodejs:20.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7896 advisory.<br /></span><span><br /></span><span>    Node.js is a software development platform for building fast and scalable network applications in the     JavaScript programming language.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)<br /></span><span><br /></span><span>    * minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions     (CVE-2026-27904)<br /></span><span><br /></span><span>    * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination     (CVE-2026-27135)<br /></span><span><br /></span><span>    * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL nodejs:20 package based on the guidance in RHSA-2026:7896.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306253">https://www.tenable.com/plugins/nessus/306253</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : go-toolset:rhel8 (RHSA-2026:7879)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306252</link>
            <guid>https://www.tenable.com/plugins/nessus/306252</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306252 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for go-toolset:rhel8.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7879 advisory.<br /></span><span><br /></span><span>    Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL go-toolset:rhel8 package based on the guidance in RHSA-2026:7879.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306252">https://www.tenable.com/plugins/nessus/306252</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 9 : perl-XML-Parser (ELSA-2026-7679)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306251</link>
            <guid>https://www.tenable.com/plugins/nessus/306251</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306251 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 9 host has a package installed that is affected by multiple vulnerabilities as referenced in the ELSA-2026-7679 advisory.<br /></span><span><br /></span><span>    [2.46-9.1.0.1]<br /></span><span>    - Add perl(LWP), perl(URI), perl(URI::file) Requires<br /></span><span><br /></span><span>    [2.46-9.1]<br /></span><span>    - Fix CVE-2006-10002, CVE-2006-10003<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected perl-XML-Parser package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306251">https://www.tenable.com/plugins/nessus/306251</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 8 : nodejs:24 (ELSA-2026-7670)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306250</link>
            <guid>https://www.tenable.com/plugins/nessus/306250</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306250 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2026-7670 advisory.<br /></span><span><br /></span><span>    nodejs     [1:24.14.1-2]<br /></span><span>    - Update bundled nghttp2 to 1.68.1       Related: RHEL-151374<br /></span><span><br /></span><span>    [1:24.14.1-1]<br /></span><span>    - Update to 24.14.0       Resolves: RHEL-151374<br /></span><span><br /></span><span>    nodejs-nodemon     [3.0.3-1]<br /></span><span>    - Initial import into nodejs:24 module<br /></span><span><br /></span><span>    nodejs-packaging     [2021.06-6]<br /></span><span>    - Properly handle @group/package deps in nodejs-symlink-deps       Resolves: RHEL-121576<br /></span><span><br /></span><span>    [2021.06-5]<br /></span><span>    - nodejs.req to properly detect bundled deps<br /></span><span><br /></span><span>    [2021.06-4]<br /></span><span>    - NPM bundler: also find namespaced bundled dependencies<br /></span><span><br /></span><span>    [2021.06-3]<br /></span><span>    - Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild<br /></span><span><br /></span><span>    [2021.06-2]<br /></span><span>    - Fix hard-coded output directory in the bundler<br /></span><span><br /></span><span>    [2021.06-1]<br /></span><span>    - Update to 2021.06-1<br /></span><span>    - bundler: Handle archaic license metadata<br /></span><span>    - bundler: Warn about bundled dependencies with no license metadata<br /></span><span><br /></span><span>    [2021.01-3]<br /></span><span>    - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild<br /></span><span><br /></span><span>    [2021.01-2]<br /></span><span>    - nodejs-packaging-bundler improvements to handle uncommon characters<br /></span><span><br /></span><span>    [2021.01]<br /></span><span>    - Add nodejs-packaging-bundler and update README.md<br /></span><span><br /></span><span>    [2020.09-1]<br /></span><span>    - Move to dist-git as the upstream<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306250">https://www.tenable.com/plugins/nessus/306250</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 10 : vim (ELSA-2026-7711)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306249</link>
            <guid>https://www.tenable.com/plugins/nessus/306249</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306249 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2026-7711 advisory.<br /></span><span><br /></span><span>    - RHEL-159615 CVE-2026-33412 vim: Vim: Arbitrary code execution via command injection in glob() function<br /></span><span>    - RHEL-155409 CVE-2026-28421 vim: Vim: Denial of service and information disclosure via crafted swap file<br /></span><span>    - RHEL-155425 CVE-2026-28417 vim: Vim: Arbitrary code execution via OS command injection in the netrw     plugin<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306249">https://www.tenable.com/plugins/nessus/306249</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-28291]]></title>
            <link>https://www.tenable.com/plugins/nessus/306248</link>
            <guid>https://www.tenable.com/plugins/nessus/306248</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306248 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - simple-git enables running native Git commands from JavaScript. Versions up to and including 3.31.1 allow     execution of arbitrary commands through Git option manipulation, bypassing safety checks meant to block     dangerous options like -u and --upload-pack. The flaw stems from an incomplete fix for CVE-2022-25860, as     Git's flexible option parsing allows numerous character combinations (e.g., -vu, -4u, -nu) to circumvent     the regular-expression-based blocklist in the unsafe operations plugin. Due to the virtually infinite     number of valid option variants that Git accepts, a complete blocklist-based mitigation may be infeasible     without fully emulating Git's option parsing behavior. This issue has been fixed in version 3.32.0.<br /></span><span>    (CVE-2026-28291)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306248">https://www.tenable.com/plugins/nessus/306248</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-29043]]></title>
            <link>https://www.tenable.com/plugins/nessus/306247</link>
            <guid>https://www.tenable.com/plugins/nessus/306247</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306247 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - HDF5 is software for managing data. In 1.14.1-2 and earlier, an attacker who can control an h5 file parsed     by HDF5 can trigger a write-based heap buffer overflow condition in the H5T__ref_mem_setnull method. This     can lead to a denial-of-service condition, and potentially further issues such as remote code execution     depending on the practical exploitability of the heap overflow against modern operating systems.<br /></span><span>    (CVE-2026-29043)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306247">https://www.tenable.com/plugins/nessus/306247</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-32316]]></title>
            <link>https://www.tenable.com/plugins/nessus/306246</link>
            <guid>https://www.tenable.com/plugins/nessus/306246</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306246 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - jq is a command-line JSON processor. An integer overflow vulnerability exists through version 1.8.1 within     the jvp_string_append() and jvp_string_copy_replace_bad functions, where concatenating strings with a     combined length exceeding 2^31 bytes causes a 32-bit unsigned integer overflow in the buffer allocation     size calculation, resulting in a drastically undersized heap buffer. Subsequent memory copy operations     then write the full string data into this undersized buffer, causing a heap buffer overflow classified as     CWE-190 (Integer Overflow) leading to CWE-122 (Heap-based Buffer Overflow). Any system evaluating     untrusted jq queries is affected, as an attacker can crash the process or potentially achieve further     exploitation through heap corruption by crafting queries that produce extremely large strings. The root     cause is the absence of string size bounds checking, unlike arrays and objects which already have size     limits. The issue has been addressed in commit e47e56d226519635768e6aab2f38f0ab037c09e5. (CVE-2026-32316)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306246">https://www.tenable.com/plugins/nessus/306246</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-6231]]></title>
            <link>https://www.tenable.com/plugins/nessus/306245</link>
            <guid>https://www.tenable.com/plugins/nessus/306245</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306245 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - The bson_validate function may return early on specific inputs and incorrectly report success. This     behavior could result in skipping validation for BSON data, allowing malformed or invalid UTF-8 sequences     to bypass validation and be processed incorrectly. The issue may affect applications that rely on these     functions to validate untrusted BSON data before further processing. This issue affects MongoDB C Driver     versions prior to 1.30.5, MongoDB C Driver version 2.0.0 and MongoDB C Driver version 2.0.1     (CVE-2026-6231)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306245">https://www.tenable.com/plugins/nessus/306245</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-6100]]></title>
            <link>https://www.tenable.com/plugins/nessus/306244</link>
            <guid>https://www.tenable.com/plugins/nessus/306244</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306244 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and     `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-     used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the     dangling pointer in this specific error condition. The vulnerability is only present if the program re-     uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised     during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`,     `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor     instance is used per call. If the decompressor instance is not re-used after an error condition, this     usage is similarly not vulnerable. (CVE-2026-6100)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306244">https://www.tenable.com/plugins/nessus/306244</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-33555]]></title>
            <link>https://www.tenable.com/plugins/nessus/306243</link>
            <guid>https://www.tenable.com/plugins/nessus/306243</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306243 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body     length matches a previously announced content-length when the stream is closed via a frame with an empty     payload. This can cause desynchronization issues with the backend server and could be used for request     smuggling. The earliest affected version is 2.6. (CVE-2026-33555)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306243">https://www.tenable.com/plugins/nessus/306243</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-6192]]></title>
            <link>https://www.tenable.com/plugins/nessus/306242</link>
            <guid>https://www.tenable.com/plugins/nessus/306242</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306242 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A vulnerability was identified in uclouvain openjpeg up to 2.5.4. This impacts the function     opj_pi_initialise_encode in the library src/lib/openjp2/pi.c. The manipulation leads to integer overflow.<br /></span><span>    The attack must be carried out locally. The exploit is publicly available and might be used. The     identifier of the patch is 839936aa33eb8899bbbd80fda02796bb65068951. It is suggested to install a patch to     address this issue. (CVE-2026-6192)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306242">https://www.tenable.com/plugins/nessus/306242</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40394]]></title>
            <link>https://www.tenable.com/plugins/nessus/306241</link>
            <guid>https://www.tenable.com/plugins/nessus/306241</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306241 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Varnish Cache 9 before 9.0.1 and Varnish Enterprise before 6.0.16r11 allows a workspace overflow denial     of service (daemon panic) for certain amounts of prefetched data. The setup of an HTTP/2 session starts     with a speculative HTTP/1 transport, and upon upgrading to h2 the HTTP/1 request is repurposed as stream     zero. During the upgrade, a buffer allocation is made to reserve space to send frames to the client. This     allocation would split the original workspace, and depending on the amount of prefetched data, the next     fetch could perform a pipelining operation that would run out of workspace. (CVE-2026-40394)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306241">https://www.tenable.com/plugins/nessus/306241</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : mod_security_crs (ALAS2023-2026-1562)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306240</link>
            <guid>https://www.tenable.com/plugins/nessus/306240</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306240 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1562 advisory.<br /></span><span><br /></span><span>    Whitespace padding in filenames bypasses file upload extension checks<br /></span><span><br /></span><span>    NOTE: https://github.com/coreruleset/coreruleset/security/advisories/GHSA-rw5f-9w43-gv2w (CVE-2026-33691)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update mod_security_crs --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1562 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306240">https://www.tenable.com/plugins/nessus/306240</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : containerd, containerd-stress (ALAS2023-2026-1534)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306239</link>
            <guid>https://www.tenable.com/plugins/nessus/306239</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306239 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1534 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update containerd --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1534 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306239">https://www.tenable.com/plugins/nessus/306239</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : corosync, corosync-vqsim, corosynclib (ALAS2023-2026-1560)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306238</link>
            <guid>https://www.tenable.com/plugins/nessus/306238</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306238 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1560 advisory.<br /></span><span><br /></span><span>    A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value     vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User     Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS)     and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in     totemudp/totemudpu mode, which is the default configuration. (CVE-2026-35091)<br /></span><span><br /></span><span>    A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity     validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets.<br /></span><span>    This can cause the service to crash, leading to a denial of service. This vulnerability specifically     affects Corosync deployments configured to use totemudp/totemudpu mode. (CVE-2026-35092)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update corosync --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1560 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306238">https://www.tenable.com/plugins/nessus/306238</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : yq (ALAS2023-2026-1582)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306237</link>
            <guid>https://www.tenable.com/plugins/nessus/306237</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306237 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1582 advisory.<br /></span><span><br /></span><span>    The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain     inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.<br /></span><span>    (CVE-2025-47911)<br /></span><span><br /></span><span>    The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain     inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.<br /></span><span>    (CVE-2025-58190)<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update yq --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1582 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306237">https://www.tenable.com/plugins/nessus/306237</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : oci-add-hooks (ALAS2023-2026-1575)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306236</link>
            <guid>https://www.tenable.com/plugins/nessus/306236</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306236 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1575 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update oci-add-hooks --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1575 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306236">https://www.tenable.com/plugins/nessus/306236</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : nodejs24, nodejs24-devel, nodejs24-full-i18n (ALAS2023-2026-1578)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306235</link>
            <guid>https://www.tenable.com/plugins/nessus/306235</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306235 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1578 advisory.<br /></span><span><br /></span><span>    A flaw in Node.js HTTP request handling causes an uncaught TypeError when a request is received with a     header named __proto__ and the application accesses req.headersDistinct.<br /></span><span><br /></span><span>    When this occurs, dest[__proto__] resolves to Object.prototype rather than undefined, causing .push() to     be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be     intercepted by error event listeners, meaning it cannot be handled without wrapping every     req.headersDistinct access in a try/catch.<br /></span><span><br /></span><span>    This vulnerability affects all Node.js HTTP servers on 20.x, 22.x, 24.x, and v25.x<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#denial-of-service-via-<br /></span><span>    __proto__-header-name-in-reqheadersdistinct-uncaught-typeerror-crashes-nodejs-process-cve-2026-21710---     high (CVE-2026-21710)<br /></span><span><br /></span><span>    A flaw in Node.js URL processing causes an assertion failure in native code when url.format() is called     with a malformed internationalized domain name (IDN) containing invalid characters, crashing the Node.js     process.<br /></span><span><br /></span><span>    This vulnerability affects 24.x and 25.x.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#assertion-error-in-node_urlcc-     via-malformed-url-format-leads-to-nodejs-crash-cve-2026-21712---medium (CVE-2026-21712)<br /></span><span><br /></span><span>    A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided     signatures, potentially leaking timing information proportional to the number of matching bytes. Under     certain threat models where high-resolution timing measurements are possible, this behavior could be     exploited as a timing oracle to infer HMAC values.<br /></span><span><br /></span><span>    Node.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this     is an oversight rather than an intentional design decision.<br /></span><span><br /></span><span>    This vulnerability affects 20.x, 22.x, 24.x, and 25.x.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#timing-side-channel-in-hmac-     verification-via-memcmp-in-crypto_hmaccc-leads-to-potential-mac-forgery-cve-2026-21713---medium     (CVE-2026-21713)<br /></span><span><br /></span><span>    A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0     (connection-level) that cause the flow control window to exceed the maximum value of 231-1. The server     correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up.<br /></span><span><br /></span><span>    This vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#memory-leak-in-nodejs-     http2-server-via-window_update-on-stream-0-leads-to-resource-exhaustion-cve-2026-21714---medium     (CVE-2026-21714)<br /></span><span><br /></span><span>    A flaw in Node.js Permission Model filesystem enforcement leaves fs.realpathSync.native() without the     required read permission checks, while all comparable filesystem functions correctly enforce them. As a     result, code running under --permission with restricted --allow-fs-read can still use     fs.realpathSync.native() to check file existence, resolve symlink targets, and enumerate filesystem paths     outside of permitted directories.This vulnerability affects 20.x, 22.x, 24.x, and 25.x processes using the     Permission Model where --allow-fs-read is intentionally restricted.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#permission-model-bypass-in-     realpathsyncnative-allows-file-existence-disclosure-cve-2026-21715---low (CVE-2026-21715)<br /></span><span><br /></span><span>    An incomplete fix for CVE-2024-36137 leaves FileHandle.chmod() and FileHandle.chown() in the promises API     without the required permission checks, while their callback-based equivalents (fs.fchmod(), fs.fchown())     were correctly patched.<br /></span><span><br /></span><span>    As a result, code running under --permission with restricted --allow-fs-write can still use promise-based     FileHandle methods to modify file permissions and ownership on already-open file descriptors, bypassing     the intended write restrictions.<br /></span><span><br /></span><span>    This vulnerability affects 20.x, 22.x, 24.x, and 25.x processes using the Permission Model where --allow-     fs-write is intentionally restricted.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#cve-2024-36137-patch-bypass---     filehandlechmodchown-cve-2026-21716---low (CVE-2026-21716)<br /></span><span><br /></span><span>    A flaw in V8's string hashing mechanism causes integer-like strings to be hashed to their numeric value,     making hash collisions trivially predictable. By crafting a request that causes many such collisions in     V8's internal string table, an attacker can significantly degrade performance of the Node.js process.<br /></span><span><br /></span><span>    The most common trigger is any endpoint that calls JSON.parse() on attacker-controlled input, as JSON     parsing automatically internalizes short strings into the affected hash table.<br /></span><span><br /></span><span>    This vulnerability affects 20.x, 22.x, 24.x, and 25.x.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#hashdos-in-v8-cve-2026-21717<br /></span><span>    ---medium (CVE-2026-21717)<br /></span><span><br /></span><span>    node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an     attacker-controlled archive can create a hardlink inside the extraction directory that points to a file     outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is     high because the primitive bypasses path protections and turns archive extraction into a direct filesystem     access primitive. This issue has been fixed in version 7.5.8. (CVE-2026-26960)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update nodejs24 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1578 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306235">https://www.tenable.com/plugins/nessus/306235</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : openexr, openexr-devel, openexr-libs (ALAS2023-2026-1561)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306234</link>
            <guid>https://www.tenable.com/plugins/nessus/306234</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306234 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1561 advisory.<br /></span><span><br /></span><span>    OpenEXR provides the specification and reference implementation of the EXR file format, an image storage     format for the motion picture industry. From version 3.4.0 to before version 3.4.8, a crafted B44 or B44A     EXR file can cause an out-of-bounds write in any application that decodes it via exr_decoding_run().<br /></span><span>    Consequences range from immediate crash (most likely) to corruption of adjacent heap allocations (layout-     dependent). This issue has been patched in version 3.4.8. (CVE-2026-34544)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update openexr --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1561 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306234">https://www.tenable.com/plugins/nessus/306234</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : cargo-c (ALAS2023-2026-1566)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306233</link>
            <guid>https://www.tenable.com/plugins/nessus/306233</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306233 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1566 advisory.<br /></span><span><br /></span><span>    tar-rs is a tar archive reading/writing library for Rust. Versions 0.4.44 and below have conditional logic     that skips the PAX size header in cases where the base header size is nonzero. As part of CVE-2025-62518,     the astral-tokio-tar project was changed to correctly honor PAX size headers in the case where it was     different from the base header. This is almost the inverse of the astral-tokio-tar issue. Any discrepancy     in how tar parsers honor file size can be used to create archives that appear differently when unpacked by     different archivers. In this case, the tar-rs (Rust tar) crate is an outlier in checking for the header     size - other tar parsers (including e.g. Go archive/tar) unconditionally use the PAX size override. This     can affect anything that uses the tar crate to parse archives and expects to have a consistent view with     other parsers. This issue has been fixed in version 0.4.45. (CVE-2026-33055)<br /></span><span><br /></span><span>    tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and below, when unpacking a     tar archive, the tar crate's unpack_dir function uses fs::metadata() to check whether a path that already     exists is a directory. Because fs::metadata() follows symbolic links, a crafted tarball containing a     symlink entry followed by a directory entry with the same name causes the crate to treat the symlink     target as a valid existing directory -- and subsequently apply chmod to it. This allows an attacker to     modify the permissions of arbitrary directories outside the extraction root. This issue has been fixed in     version 0.4.45. (CVE-2026-33056)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update rust-cargo-c --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1566 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306233">https://www.tenable.com/plugins/nessus/306233</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : libtiff, libtiff-devel, libtiff-static (ALAS2023-2026-1547)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306232</link>
            <guid>https://www.tenable.com/plugins/nessus/306232</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306232 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1547 advisory.<br /></span><span><br /></span><span>    A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow     vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This     flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially     causing a denial of service (application crash) or arbitrary code execution. (CVE-2026-4775)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update libtiff --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1547 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306232">https://www.tenable.com/plugins/nessus/306232</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : squid (ALAS2023-2026-1569)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306231</link>
            <guid>https://www.tenable.com/plugins/nessus/306231</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306231 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1569 advisory.<br /></span><span><br /></span><span>    Squid is a caching proxy for the Web. Prior to version 7.5, due to premature release of resource during     expected lifetime and heap Use-After-Free bugs, Squid is vulnerable to Denial of Service when handling ICP     traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service     attack against the Squid service using ICP protocol. This attack is limited to Squid deployments that     explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem _cannot_ be mitigated by     denying ICP queries using `icp_access` rules. This bug is fixed in Squid version 7.5.<br /></span><span><br /></span><span>    NOTE: https://www.openwall.com/lists/oss-security/2026/03/25/3NOTE: Fixed by: https://github.com/squid-     cache/squid/commit/703e07d25ca6fa11f52d20bf0bb879e22ab7481b (SQUID_7_5) (CVE-2026-32748)<br /></span><span><br /></span><span>    Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-After-Free, Squid is     vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to     perform a reliable and repeatable Denial of Service attack against the Squid service using ICP protocol.<br /></span><span>    This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero     `icp_port`). This problem _cannot_ be mitigated by denying ICP queries using `icp_access` rules. Version     7.5 contains a patch.<br /></span><span><br /></span><span>    NOTE: https://www.openwall.com/lists/oss-security/2026/03/25/2NOTE: Fixed by: https://github.com/squid-     cache/squid/commit/8a7d42f9d44befb8fcbbb619505587c8de6a1e91 (SQUID_7_5) (CVE-2026-33526)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update squid --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1569 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306231">https://www.tenable.com/plugins/nessus/306231</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : sudo, sudo-devel, sudo-logsrvd (ALAS2023-2026-1559)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306230</link>
            <guid>https://www.tenable.com/plugins/nessus/306230</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306230 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1559 advisory.<br /></span><span><br /></span><span>    In Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgroups call, during a     privilege drop before running the mailer, is not a fatal error and can lead to privilege escalation.<br /></span><span>    (CVE-2026-35535)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update sudo --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1559 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306230">https://www.tenable.com/plugins/nessus/306230</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : python3.12, python3.12-devel, python3.12-idle (ALAS2023-2026-1557)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306229</link>
            <guid>https://www.tenable.com/plugins/nessus/306229</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306229 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1557 advisory.<br /></span><span><br /></span><span>    The webbrowser.open() API would accept leading dashes in the URL whichcould be handled as command line     options for certain web browsers. Newbehavior rejects leading dashes. Users are recommended to sanitize     URLsprior to passing to webbrowser.open(). (CVE-2026-4519)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update python3.12 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1557 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306229">https://www.tenable.com/plugins/nessus/306229</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : amazon-cloudwatch-agent (ALAS2023-2026-1572)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306228</link>
            <guid>https://www.tenable.com/plugins/nessus/306228</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306228 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1572 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update amazon-cloudwatch-agent --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1572 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306228">https://www.tenable.com/plugins/nessus/306228</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : tracker-miners (ALAS2023-2026-1580)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306227</link>
            <guid>https://www.tenable.com/plugins/nessus/306227</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306227 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1580 advisory.<br /></span><span><br /></span><span>    A flaw was found in GNOME localsearch MP3 Extractor. When processing specially crafted MP3 files     containing ID3v2.4 tags, a missing bounds check in the `extract_performers_tags` function can lead to a     heap buffer overflow. This vulnerability allows a remote attacker to cause a Denial of Service (DoS) by     triggering a read of unmapped memory. In some cases, it could also lead to information disclosure by     reading visible heap data. (CVE-2026-1764)<br /></span><span><br /></span><span>    A flaw was found in the `tracker-extract-mp3` component of GNOME localsearch. This vulnerability, a heap     buffer overflow, occurs when processing specially crafted MP3 files. A remote attacker could exploit this     by providing a malicious MP3 file, leading to a Denial of Service (DoS) where the application crashes. It     may also potentially expose sensitive information from the system's memory. (CVE-2026-1765)<br /></span><span><br /></span><span>    A flaw was found in GNOME localsearch MP3 Extractor, specifically within the tracker-extract-mp3     component. This heap buffer overflow vulnerability occurs when processing specially crafted MP3 files     containing malformed ID3v2.3 COMM (Comment) tags. An attacker could exploit this by providing a malicious     MP3 file, leading to a denial of service (DoS), which causes an application crash, and potentially     disclosing sensitive information from the heap memory. (CVE-2026-1766)<br /></span><span><br /></span><span>    A flaw was found in the GNOME localsearch MP3 Extractor `tracker-extract-mp3` component. A remote attacker     could exploit this heap buffer overflow vulnerability by providing a specially crafted MP3 file containing     malformed ID3 tags. This incorrect length calculation during the parsing of performer tags can lead to a     read beyond the allocated buffer, potentially causing a Denial of Service (DoS) due to a crash or enabling     information disclosure. (CVE-2026-1767)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update tracker-miners --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1580 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306227">https://www.tenable.com/plugins/nessus/306227</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : nodejs20, nodejs20-devel, nodejs20-full-i18n (ALAS2023-2026-1577)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306226</link>
            <guid>https://www.tenable.com/plugins/nessus/306226</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306226 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1577 advisory.<br /></span><span><br /></span><span>    A flaw in Node.js HTTP request handling causes an uncaught TypeError when a request is received with a     header named __proto__ and the application accesses req.headersDistinct.<br /></span><span><br /></span><span>    When this occurs, dest[__proto__] resolves to Object.prototype rather than undefined, causing .push() to     be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be     intercepted by error event listeners, meaning it cannot be handled without wrapping every     req.headersDistinct access in a try/catch.<br /></span><span><br /></span><span>    This vulnerability affects all Node.js HTTP servers on 20.x, 22.x, 24.x, and v25.x<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#denial-of-service-via-<br /></span><span>    __proto__-header-name-in-reqheadersdistinct-uncaught-typeerror-crashes-nodejs-process-cve-2026-21710---     high (CVE-2026-21710)<br /></span><span><br /></span><span>    A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided     signatures, potentially leaking timing information proportional to the number of matching bytes. Under     certain threat models where high-resolution timing measurements are possible, this behavior could be     exploited as a timing oracle to infer HMAC values.<br /></span><span><br /></span><span>    Node.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this     is an oversight rather than an intentional design decision.<br /></span><span><br /></span><span>    This vulnerability affects 20.x, 22.x, 24.x, and 25.x.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#timing-side-channel-in-hmac-     verification-via-memcmp-in-crypto_hmaccc-leads-to-potential-mac-forgery-cve-2026-21713---medium     (CVE-2026-21713)<br /></span><span><br /></span><span>    A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0     (connection-level) that cause the flow control window to exceed the maximum value of 231-1. The server     correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up.<br /></span><span><br /></span><span>    This vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#memory-leak-in-nodejs-     http2-server-via-window_update-on-stream-0-leads-to-resource-exhaustion-cve-2026-21714---medium     (CVE-2026-21714)<br /></span><span><br /></span><span>    A flaw in Node.js Permission Model filesystem enforcement leaves fs.realpathSync.native() without the     required read permission checks, while all comparable filesystem functions correctly enforce them. As a     result, code running under --permission with restricted --allow-fs-read can still use     fs.realpathSync.native() to check file existence, resolve symlink targets, and enumerate filesystem paths     outside of permitted directories.This vulnerability affects 20.x, 22.x, 24.x, and 25.x processes using the     Permission Model where --allow-fs-read is intentionally restricted.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#permission-model-bypass-in-     realpathsyncnative-allows-file-existence-disclosure-cve-2026-21715---low (CVE-2026-21715)<br /></span><span><br /></span><span>    An incomplete fix for CVE-2024-36137 leaves FileHandle.chmod() and FileHandle.chown() in the promises API     without the required permission checks, while their callback-based equivalents (fs.fchmod(), fs.fchown())     were correctly patched.<br /></span><span><br /></span><span>    As a result, code running under --permission with restricted --allow-fs-write can still use promise-based     FileHandle methods to modify file permissions and ownership on already-open file descriptors, bypassing     the intended write restrictions.<br /></span><span><br /></span><span>    This vulnerability affects 20.x, 22.x, 24.x, and 25.x processes using the Permission Model where --allow-     fs-write is intentionally restricted.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#cve-2024-36137-patch-bypass---     filehandlechmodchown-cve-2026-21716---low (CVE-2026-21716)<br /></span><span><br /></span><span>    A flaw in V8's string hashing mechanism causes integer-like strings to be hashed to their numeric value,     making hash collisions trivially predictable. By crafting a request that causes many such collisions in     V8's internal string table, an attacker can significantly degrade performance of the Node.js process.<br /></span><span><br /></span><span>    The most common trigger is any endpoint that calls JSON.parse() on attacker-controlled input, as JSON     parsing automatically internalizes short strings into the affected hash table.<br /></span><span><br /></span><span>    This vulnerability affects 20.x, 22.x, 24.x, and 25.x.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#hashdos-in-v8-cve-2026-21717<br /></span><span>    ---medium (CVE-2026-21717)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update nodejs20 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1577 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306226">https://www.tenable.com/plugins/nessus/306226</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : python3.11, python3.11-devel, python3.11-idle (ALAS2023-2026-1558)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306225</link>
            <guid>https://www.tenable.com/plugins/nessus/306225</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306225 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1558 advisory.<br /></span><span><br /></span><span>    The webbrowser.open() API would accept leading dashes in the URL whichcould be handled as command line     options for certain web browsers. Newbehavior rejects leading dashes. Users are recommended to sanitize     URLsprior to passing to webbrowser.open(). (CVE-2026-4519)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update python3.11 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1558 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306225">https://www.tenable.com/plugins/nessus/306225</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : libnghttp2, libnghttp2-devel, nghttp2 (ALAS2023-2026-1542)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306224</link>
            <guid>https://www.tenable.com/plugins/nessus/306224</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306224 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1542 advisory.<br /></span><span><br /></span><span>    nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1,     the nghttp2 library stops reading the incoming data when user facing public API     `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application.<br /></span><span>    They might be called internally by the library when it detects the situation that is subject to connection     error. Due to the missing internal state validation, the library keeps reading the rest of the data after     one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes     assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known     workarounds are available. (CVE-2026-27135)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update nghttp2 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1542 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306224">https://www.tenable.com/plugins/nessus/306224</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : credentials-fetcher (ALAS2023-2026-1551)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306223</link>
            <guid>https://www.tenable.com/plugins/nessus/306223</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306223 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1551 advisory.<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update credentials-fetcher --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1551 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306223">https://www.tenable.com/plugins/nessus/306223</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : python3.13, python3.13-devel, python3.13-freethreading (ALAS2023-2026-1555)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306222</link>
            <guid>https://www.tenable.com/plugins/nessus/306222</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306222 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1555 advisory.<br /></span><span><br /></span><span>    The webbrowser.open() API would accept leading dashes in the URL whichcould be handled as command line     options for certain web browsers. Newbehavior rejects leading dashes. Users are recommended to sanitize     URLsprior to passing to webbrowser.open(). (CVE-2026-4519)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update python3.13 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1555 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306222">https://www.tenable.com/plugins/nessus/306222</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : nerdctl (ALAS2023-2026-1535)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306221</link>
            <guid>https://www.tenable.com/plugins/nessus/306221</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306221 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1535 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update nerdctl --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1535 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306221">https://www.tenable.com/plugins/nessus/306221</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : dovecot, dovecot-devel, dovecot-mysql (ALAS2023-2026-1570)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306220</link>
            <guid>https://www.tenable.com/plugins/nessus/306220</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306220 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1570 advisory.<br /></span><span><br /></span><span>    Doveadm credentials are verified using direct comparison which is susceptible to timing oracle attack. An     attacker can use this to determine the configured credentials. Figuring out the credential will lead into     full access to the affected component. Limit access to the doveadm http service port, install fixed     version. No publicly available exploits are known. (CVE-2026-27856)<br /></span><span><br /></span><span>    Sending NOOP (((...))) command with 4000 parenthesis open+close results in ~1MB extra memory usage.<br /></span><span>    Longer commands will result in client disconnection. This 1 MB can be left allocated for longer time     periods by not sending the command ending LF. So attacker could connect possibly from even a single IP and     create 1000 connections to allocate 1 GB of memory, which would likely result in reaching VSZ limit and     killing the process and its other proxied connections. Attacker could connect possibly from even a single     IP and create 1000 connections to allocate 1 GB of memory, which would likely result in reaching VSZ limit     and killing the process and its other proxied connections. Install fixed version, there is no other     remediation. No publicly available exploits are known. (CVE-2026-27857)<br /></span><span><br /></span><span>    Attacker can send a specifically crafted message before authentication that causes managesieve to allocate     large amount of memory.Attacker can force managesieve-login to be unavailable by repeatedly crashing the     process. Protect access to managesieve protocol, or install fixed version. No publicly available exploits     are known. (CVE-2026-27858)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update dovecot --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1570 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306220">https://www.tenable.com/plugins/nessus/306220</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : python3.14, python3.14-devel, python3.14-freethreading (ALAS2023-2026-1556)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306219</link>
            <guid>https://www.tenable.com/plugins/nessus/306219</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306219 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1556 advisory.<br /></span><span><br /></span><span>    The webbrowser.open() API would accept leading dashes in the URL whichcould be handled as command line     options for certain web browsers. Newbehavior rejects leading dashes. Users are recommended to sanitize     URLsprior to passing to webbrowser.open(). (CVE-2026-4519)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update python3.14 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1556 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306219">https://www.tenable.com/plugins/nessus/306219</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : nginx, nginx-all-modules, nginx-core (ALAS2023-2026-1540)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306218</link>
            <guid>https://www.tenable.com/plugins/nessus/306218</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306218 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1540 advisory.<br /></span><span><br /></span><span>    When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed     requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP     authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait     response header. Note: Software versions which have reached End of Technical Support (EoTS) are not     evaluated. (CVE-2026-27651)<br /></span><span><br /></span><span>    NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow     an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in     termination of the NGINX worker process or modification of source or destination file names outside the     document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV     module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias     directives. The integrity impact is constrained because the NGINX worker process user has low privileges     and does not have access to the entire system. Note: Software versions which have reached End of Technical     Support (EoTS) are not evaluated. (CVE-2026-27654)<br /></span><span><br /></span><span>    The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module,     which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination,     using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with     the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the     attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the     ngx_http_mp4_module module.<br /></span><span><br /></span><span>    Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br /></span><span>    (CVE-2026-27784)<br /></span><span><br /></span><span>    NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the     improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to     inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note:<br /></span><span>    Software versions which have reached End of Technical Support (EoTS) are not evaluated. (CVE-2026-28753)<br /></span><span><br /></span><span>    NGINX Plus and NGINX Open Source have a vulnerability in the ngx_stream_ssl_module module due to the     improper handling of revoked certificates when configured with the ssl_verify_client on and ssl_ocsp on     directives, allowing the TLS handshake to succeed even after an OCSP check identifies the certificate as     revoked.<br /></span><span><br /></span><span>    Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br /></span><span>    (CVE-2026-28755)<br /></span><span><br /></span><span>    NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow     an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its     termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open     Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in     the configuration file. Additionally, the attack is possible only if an attacker can trigger the     processing of a specially crafted MP4 file with the ngx_http_mp4_module module.<br /></span><span><br /></span><span>    Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br /></span><span>    (CVE-2026-32647)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update nginx --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1540 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306218">https://www.tenable.com/plugins/nessus/306218</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : nodejs22, nodejs22-devel, nodejs22-full-i18n (ALAS2023-2026-1576)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306217</link>
            <guid>https://www.tenable.com/plugins/nessus/306217</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306217 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1576 advisory.<br /></span><span><br /></span><span>    A flaw in Node.js HTTP request handling causes an uncaught TypeError when a request is received with a     header named __proto__ and the application accesses req.headersDistinct.<br /></span><span><br /></span><span>    When this occurs, dest[__proto__] resolves to Object.prototype rather than undefined, causing .push() to     be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be     intercepted by error event listeners, meaning it cannot be handled without wrapping every     req.headersDistinct access in a try/catch.<br /></span><span><br /></span><span>    This vulnerability affects all Node.js HTTP servers on 20.x, 22.x, 24.x, and v25.x<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#denial-of-service-via-<br /></span><span>    __proto__-header-name-in-reqheadersdistinct-uncaught-typeerror-crashes-nodejs-process-cve-2026-21710---     high (CVE-2026-21710)<br /></span><span><br /></span><span>    A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided     signatures, potentially leaking timing information proportional to the number of matching bytes. Under     certain threat models where high-resolution timing measurements are possible, this behavior could be     exploited as a timing oracle to infer HMAC values.<br /></span><span><br /></span><span>    Node.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this     is an oversight rather than an intentional design decision.<br /></span><span><br /></span><span>    This vulnerability affects 20.x, 22.x, 24.x, and 25.x.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#timing-side-channel-in-hmac-     verification-via-memcmp-in-crypto_hmaccc-leads-to-potential-mac-forgery-cve-2026-21713---medium     (CVE-2026-21713)<br /></span><span><br /></span><span>    A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0     (connection-level) that cause the flow control window to exceed the maximum value of 231-1. The server     correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up.<br /></span><span><br /></span><span>    This vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#memory-leak-in-nodejs-     http2-server-via-window_update-on-stream-0-leads-to-resource-exhaustion-cve-2026-21714---medium     (CVE-2026-21714)<br /></span><span><br /></span><span>    A flaw in Node.js Permission Model filesystem enforcement leaves fs.realpathSync.native() without the     required read permission checks, while all comparable filesystem functions correctly enforce them. As a     result, code running under --permission with restricted --allow-fs-read can still use     fs.realpathSync.native() to check file existence, resolve symlink targets, and enumerate filesystem paths     outside of permitted directories.This vulnerability affects 20.x, 22.x, 24.x, and 25.x processes using the     Permission Model where --allow-fs-read is intentionally restricted.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#permission-model-bypass-in-     realpathsyncnative-allows-file-existence-disclosure-cve-2026-21715---low (CVE-2026-21715)<br /></span><span><br /></span><span>    An incomplete fix for CVE-2024-36137 leaves FileHandle.chmod() and FileHandle.chown() in the promises API     without the required permission checks, while their callback-based equivalents (fs.fchmod(), fs.fchown())     were correctly patched.<br /></span><span><br /></span><span>    As a result, code running under --permission with restricted --allow-fs-write can still use promise-based     FileHandle methods to modify file permissions and ownership on already-open file descriptors, bypassing     the intended write restrictions.<br /></span><span><br /></span><span>    This vulnerability affects 20.x, 22.x, 24.x, and 25.x processes using the Permission Model where --allow-     fs-write is intentionally restricted.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#cve-2024-36137-patch-bypass---     filehandlechmodchown-cve-2026-21716---low (CVE-2026-21716)<br /></span><span><br /></span><span>    A flaw in V8's string hashing mechanism causes integer-like strings to be hashed to their numeric value,     making hash collisions trivially predictable. By crafting a request that causes many such collisions in     V8's internal string table, an attacker can significantly degrade performance of the Node.js process.<br /></span><span><br /></span><span>    The most common trigger is any endpoint that calls JSON.parse() on attacker-controlled input, as JSON     parsing automatically internalizes short strings into the affected hash table.<br /></span><span><br /></span><span>    This vulnerability affects 20.x, 22.x, 24.x, and 25.x.<br /></span><span><br /></span><span>    NOTE: https://nodejs.org/en/blog/vulnerability/march-2026-security-releases#hashdos-in-v8-cve-2026-21717<br /></span><span>    ---medium (CVE-2026-21717)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update nodejs22 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1576 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306217">https://www.tenable.com/plugins/nessus/306217</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : firefox (ALAS2023-2026-1554)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306216</link>
            <guid>https://www.tenable.com/plugins/nessus/306216</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306216 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1554 advisory.<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE`     each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across     two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng     1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS`     sets `png_ptr->trans_alpha = info_ptr->trans_alpha` (256-byte buffer) and `png_set_PLTE` sets     `info_ptr->palette = png_ptr->palette` (768-byte buffer). In both cases, calling `png_free_data` (with     `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr`     pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to     the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both     functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes     the issue.<br /></span><span><br /></span><span>    NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7jNOTE:<br /></span><span>    https://github.com/pnggroup/libpng/pull/824NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/23019269764e35ed8458e517f1897bd3c54820eb (v1.6.56)NOTE: Fixed     by: https://github.com/pnggroup/libpng/commit/a3a21443ed12bfa1ef46fa0d4fb2b74a0fa34a25 (v1.6.56)NOTE:<br /></span><span>    Fixed by: https://github.com/pnggroup/libpng/commit/7ea9eea884a2328cc7fdcb3c0c00246a50d90667     (v1.6.56)NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/c1b0318b393c90679e6fa5bc1d329fd5d5012ec1 (v1.6.56)     (CVE-2026-33416)<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write     exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows     to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels     remain. Because the implementation works backward from the end of the row, the final iteration     dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the     same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG     input if Neon is enabled. Version 1.6.56 fixes the issue.<br /></span><span><br /></span><span>    NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2NOTE: Introduced with:<br /></span><span>    https://github.com/pnggroup/libpng/commit/7734cda20cf1236aef60f3bbd2267c97bbb40869 (v1.6.36)NOTE: Fixed     by: https://github.com/pnggroup/libpng/commit/aba9f18eba870d14fb52c5ba5d73451349e339c3 (v1.6.56)     (CVE-2026-33636)<br /></span><span><br /></span><span>    Race condition, use-after-free in the Graphics: WebRender component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4684)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4685)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4686)<br /></span><span><br /></span><span>    Sandbox escape due to incorrect boundary conditions in the Telemetry component. This vulnerability affects     Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4687)<br /></span><span><br /></span><span>    Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability affects     Firefox < 149 and Firefox ESR < 140.9. (CVE-2026-4688)<br /></span><span><br /></span><span>    Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This     vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4689)<br /></span><span><br /></span><span>    Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This     vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4690)<br /></span><span><br /></span><span>    Use-after-free in the CSS Parsing and Computation component. This vulnerability affects Firefox < 149,     Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4691)<br /></span><span><br /></span><span>    Sandbox escape in the Responsive Design Mode component. This vulnerability affects Firefox < 149, Firefox     ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4692)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: Playback component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4693)<br /></span><span><br /></span><span>    Incorrect boundary conditions, integer overflow in the Graphics component. This vulnerability affects     Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4694)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability affects Firefox     < 149 and Firefox ESR < 140.9. (CVE-2026-4695)<br /></span><span><br /></span><span>    Use-after-free in the Layout: Text and Fonts component. This vulnerability affects Firefox < 149, Firefox     ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4696)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability affects Firefox     < 149 and Firefox ESR < 140.9. (CVE-2026-4697)<br /></span><span><br /></span><span>    JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 149,     Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4698)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Layout: Text and Fonts component. This vulnerability affects Firefox     < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4699)<br /></span><span><br /></span><span>    Mitigation bypass in the Networking: HTTP component. This vulnerability affects Firefox < 149 and Firefox     ESR < 140.9. (CVE-2026-4700)<br /></span><span><br /></span><span>    Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149 and Firefox     ESR < 140.9. (CVE-2026-4701)<br /></span><span><br /></span><span>    JIT miscompilation in the JavaScript Engine component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4702)<br /></span><span><br /></span><span>    Denial-of-service in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and Firefox     ESR < 140.9. (CVE-2026-4704)<br /></span><span><br /></span><span>    Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4705)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4706)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox <     149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4707)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4708)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 149,     Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4709)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4710)<br /></span><span><br /></span><span>    Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox < 149 and Firefox ESR <     140.9. (CVE-2026-4711)<br /></span><span><br /></span><span>    Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4712)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4713)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4714)<br /></span><span><br /></span><span>    Uninitialized memory in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4715)<br /></span><span><br /></span><span>    Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability     affects Firefox < 149 and Firefox ESR < 140.9. (CVE-2026-4716)<br /></span><span><br /></span><span>    Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 149 and Firefox ESR     < 140.9. (CVE-2026-4717)<br /></span><span><br /></span><span>    Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4718)<br /></span><span><br /></span><span>    Incorrect boundary conditions in the Graphics: Text component. This vulnerability affects Firefox < 149     and Firefox ESR < 140.9. (CVE-2026-4719)<br /></span><span><br /></span><span>    Memory safety bugs present in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148.<br /></span><span>    Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of     these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 149 and     Firefox ESR < 140.9. (CVE-2026-4720)<br /></span><span><br /></span><span>    Memory safety bugs present in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148     and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with     enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects     Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. (CVE-2026-4721)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update firefox --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1554 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306216">https://www.tenable.com/plugins/nessus/306216</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : gdk-pixbuf2, gdk-pixbuf2-devel, gdk-pixbuf2-modules (ALAS2023-2026-1553)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306215</link>
            <guid>https://www.tenable.com/plugins/nessus/306215</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306215 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1553 advisory.<br /></span><span><br /></span><span>    A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the     JPEG image loader due to improper validation of color component counts when processing a specially crafted     JPEG image. A remote attacker can exploit this flaw without user interaction, for example, via thumbnail     generation. Successful exploitation leads to application crashes and denial of service (DoS) conditions.<br /></span><span>    (CVE-2026-5201)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update gdk-pixbuf2 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1553 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306215">https://www.tenable.com/plugins/nessus/306215</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : libde265, libde265-devel (ALAS2023-2026-1585)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306214</link>
            <guid>https://www.tenable.com/plugins/nessus/306214</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306214 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1585 advisory.<br /></span><span><br /></span><span>    libde265 is an open source implementation of the h.265 video codec. Prior to version 1.0.17, a malformed     H.265 PPS NAL unit causes a segmentation fault in pic_parameter_set::set_derived_values(). This issue has     been patched in version 1.0.17. (CVE-2026-33164)<br /></span><span><br /></span><span>    libde265 is an open source implementation of the h.265 video codec. Prior to version 1.0.17, a crafted     HEVC bitstream causes an out-of-bounds heap write confirmed by AddressSanitizer. The trigger is a stale     ctb_info.log2unitSize after an SPS change where PicWidthInCtbsY and PicHeightInCtbsY stay constant but     Log2CtbSizeY changes, causing set_SliceHeaderIndex to index past the allocated image metadata array and     write 2 bytes past the end of a heap allocation. This issue has been patched in version 1.0.17.<br /></span><span>    (CVE-2026-33165)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update libde265 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1585 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306214">https://www.tenable.com/plugins/nessus/306214</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : gstreamer1-plugins-good, gstreamer1-plugins-good-gtk (ALAS2023-2026-1579)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306213</link>
            <guid>https://www.tenable.com/plugins/nessus/306213</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306213 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1579 advisory.<br /></span><span><br /></span><span>    An out-of-bounds read in the WAV parser that can cause crashes for certain input files. (CVE-2026-1940)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update gstreamer1-plugins-good --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1579 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306213">https://www.tenable.com/plugins/nessus/306213</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : libpng, libpng-devel, libpng-static (ALAS2023-2026-1563)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306212</link>
            <guid>https://www.tenable.com/plugins/nessus/306212</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306212 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1563 advisory.<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE`     each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across     two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng     1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS`     sets `png_ptr->trans_alpha = info_ptr->trans_alpha` (256-byte buffer) and `png_set_PLTE` sets     `info_ptr->palette = png_ptr->palette` (768-byte buffer). In both cases, calling `png_free_data` (with     `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr`     pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to     the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both     functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes     the issue.<br /></span><span><br /></span><span>    NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7jNOTE:<br /></span><span>    https://github.com/pnggroup/libpng/pull/824NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/23019269764e35ed8458e517f1897bd3c54820eb (v1.6.56)NOTE: Fixed     by: https://github.com/pnggroup/libpng/commit/a3a21443ed12bfa1ef46fa0d4fb2b74a0fa34a25 (v1.6.56)NOTE:<br /></span><span>    Fixed by: https://github.com/pnggroup/libpng/commit/7ea9eea884a2328cc7fdcb3c0c00246a50d90667     (v1.6.56)NOTE: Fixed by:<br /></span><span>    https://github.com/pnggroup/libpng/commit/c1b0318b393c90679e6fa5bc1d329fd5d5012ec1 (v1.6.56)     (CVE-2026-33416)<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write     exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows     to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels     remain. Because the implementation works backward from the end of the row, the final iteration     dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the     same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG     input if Neon is enabled. Version 1.6.56 fixes the issue.<br /></span><span><br /></span><span>    NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2NOTE: Introduced with:<br /></span><span>    https://github.com/pnggroup/libpng/commit/7734cda20cf1236aef60f3bbd2267c97bbb40869 (v1.6.36)NOTE: Fixed     by: https://github.com/pnggroup/libpng/commit/aba9f18eba870d14fb52c5ba5d73451349e339c3 (v1.6.56)     (CVE-2026-33636)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update libpng --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1563 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306212">https://www.tenable.com/plugins/nessus/306212</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : runc (ALAS2023-2026-1541)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306211</link>
            <guid>https://www.tenable.com/plugins/nessus/306211</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306211 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1541 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update runc --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1541 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306211">https://www.tenable.com/plugins/nessus/306211</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : polkit, polkit-devel, polkit-libs (ALAS2023-2026-1546)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306210</link>
            <guid>https://www.tenable.com/plugins/nessus/306210</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306210 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1546 advisory.<br /></span><span><br /></span><span>    A flaw was found in polkit. A local user can exploit this by providing a specially crafted, excessively     long input to the `polkit-agent-helper-1` setuid binary via standard input (stdin). This unbounded input     can lead to an out-of-memory (OOM) condition, resulting in a Denial of Service (DoS) for the system.<br /></span><span>    (CVE-2026-4897)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update polkit --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1546 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306210">https://www.tenable.com/plugins/nessus/306210</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : freerdp, freerdp-devel, freerdp-libs (ALAS2023-2026-1549)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306209</link>
            <guid>https://www.tenable.com/plugins/nessus/306209</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306209 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1549 advisory.<br /></span><span><br /></span><span>    DoS via WINPR_ASSERT in rts_read_auth_verifier_no_checks<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4v4p-9v5x-hc93 (CVE-2026-33952)<br /></span><span><br /></span><span>    DoS via WINPR_ASSERT in IMA ADPCM audio decoder (dsp.c:331)<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8f2g-3q27-6xm5 (CVE-2026-33977)<br /></span><span><br /></span><span>    Persistent Cache Allocator Mismatch - Heap OOB Read<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jm9-2925-g4v2 (CVE-2026-33982)<br /></span><span><br /></span><span>    Progressive Codec Quant BYTE Underflow - UB + CPU DoS<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4gfm-4p52-h478 (CVE-2026-33983)<br /></span><span><br /></span><span>    ClearCodec resize_vbar_entry() Heap OOB Write<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8469-2xcx-frf6 (CVE-2026-33984)<br /></span><span><br /></span><span>    ClearCodec Glyph Cache Count Desync - Heap OOB Read<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x6gr-8p7h-5h85 (CVE-2026-33985)<br /></span><span><br /></span><span>    H.264 YUV Buffer Dimension Desync - Heap OOB Write<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h6qw-wxvm-hf97 (CVE-2026-33986)<br /></span><span><br /></span><span>    Persistent Cache bmpSize Desync - Heap OOB Write<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-ff8h-p5vc-wcwc (CVE-2026-33987)<br /></span><span><br /></span><span>    double free in kerberos_AcceptSecurityContext and kerberos_IntitalizeSecurityContextA<br /></span><span><br /></span><span>    NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mv25-f4p2-5mxx (CVE-2026-33995)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update freerdp --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1549 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306209">https://www.tenable.com/plugins/nessus/306209</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : plexus-utils, plexus-utils-javadoc (ALAS2023-2026-1545)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306208</link>
            <guid>https://www.tenable.com/plugins/nessus/306208</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306208 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1545 advisory.<br /></span><span><br /></span><span>    Directory Traversal vulnerability in the extractFile method of org.codehaus.plexus.util.Expand in plexus-     utils before 6d780b3378829318ba5c2d29547e0012d5b29642. This allows an attacker to execute arbitrary code     (CVE-2025-67030)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update plexus-utils --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1545 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306208">https://www.tenable.com/plugins/nessus/306208</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : ecs-init (ALAS2023-2026-1552)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306207</link>
            <guid>https://www.tenable.com/plugins/nessus/306207</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306207 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1552 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update ecs-init --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1552 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306207">https://www.tenable.com/plugins/nessus/306207</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : python3, python3-devel, python3-idle (ALAS2023-2026-1583)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306206</link>
            <guid>https://www.tenable.com/plugins/nessus/306206</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306206 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1583 advisory.<br /></span><span><br /></span><span>    When folding a long comment in an email header containing exclusively unfoldable characters, the     parenthesis would not be preserved. This could be used for injecting headers into email messages where     addresses are user-controlled and not sanitized. (CVE-2025-11468)<br /></span><span><br /></span><span>    User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in     the data URL mediatype. (CVE-2025-15282)<br /></span><span><br /></span><span>    When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP     headers into messages. Patch rejects all control characters within cookie names, values, and parameters.<br /></span><span>    (CVE-2026-0672)<br /></span><span><br /></span><span>    User-controlled header names and values containing newlines can allow injecting HTTP headers.<br /></span><span>    (CVE-2026-0865)<br /></span><span><br /></span><span>    The email module, specifically the BytesGenerator class, didn't properly quote newlines for email     headers when serializing an email message allowing for header injection when an email is serialized. This     is only applicable if using LiteralHeader writing headers that don't respect email folding rules, the     new behavior will reject the incorrectly folded headers in BytesGenerator. (CVE-2026-1299)<br /></span><span><br /></span><span>    The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader) is incorrectly handled     in FileLoader (a base class) and so does not use io.open_code() to read the .pyc files. sys.audit handlers     for this audit event therefore do not fire. (CVE-2026-2297)<br /></span><span><br /></span><span>    When an Expat parser with a registered ElementDeclHandler parses an inlinedocument type definition     containing a deeply nested content model a C stackoverflow occurs. (CVE-2026-4224)<br /></span><span><br /></span><span>    The webbrowser.open() API would accept leading dashes in the URL whichcould be handled as command line     options for certain web browsers. Newbehavior rejects leading dashes. Users are recommended to sanitize     URLsprior to passing to webbrowser.open(). (CVE-2026-4519)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update python3.9 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1583 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306206">https://www.tenable.com/plugins/nessus/306206</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : amazon-ecr-credential-helper (ALAS2023-2026-1574)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306205</link>
            <guid>https://www.tenable.com/plugins/nessus/306205</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306205 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1574 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update amazon-ecr-credential-helper --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1574 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306205">https://www.tenable.com/plugins/nessus/306205</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : tigervnc, tigervnc-icons, tigervnc-license (ALAS2023-2026-1537)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306204</link>
            <guid>https://www.tenable.com/plugins/nessus/306204</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306204 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1537 advisory.<br /></span><span><br /></span><span>    In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen     contents, or cause an application crash, because of incorrect permissions. (CVE-2026-34352)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update tigervnc --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1537 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306204">https://www.tenable.com/plugins/nessus/306204</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : cargo, clippy, rust (ALAS2023-2026-1568)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306203</link>
            <guid>https://www.tenable.com/plugins/nessus/306203</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306203 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1568 advisory.<br /></span><span><br /></span><span>    A flaw in the gix-date library can generate invalid non-UTF8 strings, leading to undefined behavior when     processed. The most likely impact from a successful attack is to data integrity, by the malicious data     being able to corrupt data being hold in memory and to system availability as it eventually may lead to     the software using the gix_date library to crash. (CVE-2026-0810)<br /></span><span><br /></span><span>    tar-rs is a tar archive reading/writing library for Rust. Versions 0.4.44 and below have conditional logic     that skips the PAX size header in cases where the base header size is nonzero. As part of CVE-2025-62518,     the astral-tokio-tar project was changed to correctly honor PAX size headers in the case where it was     different from the base header. This is almost the inverse of the astral-tokio-tar issue. Any discrepancy     in how tar parsers honor file size can be used to create archives that appear differently when unpacked by     different archivers. In this case, the tar-rs (Rust tar) crate is an outlier in checking for the header     size - other tar parsers (including e.g. Go archive/tar) unconditionally use the PAX size override. This     can affect anything that uses the tar crate to parse archives and expects to have a consistent view with     other parsers. This issue has been fixed in version 0.4.45. (CVE-2026-33055)<br /></span><span><br /></span><span>    tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and below, when unpacking a     tar archive, the tar crate's unpack_dir function uses fs::metadata() to check whether a path that already     exists is a directory. Because fs::metadata() follows symbolic links, a crafted tarball containing a     symlink entry followed by a directory entry with the same name causes the crate to treat the symlink     target as a valid existing directory -- and subsequently apply chmod to it. This allows an attacker to     modify the permissions of arbitrary directories outside the extraction root. This issue has been fixed in     version 0.4.45. (CVE-2026-33056)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update rust --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1568 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306203">https://www.tenable.com/plugins/nessus/306203</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : openssl, openssl-devel, openssl-fips-provider-latest (ALAS2023-2026-1586)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306202</link>
            <guid>https://www.tenable.com/plugins/nessus/306202</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306202 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1586 advisory.<br /></span><span><br /></span><span>    Potential use-after-free in DANE client code (CVE-2026-28387)<br /></span><span><br /></span><span>    NULL Pointer Dereference When Processing a Delta CRL<br /></span><span><br /></span><span>    NOTE: https://openssl-library.org/news/secadv/20260407.txt (CVE-2026-28388)<br /></span><span><br /></span><span>    Possible NULL dereference when processing CMS KeyAgreeRecipientInfo (CVE-2026-28389)<br /></span><span><br /></span><span>    Possible NULL dereference when processing CMS KeyTransportRecipientInfo (CVE-2026-28390)<br /></span><span><br /></span><span>    Incorrect failure handling in RSA KEM RSASVE encapsulation (CVE-2026-31790)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update openssl --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1586 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306202">https://www.tenable.com/plugins/nessus/306202</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : ImageMagick, ImageMagick-c++, ImageMagick-c++-devel (ALAS2023-2026-1550)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306201</link>
            <guid>https://www.tenable.com/plugins/nessus/306201</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306201 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1550 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     7.1.2-18 and 6.9.13-43, an out-of-bounds write of a zero byte exists in the X11 `display` interaction path     that could lead to a crash. Versions 7.1.2-18 and 6.9.13-43 patch the issue. (CVE-2026-33535)<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     7.1.2-18 and 6.9.13-43, due to an incorrect return value on certain platforms a pointer is incremented     past the end of a buffer that is on the stack and that could result in an out of bounds write. Versions     7.1.2-18 and 6.9.13-43 patch the issue. (CVE-2026-33536)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update ImageMagick --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1550 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306201">https://www.tenable.com/plugins/nessus/306201</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : javapackages-bootstrap (ALAS2023-2026-1581)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306200</link>
            <guid>https://www.tenable.com/plugins/nessus/306200</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306200 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1581 advisory.<br /></span><span><br /></span><span>    Directory Traversal vulnerability in the extractFile method of org.codehaus.plexus.util.Expand in plexus-     utils before 6d780b3378829318ba5c2d29547e0012d5b29642. This allows an attacker to execute arbitrary code     (CVE-2025-67030)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update javapackages-bootstrap --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1581 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306200">https://www.tenable.com/plugins/nessus/306200</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : docker (ALAS2023-2026-1571)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306199</link>
            <guid>https://www.tenable.com/plugins/nessus/306199</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306199 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1571 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been     detected that allows plugins privilege validation to be bypassed during docker plugin install. Due to an     error in the daemon's privilege comparison logic, the daemon may incorrectly accept a privilege set that     differs from the one approved by the user. Plugins that request exactly one privilege are also affected,     because no comparison is performed at all. This issue has been patched in version 29.3.1. (CVE-2026-33997)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update docker --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1571 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306199">https://www.tenable.com/plugins/nessus/306199</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : clamav1.5, clamav1.5-data, clamav1.5-devel (ALAS2023-2026-1565)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306198</link>
            <guid>https://www.tenable.com/plugins/nessus/306198</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306198 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1565 advisory.<br /></span><span><br /></span><span>    tar-rs is a tar archive reading/writing library for Rust. Versions 0.4.44 and below have conditional logic     that skips the PAX size header in cases where the base header size is nonzero. As part of CVE-2025-62518,     the astral-tokio-tar project was changed to correctly honor PAX size headers in the case where it was     different from the base header. This is almost the inverse of the astral-tokio-tar issue. Any discrepancy     in how tar parsers honor file size can be used to create archives that appear differently when unpacked by     different archivers. In this case, the tar-rs (Rust tar) crate is an outlier in checking for the header     size - other tar parsers (including e.g. Go archive/tar) unconditionally use the PAX size override. This     can affect anything that uses the tar crate to parse archives and expects to have a consistent view with     other parsers. This issue has been fixed in version 0.4.45. (CVE-2026-33055)<br /></span><span><br /></span><span>    tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and below, when unpacking a     tar archive, the tar crate's unpack_dir function uses fs::metadata() to check whether a path that already     exists is a directory. Because fs::metadata() follows symbolic links, a crafted tarball containing a     symlink entry followed by a directory entry with the same name causes the crate to treat the symlink     target as a valid existing directory -- and subsequently apply chmod to it. This allows an attacker to     modify the permissions of arbitrary directories outside the extraction root. This issue has been fixed in     version 0.4.45. (CVE-2026-33056)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update clamav1.5 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1565 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306198">https://www.tenable.com/plugins/nessus/306198</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : soci-snapshotter (ALAS2023-2026-1573)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306197</link>
            <guid>https://www.tenable.com/plugins/nessus/306197</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306197 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1573 advisory.<br /></span><span><br /></span><span>    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.<br /></span><span>    (CVE-2026-25679)<br /></span><span><br /></span><span>    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the     returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of     this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem     without permitting reading or writing files outside the root. (CVE-2026-27139)<br /></span><span><br /></span><span>    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS     if the meta tag also has an http-equiv attribute with the value refresh. A new GODEBUG setting has been     added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content     attribute which follow url= by setting htmlmetacontenturlescape=0. (CVE-2026-27142)<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update soci-snapshotter --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1573 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306197">https://www.tenable.com/plugins/nessus/306197</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : python3-pyasn1, python3-pyasn1-modules (ALAS2023-2026-1538)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306196</link>
            <guid>https://www.tenable.com/plugins/nessus/306196</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306196 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1538 advisory.<br /></span><span><br /></span><span>    pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.3, the `pyasn1` library is vulnerable to a     Denial of Service (DoS) attack caused by uncontrolled recursion when decoding ASN.1 data with deeply     nested structures. An attacker can supply a crafted payload containing thousands of nested `SEQUENCE`     (`0x30`) or `SET` (`0x31`) tags with Indefinite Length (`0x80`) markers. This forces the decoder to     recursively call itself until the Python interpreter crashes with a `RecursionError` or consumes all     available memory (OOM), crashing the host application. This is a distinct vulnerability from     CVE-2026-23490 (which addressed integer overflows in OID decoding). The fix for CVE-2026-23490     (`MAX_OID_ARC_CONTINUATION_OCTETS`) does not mitigate this recursion issue. Version 0.6.3 fixes this     specific issue. (CVE-2026-30922)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update python-pyasn1 --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1538 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306196">https://www.tenable.com/plugins/nessus/306196</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : vim-common, vim-data, vim-default-editor (ALAS2023-2026-1584)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306195</link>
            <guid>https://www.tenable.com/plugins/nessus/306195</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306195 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1584 advisory.<br /></span><span><br /></span><span>    When switching to other buffers using the :all command and visual mode still being active, this may cause     a heap-buffer overflow, because Vim does not properly end visual mode and therefore may try to access     beyond the end of a line in a buffer. In Patch 9.1.1003 Vim will correctly reset the visual mode before     opening other windows and buffers and therefore fix this bug. In addition it does verify that it won't try     to access a position if the position is greater than the corresponding buffer line. Impact is medium since     the user must have switched on visual mode when executing the :all ex command. The Vim project would like     to thank github user gandalf4a for reporting this issue. The issue has been fixed as of Vim patch     v9.1.1003 (CVE-2025-22134)<br /></span><span><br /></span><span>    A vulnerability was identified in vim 9.1.0000. Affected is the function __memmove_avx_unaligned_erms of     the file memmove-vec-unaligned-erms.S. The manipulation leads to memory corruption. The attack needs to be     performed locally. The exploit is publicly available and might be used. Some users are not able to     reproduce this. One of the users mentions that this appears not to be working, when coloring is turned     on. (CVE-2025-9389)<br /></span><span><br /></span><span>    A security flaw has been discovered in vim up to 9.1.1615. Affected by this vulnerability is the function     main of the file src/xxd/xxd.c of the component xxd. The manipulation results in buffer overflow. The     attack requires a local approach. The exploit has been released to the public and may be exploited.<br /></span><span>    Upgrading to version 9.1.1616 addresses this issue. The patch is identified as     eeef7c77436a78cd27047b0f5fa6925d56de3cb0. It is recommended to upgrade the affected component.<br /></span><span>    (CVE-2025-9390)<br /></span><span><br /></span><span>    Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow     vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The     vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim     copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes     (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been     patched in version 9.1.2132. (CVE-2026-25749)<br /></span><span><br /></span><span>    Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability     exists in Vim's NetBeans integration when processing the specialKeys command, affecting Vim builds that     enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in     src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf)     with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command.<br /></span><span>    The issue has been fixed as of Vim patch v9.1.2148. (CVE-2026-26269)<br /></span><span><br /></span><span>    Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection     vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted     URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the     privileges of the Vim process. Version 9.2.0073 fixes the issue. (CVE-2026-28417)<br /></span><span><br /></span><span>    Vim is an open source, command line text editor. Prior to version 9.2.0074, a heap-based buffer overflow     out-of-bounds read exists in Vim's Emacs-style tags file parsing logic. When processing a malformed tags     file, Vim can be tricked into reading up to 7 bytes beyond the allocated memory boundary. Version 9.2.0074     fixes the issue. (CVE-2026-28418)<br /></span><span><br /></span><span>    Vim is an open source, command line text editor. Prior to version 9.2.0075, a heap-based buffer underflow     exists in Vim's Emacs-style tags file parsing logic. When processing a malformed tags file where a     delimiter appears at the start of a line, Vim attempts to read memory immediately preceding the allocated     buffer. Version 9.2.0075 fixes the issue. (CVE-2026-28419)<br /></span><span><br /></span><span>    Vim is an open source, command line text editor. Prior to version 9.2.0076, a heap-based buffer overflow     WRITE and an out-of-bounds READ exist in Vim's terminal emulator when processing maximum combining     characters from Unicode supplementary planes. Version 9.2.0076 fixes the issue. (CVE-2026-28420)<br /></span><span><br /></span><span>    Vim is an open source, command line text editor. From 9.1.0011 to before 9.2.0137, Vim's NFA regex     compiler, when encountering a collection containing a combining character as the endpoint of a character     range (e.g. [0-0\u05bb]), incorrectly emits the composing bytes of that character as separate NFA states.<br /></span><span>    This corrupts the NFA postfix stack, resulting in NFA_START_COLL having a NULL out1 pointer. When     nfa_max_width() subsequently traverses the compiled NFA to estimate match width for the look-behind     assertion, it dereferences state->out1->out without a NULL check, causing a segmentation fault. This     vulnerability is fixed in 9.2.0137. (CVE-2026-32249)<br /></span><span><br /></span><span>    Command injection via newline in glob()<br /></span><span><br /></span><span>    NOTE: https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c (CVE-2026-33412)<br /></span><span><br /></span><span>    Vim before 9.2.0272 allows code execution that happens immediately upo ...<br /></span><span><br /></span><span>    NOTE: https://github.com/vim/vim/security/advisories/GHSA-2gmj-rpqf-pxvhNOTE: Fixed by:<br /></span><span>    https://github.com/vim/vim/commit/664701eb7576edb7c7c7d9f2d600815ec1f43459 (v9.2.0272) (CVE-2026-34714)<br /></span><span><br /></span><span>    A modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file.<br /></span><span>    The complete, guitabtooltip and printheader options are missing the P_MLE flag, allowing a modeline to be     executed. Additionally, the mapset() function lacks a check_secure() call, allowing it to be abused from     sandboxed expressions.<br /></span><span><br /></span><span>    An attacker who can deliver a crafted file to a victim achieves arbitrary command execution with the     privileges of the user running Vim. (CVE-2026-34982)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update vim --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1584 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306195">https://www.tenable.com/plugins/nessus/306195</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : vim-common, vim-data, vim-default-editor (ALAS2023-2026-1539)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306194</link>
            <guid>https://www.tenable.com/plugins/nessus/306194</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306194 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1539 advisory.<br /></span><span><br /></span><span>    Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow     and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unvalidated     fields read from crafted pointer blocks within a swap file. Version 9.2.0077 fixes the issue.<br /></span><span>    (CVE-2026-28421)<br /></span><span><br /></span><span>    Vim is an open source, command line text editor. Prior to version 9.2.0078, a stack-buffer-overflow occurs     in `build_stl_str_hl()` when rendering a statusline with a multi-byte fill character on a very wide     terminal. Version 9.2.0078 patches the issue. (CVE-2026-28422)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update vim --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1539 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306194">https://www.tenable.com/plugins/nessus/306194</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : below (ALAS2023-2026-1567)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306193</link>
            <guid>https://www.tenable.com/plugins/nessus/306193</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306193 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1567 advisory.<br /></span><span><br /></span><span>    tar-rs is a tar archive reading/writing library for Rust. Versions 0.4.44 and below have conditional logic     that skips the PAX size header in cases where the base header size is nonzero. As part of CVE-2025-62518,     the astral-tokio-tar project was changed to correctly honor PAX size headers in the case where it was     different from the base header. This is almost the inverse of the astral-tokio-tar issue. Any discrepancy     in how tar parsers honor file size can be used to create archives that appear differently when unpacked by     different archivers. In this case, the tar-rs (Rust tar) crate is an outlier in checking for the header     size - other tar parsers (including e.g. Go archive/tar) unconditionally use the PAX size override. This     can affect anything that uses the tar crate to parse archives and expects to have a consistent view with     other parsers. This issue has been fixed in version 0.4.45. (CVE-2026-33055)<br /></span><span><br /></span><span>    tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and below, when unpacking a     tar archive, the tar crate's unpack_dir function uses fs::metadata() to check whether a path that already     exists is a directory. Because fs::metadata() follows symbolic links, a crafted tarball containing a     symlink entry followed by a directory entry with the same name causes the crate to treat the symlink     target as a valid existing directory -- and subsequently apply chmod to it. This allows an attacker to     modify the permissions of arbitrary directories outside the extraction root. This issue has been fixed in     version 0.4.45. (CVE-2026-33056)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update rust-below --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1567 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306193">https://www.tenable.com/plugins/nessus/306193</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : runfinch-finch (ALAS2023-2026-1548)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306192</link>
            <guid>https://www.tenable.com/plugins/nessus/306192</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306192 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1548 advisory.<br /></span><span><br /></span><span>    gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass     resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too     lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash     (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests     to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated     the raw, non-canonical path string. Consequently, deny rules defined using canonical paths (starting     with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback allow     rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the     official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on     `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific deny rules     for canonical paths but allows other requests by default (a fallback allow rule). The vulnerability is     exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the     gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a     leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching     authorization interceptors or handlers with a non-canonical path string. While upgrading is the most     secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use     a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy     hardening. (CVE-2026-33186)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update runfinch-finch --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1548 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306192">https://www.tenable.com/plugins/nessus/306192</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : amazon-efs-utils (ALAS2023-2026-1564)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306191</link>
            <guid>https://www.tenable.com/plugins/nessus/306191</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306191 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1564 advisory.<br /></span><span><br /></span><span>    time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is     provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion     is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC     2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario.<br /></span><span>    A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned     rather than exhausting the stack. (CVE-2026-25727)<br /></span><span><br /></span><span>    Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass     certificate chain verification when processing PKCS7 objects with multiple signers, except the final     signer.<br /></span><span><br /></span><span>    Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC     version 1.69.0. (CVE-2026-3336)<br /></span><span><br /></span><span>    Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to     potentially determine authentication tag validity via timing analysis.<br /></span><span><br /></span><span><br /></span><span><br /></span><span>    The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and     EVP_aes_256_ccm.<br /></span><span><br /></span><span><br /></span><span><br /></span><span>    Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC     version 1.69.0. (CVE-2026-3337)<br /></span><span><br /></span><span>    Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass     signature verification when processing PKCS7 objects with Authenticated Attributes.<br /></span><span><br /></span><span><br /></span><span><br /></span><span>    Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC     version 1.69.0. (CVE-2026-3338)<br /></span><span><br /></span><span>    A logic error in CRL distribution point validation in AWS-LC before 1.71.0 causes partitioned CRLs to be     incorrectly rejected as out of scope, which allows  a revoked certificate to bypass certificate revocation     checks.<br /></span><span><br /></span><span>    To remediate this issue, users should upgrade to AWS-LC 1.71.0 or AWS-LC-FIPS-3.3.0. (CVE-2026-4428)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update amazon-efs-utils --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1564 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306191">https://www.tenable.com/plugins/nessus/306191</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : perl-XML-Parser, perl-XML-Parser-tests (ALAS2023-2026-1536)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306190</link>
            <guid>https://www.tenable.com/plugins/nessus/306190</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306190 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1536 advisory.<br /></span><span><br /></span><span>    XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap     corruption (double free or corruption) and crashes.<br /></span><span><br /></span><span>    A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read()     returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-     allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.<br /></span><span>    (CVE-2006-10002)<br /></span><span><br /></span><span>    XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack.<br /></span><span><br /></span><span>    In the case (stackptr == stacksize - 1), the stack will NOT be expanded. Then the new value will be     written at location (++stackptr), which equals stacksize and therefore falls just outside the allocated     buffer.<br /></span><span><br /></span><span>    The bug can be observed when parsing an XML file with very deep element nesting (CVE-2006-10003)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update perl-XML-Parser --releasever 2023.11.20260413' or   or 'dnf update --advisory ALAS2023-2026-1536 --releasever 2023.11.20260413' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306190">https://www.tenable.com/plugins/nessus/306190</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31422]]></title>
            <link>https://www.tenable.com/plugins/nessus/306189</link>
            <guid>https://www.tenable.com/plugins/nessus/306189</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306189 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - net/sched: cls_flow: fix NULL pointer dereference on shared blocks flow_change() calls tcf_block_q() and     dereferences q->handle to derive a default baseclass. Shared blocks leave block->q NULL, causing a NULL     deref when a flow filter without a fully qualified baseclass is created on a shared block. Check     tcf_block_shared() before accessing block->q and return -EINVAL for shared blocks. This avoids the null-     deref shown below: ======================================================================= KASAN: null-     ptr-deref in range [0x0000000000000038-0x000000000000003f] RIP: 0010:flow_change     (net/sched/cls_flow.c:508) Call Trace: tc_new_tfilter (net/sched/cls_api.c:2432) rtnetlink_rcv_msg     (net/core/rtnetlink.c:6980) [...] =======================================================================     (CVE-2026-31422)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306189">https://www.tenable.com/plugins/nessus/306189</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34045]]></title>
            <link>https://www.tenable.com/plugins/nessus/306188</link>
            <guid>https://www.tenable.com/plugins/nessus/306188</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306188 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Podman Desktop is a graphical tool for developing on containers and Kubernetes. Prior to 1.26.2, an     unauthenticated HTTP server exposed by Podman Desktop allows any network attacker to remotely trigger     denial-of-service conditions and extract sensitive information. By abusing missing connection limits and     timeouts, an attacker can exhaust file descriptors and kernel memory, leading to application crash or full     host freeze. Additionally, verbose error responses disclose internal paths and system details (including     usernames on Windows), aiding further exploitation. The issue requires no authentication or user     interaction and is exploitable over the network. This vulnerability is fixed in 1.26.2. (CVE-2026-34045)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306188">https://www.tenable.com/plugins/nessus/306188</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40447]]></title>
            <link>https://www.tenable.com/plugins/nessus/306187</link>
            <guid>https://www.tenable.com/plugins/nessus/306187</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306187 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Integer overflow or wraparound vulnerability in Samsung Open Source Escargot allows undefined     behavior.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335. (CVE-2026-40447)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306187">https://www.tenable.com/plugins/nessus/306187</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31428]]></title>
            <link>https://www.tenable.com/plugins/nessus/306186</link>
            <guid>https://www.tenable.com/plugins/nessus/306186</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306186 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD __build_packet_message()     manually constructs the NFULA_PAYLOAD netlink attribute using skb_put() and skb_copy_bits(), bypassing the     standard nla_reserve()/nla_put() helpers. While nla_total_size(data_len) bytes are allocated (including     NLA alignment padding), only data_len bytes of actual packet data are copied. The trailing     nla_padlen(data_len) bytes (1-3 when data_len is not 4-byte aligned) are never initialized, leaking stale     heap contents to userspace via the NFLOG netlink socket. Replace the manual attribute construction with     nla_reserve(), which handles the tailroom check, header setup, and padding zeroing via __nla_reserve().<br /></span><span>    The subsequent skb_copy_bits() fills in the payload data on top of the properly initialized attribute.<br /></span><span>    (CVE-2026-31428)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306186">https://www.tenable.com/plugins/nessus/306186</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34478]]></title>
            <link>https://www.tenable.com/plugins/nessus/306185</link>
            <guid>https://www.tenable.com/plugins/nessus/306185</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306185 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Apache Log4j Core's Rfc5424Layout https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424Layout ,     in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF sequences due to undocumented     renames of security-relevant configuration attributes. Two distinct issues affect users of stream-based     syslog services who configure Rfc5424Layout directly: * The newLineEscape attribute was silently renamed,     causing newline escaping to stop working for users of TCP framing (RFC 6587), exposing them to CRLF     injection in log output. * The useTlsMessageFormat attribute was silently renamed, causing users of TLS     framing (RFC 5425) to be silently downgraded to unframed TCP (RFC 6587), without newline escaping. Users     of the SyslogAppender are not affected, as its configuration attributes were not modified. Users are     advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue. (CVE-2026-34478)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306185">https://www.tenable.com/plugins/nessus/306185</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31426]]></title>
            <link>https://www.tenable.com/plugins/nessus/306184</link>
            <guid>https://www.tenable.com/plugins/nessus/306184</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306184 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() When ec_install_handlers() returns<br /></span><span>    -EPROBE_DEFER on reduced-hardware platforms, it has already started the EC and installed the address space     handler with the struct acpi_ec pointer as handler context. However, acpi_ec_setup() propagates the error     without any cleanup. The caller acpi_ec_add() then frees the struct acpi_ec for non-boot instances,     leaving a dangling handler context in ACPICA. Any subsequent AML evaluation that accesses an EC OpRegion     field dispatches into acpi_ec_space_handler() with the freed pointer, causing a use-after-free: BUG:<br /></span><span>    KASAN: slab-use-after-free in mutex_lock (kernel/locking/mutex.c:289) Write of size 8 at addr     ffff88800721de38 by task init/1 Call Trace: <TASK> mutex_lock (kernel/locking/mutex.c:289)     acpi_ec_space_handler (drivers/acpi/ec.c:1362) acpi_ev_address_space_dispatch     (drivers/acpi/acpica/evregion.c:293) acpi_ex_access_region (drivers/acpi/acpica/exfldio.c:246)     acpi_ex_field_datum_io (drivers/acpi/acpica/exfldio.c:509) acpi_ex_extract_from_field     (drivers/acpi/acpica/exfldio.c:700) acpi_ex_read_data_from_field (drivers/acpi/acpica/exfield.c:327)     acpi_ex_resolve_node_to_value (drivers/acpi/acpica/exresolv.c:392) </TASK> Allocated by task 1:<br /></span><span>    acpi_ec_alloc (drivers/acpi/ec.c:1424) acpi_ec_add (drivers/acpi/ec.c:1692) Freed by task 1: kfree     (mm/slub.c:6876) acpi_ec_add (drivers/acpi/ec.c:1751) The bug triggers on reduced-hardware EC platforms     (ec->gpe < 0) when the GPIO IRQ provider defers probing. Once the stale handler exists, any unprivileged     sysfs read that causes AML to touch an EC OpRegion (battery, thermal, backlight) exercises the dangling     pointer. Fix this by calling ec_remove_handlers() in the error path of acpi_ec_setup() before clearing     first_ec. ec_remove_handlers() checks each EC_FLAGS_* bit before acting, so it is safe to call regardless     of how far ec_install_handlers() progressed: -ENODEV (handler not installed): only calls acpi_ec_stop()<br /></span><span>    -EPROBE_DEFER (handler installed): removes handler, stops EC (CVE-2026-31426)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306184">https://www.tenable.com/plugins/nessus/306184</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-14569]]></title>
            <link>https://www.tenable.com/plugins/nessus/306183</link>
            <guid>https://www.tenable.com/plugins/nessus/306183</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306183 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A vulnerability was detected in ggml-org whisper.cpp up to 1.8.2. Affected is the function read_audio_data     of the file /whisper.cpp/examples/common-whisper.cpp. The manipulation results in use after free. The     attack requires a local approach. The exploit is now public and may be used. The project was informed of     the problem early through an issue report but has not responded yet. (CVE-2025-14569)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306183">https://www.tenable.com/plugins/nessus/306183</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31421]]></title>
            <link>https://www.tenable.com/plugins/nessus/306182</link>
            <guid>https://www.tenable.com/plugins/nessus/306182</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306182 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - net/sched: cls_fw: fix NULL pointer dereference on shared blocks The old-method path in fw_classify()     calls tcf_block_q() and dereferences q->handle. Shared blocks leave block->q NULL, causing a NULL deref     when an empty cls_fw filter is attached to a shared block and a packet with a nonzero major skb mark is     classified. Reject the configuration in fw_change() when the old method (no TCA_OPTIONS) is used on a     shared block, since fw_classify()'s old-method path needs block->q which is NULL for shared blocks. The     fixed null-ptr-deref calling stack: KASAN: null-ptr-deref in range [0x0000000000000038-0x000000000000003f]     RIP: 0010:fw_classify (net/sched/cls_fw.c:81) Call Trace: tcf_classify (./include/net/tc_wrapper.h:197     net/sched/cls_api.c:1764 net/sched/cls_api.c:1860) tc_run (net/core/dev.c:4401) __dev_queue_xmit     (net/core/dev.c:4535 net/core/dev.c:4790) (CVE-2026-31421)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306182">https://www.tenable.com/plugins/nessus/306182</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31417]]></title>
            <link>https://www.tenable.com/plugins/nessus/306181</link>
            <guid>https://www.tenable.com/plugins/nessus/306181</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306181 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - net/x25: Fix overflow when accumulating packets Add a check to ensure that `x25_sock.fraglen` does not     overflow. The `fraglen` also needs to be resetted when purging `fragment_queue` in `x25_clear_queues()`.<br /></span><span>    (CVE-2026-31417)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306181">https://www.tenable.com/plugins/nessus/306181</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31425]]></title>
            <link>https://www.tenable.com/plugins/nessus/306180</link>
            <guid>https://www.tenable.com/plugins/nessus/306180</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306180 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - rds: ib: reject FRMR registration before IB connection is established rds_ib_get_mr() extracts the     rds_ib_connection from conn->c_transport_data and passes it to rds_ib_reg_frmr() for FRWR memory     registration. On a fresh outgoing connection, ic is allocated in rds_ib_conn_alloc() with i_cm_id = NULL     because the connection worker has not yet called rds_ib_conn_path_connect() to create the rdma_cm_id. When     sendmsg() with RDS_CMSG_RDMA_MAP is called on such a connection, the sendmsg path parses the control     message before any connection establishment, allowing rds_ib_post_reg_frmr() to dereference     ic->i_cm_id->qp and crash the kernel. The existing guard in rds_ib_reg_frmr() only checks for !ic (added     in commit 9e630bcb7701), which does not catch this case since ic is allocated early and is always non-NULL     once the connection object exists. KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]     RIP: 0010:rds_ib_post_reg_frmr+0x50e/0x920 Call Trace: rds_ib_post_reg_frmr (net/rds/ib_frmr.c:167)     rds_ib_map_frmr (net/rds/ib_frmr.c:252) rds_ib_reg_frmr (net/rds/ib_frmr.c:430) rds_ib_get_mr     (net/rds/ib_rdma.c:615) __rds_rdma_map (net/rds/rdma.c:295) rds_cmsg_rdma_map (net/rds/rdma.c:860)     rds_sendmsg (net/rds/send.c:1363) ____sys_sendmsg do_syscall_64 Add a check in rds_ib_get_mr() that     verifies ic, i_cm_id, and qp are all non-NULL before proceeding with FRMR registration, mirroring the     guard already present in rds_ib_post_inv(). Return -ENODEV when the connection is not ready, which the     existing error handling in rds_cmsg_send() converts to -EAGAIN for userspace retry and triggers     rds_conn_connect_if_down() to start the connection worker. (CVE-2026-31425)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306180">https://www.tenable.com/plugins/nessus/306180</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31424]]></title>
            <link>https://www.tenable.com/plugins/nessus/306179</link>
            <guid>https://www.tenable.com/plugins/nessus/306179</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306179 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP Weiming Shi says:<br /></span><span>    xt_match and xt_target structs registered with NFPROTO_UNSPEC can be loaded by any protocol family through     nft_compat. When such a match/target sets .hooks to restrict which hooks it may run on, the bitmask uses     NF_INET_* constants. This is only correct for families whose hook layout matches NF_INET_*: IPv4, IPv6,     INET, and bridge all share the same five hooks (PRE_ROUTING ... POST_ROUTING). ARP only has three hooks     (IN=0, OUT=1, FORWARD=2) with different semantics. Because NF_ARP_OUT == 1 == NF_INET_LOCAL_IN, the .hooks     validation silently passes for the wrong reasons, allowing matches to run on ARP chains where the hook     assumptions (e.g. state->in being set on input hooks) do not hold. This leads to NULL pointer     dereferences; xt_devgroup is one concrete example: Oops: general protection fault, probably for non-     canonical address 0xdffffc0000000044: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range     [0x0000000000000220-0x0000000000000227] RIP: 0010:devgroup_mt+0xff/0x350 Call Trace: <TASK> nft_match_eval     (net/netfilter/nft_compat.c:407) nft_do_chain (net/netfilter/nf_tables_core.c:285) nft_do_chain_arp     (net/netfilter/nft_chain_filter.c:61) nf_hook_slow (net/netfilter/core.c:623) arp_xmit     (net/ipv4/arp.c:666) </TASK> Kernel panic - not syncing: Fatal exception in interrupt Fix it by     restricting arptables to NFPROTO_ARP extensions only. Note that arptables-legacy only supports: -     arpt_CLASSIFY - arpt_mangle - arpt_MARK that provide explicit NFPROTO_ARP match/target declarations.<br /></span><span>    (CVE-2026-31424)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306179">https://www.tenable.com/plugins/nessus/306179</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31416]]></title>
            <link>https://www.tenable.com/plugins/nessus/306178</link>
            <guid>https://www.tenable.com/plugins/nessus/306178</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306178 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - netfilter: nfnetlink_log: account for netlink header size This is a followup to an old bug fix: NLMSG_DONE     needs to account for the netlink header size, not just the attribute size. This can result in a WARN splat     + drop of the netlink message, but other than this there are no ill effects. (CVE-2026-31416)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306178">https://www.tenable.com/plugins/nessus/306178</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31419]]></title>
            <link>https://www.tenable.com/plugins/nessus/306177</link>
            <guid>https://www.tenable.com/plugins/nessus/306177</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306177 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - net: bonding: fix use-after-free in bond_xmit_broadcast() bond_xmit_broadcast() reuses the original skb     for the last slave (determined by bond_is_last_slave()) and clones it for others. Concurrent slave     enslave/release can mutate the slave list during RCU-protected iteration, changing which slave is last     mid-loop. This causes the original skb to be double-consumed (double-freed). Replace the racy     bond_is_last_slave() check with a simple index comparison (i + 1 == slaves_count) against the pre-snapshot     slave count taken via READ_ONCE() before the loop. This preserves the zero-copy optimization for the last     slave while making the last determination stable against concurrent list mutations. The UAF can trigger     the following crash: ================================================================== BUG: KASAN: slab-     use-after-free in skb_clone Read of size 8 at addr ffff888100ef8d40 by task exploit/147 CPU: 1 UID: 0 PID:<br /></span><span>    147 Comm: exploit Not tainted 7.0.0-rc3+ #4 PREEMPTLAZY Call Trace: <TASK> dump_stack_lvl     (lib/dump_stack.c:123) print_report (mm/kasan/report.c:379 mm/kasan/report.c:482) kasan_report     (mm/kasan/report.c:597) skb_clone (include/linux/skbuff.h:1724 include/linux/skbuff.h:1792     include/linux/skbuff.h:3396 net/core/skbuff.c:2108) bond_xmit_broadcast     (drivers/net/bonding/bond_main.c:5334) bond_start_xmit (drivers/net/bonding/bond_main.c:5567     drivers/net/bonding/bond_main.c:5593) dev_hard_start_xmit (include/linux/netdevice.h:5325     include/linux/netdevice.h:5334 net/core/dev.c:3871 net/core/dev.c:3887) __dev_queue_xmit     (include/linux/netdevice.h:3601 net/core/dev.c:4838) ip6_finish_output2 (include/net/neighbour.h:540     include/net/neighbour.h:554 net/ipv6/ip6_output.c:136) ip6_finish_output (net/ipv6/ip6_output.c:208     net/ipv6/ip6_output.c:219) ip6_output (net/ipv6/ip6_output.c:250) ip6_send_skb     (net/ipv6/ip6_output.c:1985) udp_v6_send_skb (net/ipv6/udp.c:1442) udpv6_sendmsg (net/ipv6/udp.c:1733)<br /></span><span>    __sys_sendto (net/socket.c:730 net/socket.c:742 net/socket.c:2206) __x64_sys_sendto (net/socket.c:2209)     do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94)     entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) </TASK> Allocated by task 147: Freed by     task 147: The buggy address belongs to the object at ffff888100ef8c80 which belongs to the cache     skbuff_head_cache of size 224 The buggy address is located 192 bytes inside of freed 224-byte region     [ffff888100ef8c80, ffff888100ef8d60) Memory state around the buggy address: ffff888100ef8c00: fb fb fb fb     fc fc fc fc fc fc fc fc fc fc fc fc ffff888100ef8c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb     >ffff888100ef8d00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ^ ffff888100ef8d80: fc fc fc fc fc fc     fc fc fa fb fb fb fb fb fb fb ffff888100ef8e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb     ================================================================== (CVE-2026-31419)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306177">https://www.tenable.com/plugins/nessus/306177</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31415]]></title>
            <link>https://www.tenable.com/plugins/nessus/306176</link>
            <guid>https://www.tenable.com/plugins/nessus/306176</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306176 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ipv6: avoid overflows in ip6_datagram_send_ctl() Yiming Qian reported : <quote> I believe I found a     locally triggerable kernel bug in the IPv6 sendmsg ancillary-data path that can panic the kernel via     `skb_under_panic()` (local DoS). The core issue is a mismatch between: - a 16-bit length accumulator     (`struct ipv6_txoptions::opt_flen`, type `__u16`) and - a pointer to the *last* provided destination-     options header (`opt->dst1opt`) when multiple `IPV6_DSTOPTS` control messages (cmsgs) are provided. -     `include/net/ipv6.h`: - `struct ipv6_txoptions::opt_flen` is `__u16` (wrap possible). (lines 291-307,     especially 298) - `net/ipv6/datagram.c:ip6_datagram_send_ctl()`: - Accepts repeated `IPV6_DSTOPTS` and     accumulates into `opt_flen` without rejecting duplicates. (lines 909-933) -     `net/ipv6/ip6_output.c:__ip6_append_data()`: - Uses `opt->opt_flen + opt->opt_nflen` to compute header     sizes/headroom decisions. (lines 1448-1466, especially 1463-1465) -     `net/ipv6/ip6_output.c:__ip6_make_skb()`: - Calls `ipv6_push_frag_opts()` if `opt->opt_flen` is non-zero.<br /></span><span>    (lines 1930-1934) - `net/ipv6/exthdrs.c:ipv6_push_frag_opts()` / `ipv6_push_exthdr()`: - Push size comes     from `ipv6_optlen(opt->dst1opt)` (based on the pointed-to header). (lines 1179-1185 and 1206-1211) 1.<br /></span><span>    `opt_flen` is a 16-bit accumulator: - `include/net/ipv6.h:298` defines `__u16 opt_flen; /* after fragment     hdr */`. 2. `ip6_datagram_send_ctl()` accepts *repeated* `IPV6_DSTOPTS` cmsgs and increments `opt_flen`     each time: - In `net/ipv6/datagram.c:909-933`, for `IPV6_DSTOPTS`: - It computes `len = ((hdr->hdrlen + 1)     << 3);` - It checks `CAP_NET_RAW` using `ns_capable(net->user_ns, CAP_NET_RAW)`. (line 922) - Then it     does: - `opt->opt_flen += len;` (line 927) - `opt->dst1opt = hdr;` (line 928) There is no duplicate     rejection here (unlike the legacy `IPV6_2292DSTOPTS` path which rejects duplicates at     `net/ipv6/datagram.c:901-904`). If enough large `IPV6_DSTOPTS` cmsgs are provided, `opt_flen` wraps while     `dst1opt` still points to a large (2048-byte) destination-options header. In the attached PoC (`poc.c`): -     32 cmsgs with `hdrlen=255` => `len = (255+1)*8 = 2048` - 1 cmsg with `hdrlen=0` => `len = 8` - Total     increment: `32*2048 + 8 = 65544`, so `(__u16)opt_flen == 8` - The last cmsg is 2048 bytes, so `dst1opt`     points to a 2048-byte header. 3. The transmit path sizes headers using the wrapped `opt_flen`: - In     `net/ipv6/ip6_output.c:1463-1465`: - `headersize = sizeof(struct ipv6hdr) + (opt ? opt->opt_flen +     opt->opt_nflen : 0) + ...;` With wrapped `opt_flen`, `headersize`/headroom decisions underestimate what     will be pushed later. 4. When building the final skb, the actual push length comes from `dst1opt` and is     not limited by wrapped `opt_flen`: - In `net/ipv6/ip6_output.c:1930-1934`: - `if (opt->opt_flen) proto =     ipv6_push_frag_opts(skb, opt, proto);` - In `net/ipv6/exthdrs.c:1206-1211`, `ipv6_push_frag_opts()` pushes     `dst1opt` via `ipv6_push_exthdr()`. - In `net/ipv6/exthdrs.c:1179-1184`, `ipv6_push_exthdr()` does: -     `skb_push(skb, ipv6_optlen(opt));` - `memcpy(h, opt, ipv6_optlen(opt));` With insufficient headroom,     `skb_push()` underflows and triggers `skb_under_panic()` -> `BUG()`: - `net/core/skbuff.c:2669-2675`     (`skb_push()` calls `skb_under_panic()`) - `net/core/skbuff.c:207-214` (`skb_panic()` ends in `BUG()`) -     The `IPV6_DSTOPTS` cmsg path requires `CAP_NET_RAW` in the target netns user namespace     (`ns_capable(net->user_ns, CAP_NET_RAW)`). - Root (or any task with `CAP_NET_RAW`) can trigger this     without user namespaces. - An unprivileged `uid=1000` user can trigger this if unprivileged user     namespaces are enabled and it can create a userns+netns to obtain namespaced `CAP_NET_RAW` (the attached     PoC does this). - Local denial of service: kernel BUG/panic (system crash). - ---truncated---     (CVE-2026-31415)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306176">https://www.tenable.com/plugins/nessus/306176</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31418]]></title>
            <link>https://www.tenable.com/plugins/nessus/306175</link>
            <guid>https://www.tenable.com/plugins/nessus/306175</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306175 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - netfilter: ipset: drop logically empty buckets in mtype_del mtype_del() counts empty slots below n->pos in     k, but it only drops the bucket when both n->pos and k are zero. This misses buckets whose live entries     have all been removed while n->pos still points past deleted slots. Treat a bucket as empty when all     positions below n->pos are unused and release it directly instead of shrinking it further.<br /></span><span>    (CVE-2026-31418)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306175">https://www.tenable.com/plugins/nessus/306175</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31427]]></title>
            <link>https://www.tenable.com/plugins/nessus/306174</link>
            <guid>https://www.tenable.com/plugins/nessus/306174</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306174 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp process_sdp() declares union     nf_inet_addr rtp_addr on the stack and passes it to the nf_nat_sip sdp_session hook after walking the SDP     media descriptions. However rtp_addr is only initialized inside the media loop when a recognized media     type with a non-zero port is found. If the SDP body contains no m= lines, only inactive media sections     (m=audio 0 ...) or only unrecognized media types, rtp_addr is never assigned. Despite that, the function     still calls hooks->sdp_session() with &rtp_addr, causing nf_nat_sdp_session() to format the stale stack     value as an IP address and rewrite the SDP session owner and connection lines with it. With     CONFIG_INIT_STACK_ALL_ZERO (default on most distributions) this results in the session-level o= and c=     addresses being rewritten to 0.0.0.0 for inactive SDP sessions. Without stack auto-init the rewritten     address is whatever happened to be on the stack. Fix this by pre-initializing rtp_addr from the session-     level connection address (caddr) when available, and tracking via a have_rtp_addr flag whether any valid     address was established. Skip the sdp_session hook entirely when no valid address exists. (CVE-2026-31427)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306174">https://www.tenable.com/plugins/nessus/306174</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31420]]></title>
            <link>https://www.tenable.com/plugins/nessus/306173</link>
            <guid>https://www.tenable.com/plugins/nessus/306173</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306173 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - bridge: mrp: reject zero test interval to avoid OOM panic br_mrp_start_test() and br_mrp_start_in_test()     accept the user-supplied interval value from netlink without validation. When interval is 0,     usecs_to_jiffies(0) yields 0, causing the delayed work (br_mrp_test_work_expired /     br_mrp_in_test_work_expired) to reschedule itself with zero delay. This creates a tight loop on     system_percpu_wq that allocates and transmits MRP test frames at maximum rate, exhausting all system     memory and causing a kernel panic via OOM deadlock. The same zero-interval issue applies to     br_mrp_start_in_test_parse() for interconnect test frames. Use NLA_POLICY_MIN(NLA_U32, 1) in the     nla_policy tables for both IFLA_BRIDGE_MRP_START_TEST_INTERVAL and IFLA_BRIDGE_MRP_START_IN_TEST_INTERVAL,     so zero is rejected at the netlink attribute parsing layer before the value ever reaches the workqueue     scheduling code. This is consistent with how other bridge subsystems (br_fdb, br_mst) enforce range     constraints on netlink attributes. (CVE-2026-31420)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306173">https://www.tenable.com/plugins/nessus/306173</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31414]]></title>
            <link>https://www.tenable.com/plugins/nessus/306172</link>
            <guid>https://www.tenable.com/plugins/nessus/306172</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306172 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - netfilter: nf_conntrack_expect: use expect->helper Use expect->helper in ctnetlink and /proc to dump the     helper name. Using nfct_help() without holding a reference to the master conntrack is unsafe. Use     exp->master->helper in ctnetlink path if userspace does not provide an explicit helper when creating an     expectation to retain the existing behaviour. The ctnetlink expectation path holds the reference on the     master conntrack and nf_conntrack_expect lock and the nfnetlink glue path refers to the master ct that is     attached to the skb. (CVE-2026-31414)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306172">https://www.tenable.com/plugins/nessus/306172</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31423]]></title>
            <link>https://www.tenable.com/plugins/nessus/306171</link>
            <guid>https://www.tenable.com/plugins/nessus/306171</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306171 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() m2sm() converts a u32 slope to a u64 scaled value.<br /></span><span>    For large inputs (e.g. m1=4000000000), the result can reach 2^32. rtsc_min() stores the difference of two     such u64 values in a u32 variable `dsm` and uses it as a divisor. When the difference is exactly 2^32 the     truncation yields zero, causing a divide-by-zero oops in the concave-curve intersection path: Oops: divide     error: 0000 RIP: 0010:rtsc_min (net/sched/sch_hfsc.c:601) Call Trace: init_ed (net/sched/sch_hfsc.c:629)     hfsc_enqueue (net/sched/sch_hfsc.c:1569) [...] Widen `dsm` to u64 and replace do_div() with div64_u64() so     the full difference is preserved. (CVE-2026-31423)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306171">https://www.tenable.com/plugins/nessus/306171</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34477]]></title>
            <link>https://www.tenable.com/plugins/nessus/306170</link>
            <guid>https://www.tenable.com/plugins/nessus/306170</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306170 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it     addressed hostname verification only when enabled via the log4j2.sslVerifyHostName     https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system     property, but not when configured through the verifyHostName     https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName     attribute of the <Ssl> element. Although the verifyHostName configuration attribute was introduced in     Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections     vulnerable to interception regardless of the configured value. A network-based attacker may be able to     perform a man-in-the-middle attack when all of the following conditions are met: * An SMTP, Socket, or     Syslog appender is in use. * TLS is configured via a nested <Ssl> element. * The attacker can present a     certificate issued by a CA trusted by the appender's configured trust store, or by the default Java trust     store if none is configured. This issue does not affect users of the HTTP appender, which uses a separate     verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-     verifyHostName attribute that was not subject to this bug and verifies host names by default. Users are     advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue. (CVE-2026-34477)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306170">https://www.tenable.com/plugins/nessus/306170</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dotnetnuke < 10.2.2 Security code analysis rules triggered (GHSA-fcpv-w245-r2q7)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306169</link>
            <guid>https://www.tenable.com/plugins/nessus/306169</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306169 with High Severity</p>
      <h3>Synopsis</h3>
      <span>An ASP.NET application running on the remote web server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Dotnetnuke running on the remote web server is prior to 10.2.2.<br /></span><span>It is, therefore, affected by a vulnerability.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Dotnetnuke version 10.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306169">https://www.tenable.com/plugins/nessus/306169</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dotnetnuke < 10.2.2 Stored cross-site-scripting (XSS) via SVG upload (CVE-2026-40321)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306168</link>
            <guid>https://www.tenable.com/plugins/nessus/306168</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306168 with High Severity</p>
      <h3>Synopsis</h3>
      <span>An ASP.NET application running on the remote web server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Dotnetnuke running on the remote web server is prior to 10.2.2.<br /></span><span>It is, therefore, affected by a vulnerability.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Dotnetnuke version 10.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306168">https://www.tenable.com/plugins/nessus/306168</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 10 : nodejs24 (ELSA-2026-7675)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306167</link>
            <guid>https://www.tenable.com/plugins/nessus/306167</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306167 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2026-7675 advisory.<br /></span><span><br /></span><span>    [1:24.14.1-2.0.1]<br /></span><span>    - Update upstream references<br /></span><span><br /></span><span>    [1:24.14.1-2]<br /></span><span>    - Update bundled nghttp2 to 1.68.1<br /></span><span><br /></span><span>    [1:24.14.1-1]<br /></span><span>    - Update to version 24.14.1<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306167">https://www.tenable.com/plugins/nessus/306167</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 9 : nghttp2 (ELSA-2026-7668)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306166</link>
            <guid>https://www.tenable.com/plugins/nessus/306166</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306166 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 9 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2026-7668 advisory.<br /></span><span><br /></span><span>    [1.43.0-6.1]<br /></span><span>    - fix Denial of service: Assertion failure due to the missing state validation (CVE-2026-27135)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected libnghttp2, libnghttp2-devel and / or nghttp2 packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306166">https://www.tenable.com/plugins/nessus/306166</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 9 : firefox (ELSA-2026-7671)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306165</link>
            <guid>https://www.tenable.com/plugins/nessus/306165</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306165 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2026-7671 advisory.<br /></span><span><br /></span><span>    [140.9.1-1.0.1]<br /></span><span>    - Fix firefox-oracle-default-prefs.js for new nss [Orabug: 37079773]<br /></span><span>    - Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat file<br /></span><span><br /></span><span>    [140.9.1]<br /></span><span>    - Add debranding patches (Mustafa Gezen)<br /></span><span>    - Add OpenELA default preferences (Louis Abel)<br /></span><span><br /></span><span>    [140.9.1-1]<br /></span><span>    - Update to 140.9.1 ESR<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected firefox and / or firefox-x11 packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306165">https://www.tenable.com/plugins/nessus/306165</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 10 : firefox (ELSA-2026-7672)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306164</link>
            <guid>https://www.tenable.com/plugins/nessus/306164</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306164 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 10 host has a package installed that is affected by multiple vulnerabilities as referenced in the ELSA-2026-7672 advisory.<br /></span><span><br /></span><span>    [140.9.1-1.0.1]<br /></span><span>    - Fix firefox-oracle-default-prefs.js for new nss [Orabug: 37079773]<br /></span><span>    - Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat file<br /></span><span><br /></span><span>    [140.9.1-1]<br /></span><span>    - Update to 140.9.1 ESR<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected firefox package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306164">https://www.tenable.com/plugins/nessus/306164</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 10 : perl-XML-Parser (ELSA-2026-7680)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306163</link>
            <guid>https://www.tenable.com/plugins/nessus/306163</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306163 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 10 host has a package installed that is affected by multiple vulnerabilities as referenced in the ELSA-2026-7680 advisory.<br /></span><span><br /></span><span>    [2.47-6.1.0.1]<br /></span><span>    - Add perl(LWP) Requires<br /></span><span><br /></span><span>    [2.47-6.1]<br /></span><span>    - Fix CVE-2006-10002, CVE-2006-10003<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected perl-XML-Parser package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306163">https://www.tenable.com/plugins/nessus/306163</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : firefox (RHSA-2026:7858)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306162</link>
            <guid>https://www.tenable.com/plugins/nessus/306162</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306162 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for firefox.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7858 advisory.<br /></span><span><br /></span><span>    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and     portability.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR     140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)<br /></span><span><br /></span><span>    * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component     (CVE-2026-4688)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4695)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4689)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine     component (CVE-2026-4716)<br /></span><span><br /></span><span>    * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component     (CVE-2026-4684)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)<br /></span><span><br /></span><span>    * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)<br /></span><span><br /></span><span>    * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4697)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4690)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component     (CVE-2026-4699)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component     (CVE-2026-4693)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component     (CVE-2026-4694)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149     and Thunderbird 149 (CVE-2026-4720)<br /></span><span><br /></span><span>    * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)<br /></span><span><br /></span><span>    * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component     (CVE-2026-4687)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL firefox package based on the guidance in RHSA-2026:7858.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306162">https://www.tenable.com/plugins/nessus/306162</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : go-toolset:rhel8 (RHSA-2026:7876)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306161</link>
            <guid>https://www.tenable.com/plugins/nessus/306161</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306161 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for go-toolset:rhel8.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7876 advisory.<br /></span><span><br /></span><span>    Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL go-toolset:rhel8 package based on the guidance in RHSA-2026:7876.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306161">https://www.tenable.com/plugins/nessus/306161</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : firefox (RHSA-2026:7838)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306160</link>
            <guid>https://www.tenable.com/plugins/nessus/306160</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306160 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for firefox.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7838 advisory.<br /></span><span><br /></span><span>    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and     portability.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR     140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)<br /></span><span><br /></span><span>    * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component     (CVE-2026-4688)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4695)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4689)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine     component (CVE-2026-4716)<br /></span><span><br /></span><span>    * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component     (CVE-2026-4684)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)<br /></span><span><br /></span><span>    * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)<br /></span><span><br /></span><span>    * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4697)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4690)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component     (CVE-2026-4699)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component     (CVE-2026-4693)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component     (CVE-2026-4694)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149     and Thunderbird 149 (CVE-2026-4720)<br /></span><span><br /></span><span>    * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)<br /></span><span><br /></span><span>    * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component     (CVE-2026-4687)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL firefox package based on the guidance in RHSA-2026:7838.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306160">https://www.tenable.com/plugins/nessus/306160</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : go-toolset:rhel8 (RHSA-2026:7878)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306159</link>
            <guid>https://www.tenable.com/plugins/nessus/306159</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306159 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for go-toolset:rhel8.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7878 advisory.<br /></span><span><br /></span><span>    Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL go-toolset:rhel8 package based on the guidance in RHSA-2026:7878.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306159">https://www.tenable.com/plugins/nessus/306159</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : podman (RHSA-2026:7854)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306158</link>
            <guid>https://www.tenable.com/plugins/nessus/306158</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306158 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for podman.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7854 advisory.<br /></span><span><br /></span><span>    The podman tool manages pods, container images, and containers. It is part of the libpod library, which is     for applications that use container pods. Container pods is a concept in Kubernetes.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate     (CVE-2025-61729)<br /></span><span><br /></span><span>    * golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip     (CVE-2025-61728)<br /></span><span><br /></span><span>    * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)<br /></span><span><br /></span><span>    * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL podman package based on the guidance in RHSA-2026:7854.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306158">https://www.tenable.com/plugins/nessus/306158</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : golang (RHSA-2026:7833)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306157</link>
            <guid>https://www.tenable.com/plugins/nessus/306157</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306157 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for golang.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7833 advisory.<br /></span><span><br /></span><span>    The golang packages provide the Go programming language compiler.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL golang package based on the guidance in RHSA-2026:7833.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306157">https://www.tenable.com/plugins/nessus/306157</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : golang (RHSA-2026:7883)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306156</link>
            <guid>https://www.tenable.com/plugins/nessus/306156</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306156 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for golang.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7883 advisory.<br /></span><span><br /></span><span>    The golang packages provide the Go programming language compiler.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL golang package based on the guidance in RHSA-2026:7883.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306156">https://www.tenable.com/plugins/nessus/306156</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : go-toolset:rhel8 (RHSA-2026:7877)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306155</link>
            <guid>https://www.tenable.com/plugins/nessus/306155</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306155 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for go-toolset:rhel8.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7877 advisory.<br /></span><span><br /></span><span>    Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL go-toolset:rhel8 package based on the guidance in RHSA-2026:7877.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306155">https://www.tenable.com/plugins/nessus/306155</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Quest KACE Systems Management Appliance (SMA) Detection]]></title>
            <link>https://www.tenable.com/plugins/nessus/306154</link>
            <guid>https://www.tenable.com/plugins/nessus/306154</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306154 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>The web interface for Quest KACE Systems Management Appliance (SMA) was detected.<br /></span>
      <h3>Description</h3>
      <span>The web interface for Quest KACE Systems Management Appliance (SMA) was detected.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306154">https://www.tenable.com/plugins/nessus/306154</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-30479]]></title>
            <link>https://www.tenable.com/plugins/nessus/306153</link>
            <guid>https://www.tenable.com/plugins/nessus/306153</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306153 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A Dynamic-link Library Injection vulnerability in OSGeo Project MapServer before v8.0 allows attackers to     execute arbitrary code via a crafted executable. (CVE-2026-30479)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306153">https://www.tenable.com/plugins/nessus/306153</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-1101]]></title>
            <link>https://www.tenable.com/plugins/nessus/306152</link>
            <guid>https://www.tenable.com/plugins/nessus/306152</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306152 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab EE affecting all versions from 18.2 before 18.8.9, 18.9 before     18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to cause denial of service     to the GitLab instance due to improper input validation in GraphQL queries. (CVE-2026-1101)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306152">https://www.tenable.com/plugins/nessus/306152</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34179]]></title>
            <link>https://www.tenable.com/plugins/nessus/306151</link>
            <guid>https://www.tenable.com/plugins/nessus/306151</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306151 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In Canonical LXD versions 4.12 through 6.7, the doCertificateUpdate function in lxd/certificates.go does     not validate the Type field when handling PUT/PATCH requests to /1.0/certificates/{fingerprint} for     restricted TLS certificate users, allowing a remote authenticated attacker to escalate privileges to     cluster admin. (CVE-2026-34179)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306151">https://www.tenable.com/plugins/nessus/306151</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-4916]]></title>
            <link>https://www.tenable.com/plugins/nessus/306150</link>
            <guid>https://www.tenable.com/plugins/nessus/306150</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306150 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.8.9, 18.9 before     18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user with custom role     permissions to demote or remove higher-privileged group members due to improper authorization checks on     member management operations. (CVE-2026-4916)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306150">https://www.tenable.com/plugins/nessus/306150</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5173]]></title>
            <link>https://www.tenable.com/plugins/nessus/306149</link>
            <guid>https://www.tenable.com/plugins/nessus/306149</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306149 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9.6 before 18.8.9, 18.9     before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to invoke unintended     server-side methods through websocket connections due to improper access control. (CVE-2026-5173)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306149">https://www.tenable.com/plugins/nessus/306149</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34178]]></title>
            <link>https://www.tenable.com/plugins/nessus/306148</link>
            <guid>https://www.tenable.com/plugins/nessus/306148</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306148 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In Canonical LXD before 6.8, the backup import path validates project restrictions against     backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml,     a separate file in the same archive that is never checked against project restrictions. An authenticated     remote attacker with instance-creation permission in a restricted project can craft a backup archive where     backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing     all project restriction enforcement and allowing full host compromise. (CVE-2026-34178)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306148">https://www.tenable.com/plugins/nessus/306148</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-4332]]></title>
            <link>https://www.tenable.com/plugins/nessus/306147</link>
            <guid>https://www.tenable.com/plugins/nessus/306147</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306147 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab EE affecting all versions from 18.2 before 18.8.9, 18.9 before     18.9.5, and 18.10 before 18.10.3 that, in customizable analytics dashboards, could have allowed an     authenticated user to execute arbitrary JavaScript in the context of other users' browsers due to improper     input sanitization. (CVE-2026-4332)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306147">https://www.tenable.com/plugins/nessus/306147</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-39883]]></title>
            <link>https://www.tenable.com/plugins/nessus/306146</link>
            <guid>https://www.tenable.com/plugins/nessus/306146</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306146 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.15.0 to 1.42.0, the fix for     CVE-2026-24051 changed the Darwin ioreg command to use an absolute path but left the BSD kenv command     using a bare name, allowing the same PATH hijacking attack on BSD and Solaris platforms. This     vulnerability is fixed in 1.43.0. (CVE-2026-39883)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306146">https://www.tenable.com/plugins/nessus/306146</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40395]]></title>
            <link>https://www.tenable.com/plugins/nessus/306145</link>
            <guid>https://www.tenable.com/plugins/nessus/306145</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306145 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Varnish Enterprise before 6.0.16r12 allows a workspace overflow denial of service (daemon panic) for     shared VCL. The headerplus.write_req0() function from vmod_headerplus updates the underlying req0, which     is normally the original read-only request from which req is derived (readable and writable from VCL).<br /></span><span>    This is useful in the active VCL, after amending req, to prepare a refined req0 before switching to a     different VCL with the return (vcl(<label>)) action. This is for example how the Varnish Controller     operates shared VCL deployments. If the amended req contained too many header fields for req0, this would     have resulted in a workspace overflow that would in turn trigger a panic and crash the Varnish Enterprise     server. This could be used as a Denial of Service attack vector by malicious clients. (CVE-2026-40395)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306145">https://www.tenable.com/plugins/nessus/306145</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-1516]]></title>
            <link>https://www.tenable.com/plugins/nessus/306144</link>
            <guid>https://www.tenable.com/plugins/nessus/306144</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306144 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab EE affecting all versions from 18.0.0 before 18.8.9, 18.9 before     18.9.5, and 18.10 before 18.10.3 that in Code Quality reports could have allowed an authenticated user to     leak IP addresses of users viewing the report via specially crafted content. (CVE-2026-1516)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306144">https://www.tenable.com/plugins/nessus/306144</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3466]]></title>
            <link>https://www.tenable.com/plugins/nessus/306143</link>
            <guid>https://www.tenable.com/plugins/nessus/306143</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306143 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Insufficient sanitization of dashboard dashlet title links in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before     2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows an attacker with     dashboard creation privileges to perform stored cross-site scripting (XSS) attacks by tricking a victim     into clicking a crafted dashlet title link on a shared dashboard. (CVE-2026-3466)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306143">https://www.tenable.com/plugins/nessus/306143</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-23411]]></title>
            <link>https://www.tenable.com/plugins/nessus/306142</link>
            <guid>https://www.tenable.com/plugins/nessus/306142</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306142 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - apparmor: fix race between freeing data and fs accessing it AppArmor was putting the reference to     i_private data on its end after removing the original entry from the file system. However the inode can     aand does live beyond that point and it is possible that some of the fs call back functions will be     invoked after the reference has been put, which results in a race between freeing the data and accessing     it through the fs. While the rawdata/loaddata is the most likely candidate to fail the race, as it has the     fewest references. If properly crafted it might be possible to trigger a race for the other types stored     in i_private. Fix this by moving the put of i_private referenced data to the correct place which is during     inode eviction. (CVE-2026-23411)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306142">https://www.tenable.com/plugins/nessus/306142</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40046]]></title>
            <link>https://www.tenable.com/plugins/nessus/306141</link>
            <guid>https://www.tenable.com/plugins/nessus/306141</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306141 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ     MQTT. The fix for CVE-2025-66168: MQTT control packet remaining length field is not properly validated     was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions. This issue     affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 before 6.2.4; Apache     ActiveMQ MQTT: from 6.0.0 before 6.2.4. Users are recommended to upgrade to version 6.2.4 or a 5.19.x     version starting with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue.<br /></span><span>    (CVE-2026-40046)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306141">https://www.tenable.com/plugins/nessus/306141</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-1752]]></title>
            <link>https://www.tenable.com/plugins/nessus/306140</link>
            <guid>https://www.tenable.com/plugins/nessus/306140</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306140 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab EE affecting all versions from 11.3 before 18.8.9, 18.9 before     18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user with developer-role     permissions to modify protected environment settings due to improper authorization checks in the API.<br /></span><span>    (CVE-2026-1752)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306140">https://www.tenable.com/plugins/nessus/306140</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5733]]></title>
            <link>https://www.tenable.com/plugins/nessus/306139</link>
            <guid>https://www.tenable.com/plugins/nessus/306139</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306139 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability was fixed in Firefox     149.0.2 and Thunderbird 149.0.2. (CVE-2026-5733)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306139">https://www.tenable.com/plugins/nessus/306139</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2104]]></title>
            <link>https://www.tenable.com/plugins/nessus/306138</link>
            <guid>https://www.tenable.com/plugins/nessus/306138</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306138 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.8.9, 18.9 before     18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to access confidential     issues assigned to other users via CSV export due to insufficient authorization checks. (CVE-2026-2104)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306138">https://www.tenable.com/plugins/nessus/306138</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34177]]></title>
            <link>https://www.tenable.com/plugins/nessus/306137</link>
            <guid>https://www.tenable.com/plugins/nessus/306137</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306137 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Canonical LXD versions 4.12 through 6.7 contain an incomplete denylist in isVMLowLevelOptionForbidden     (lxd/project/limits/permissions.go), which omits raw.apparmor and raw.qemu.conf from the set of keys     blocked under the restricted.virtual-machines.lowlevel=block project restriction. A remote attacker with     can_edit permission on a VM instance in a restricted project can inject an AppArmor rule and a QEMU     chardev configuration that bridges the LXD Unix socket into the guest VM, enabling privilege escalation to     LXD cluster administrator and subsequently to host root. (CVE-2026-34177)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306137">https://www.tenable.com/plugins/nessus/306137</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-33456]]></title>
            <link>https://www.tenable.com/plugins/nessus/306136</link>
            <guid>https://www.tenable.com/plugins/nessus/306136</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306136 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Livestatus injection in the notification test mode in Checkmk <2.5.0b4 and <2.4.0p26 allows an     authenticated user with access to the notification test page to inject arbitrary Livestatus commands via a     crafted service description. (CVE-2026-33456)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306136">https://www.tenable.com/plugins/nessus/306136</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-33455]]></title>
            <link>https://www.tenable.com/plugins/nessus/306135</link>
            <guid>https://www.tenable.com/plugins/nessus/306135</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306135 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Livestatus injection in the monitoring quicksearch in Checkmk <2.5.0b4 allows an authenticated attacker to     inject livestatus commands via the search query due to insufficient input sanitization in search filter     plugins. (CVE-2026-33455)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306135">https://www.tenable.com/plugins/nessus/306135</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2619]]></title>
            <link>https://www.tenable.com/plugins/nessus/306134</link>
            <guid>https://www.tenable.com/plugins/nessus/306134</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306134 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab EE affecting all versions from 18.6 before 18.8.9, 18.9 before     18.9.5, and 18.10 before 18.10.3 that under certain circumstances could have allowed an authenticated user     with auditor privileges to modify vulnerability flag data in private projects due to incorrect     authorization. (CVE-2026-2619)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306134">https://www.tenable.com/plugins/nessus/306134</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-1403]]></title>
            <link>https://www.tenable.com/plugins/nessus/306133</link>
            <guid>https://www.tenable.com/plugins/nessus/306133</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306133 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue that when importing CSV files could have allowed an authenticated user to     cause denial of service to Sidekiq workers due to improper validation of CSV file structure.<br /></span><span>    (CVE-2026-1403)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306133">https://www.tenable.com/plugins/nessus/306133</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-33457]]></title>
            <link>https://www.tenable.com/plugins/nessus/306132</link>
            <guid>https://www.tenable.com/plugins/nessus/306132</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306132 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Livestatus injection in the prediction graph page in Checkmk <2.5.0b4, <2.4.0p26, and <2.3.0p47 allows an     authenticated user to inject arbitrary Livestatus commands via a crafted service name parameter due to     insufficient sanitization of the service description value. (CVE-2026-33457)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306132">https://www.tenable.com/plugins/nessus/306132</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-39983]]></title>
            <link>https://www.tenable.com/plugins/nessus/306131</link>
            <guid>https://www.tenable.com/plugins/nessus/306131</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306131 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - basic-ftp is an FTP client for Node.js. Prior to 5.2.1, basic-ftp allows FTP command injection via CRLF     sequences (\r\n) in file path parameters passed to high-level path APIs such as cd(), remove(), rename(),     uploadFrom(), downloadTo(), list(), and removeDir(). The library's protectWhitespace() helper only handles     leading spaces and returns other paths unchanged, while FtpContext.send() writes the resulting command     string directly to the control socket with \r\n appended. This lets attacker-controlled path strings split     one intended FTP command into multiple commands. This vulnerability is fixed in 5.2.1. (CVE-2026-39983)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306131">https://www.tenable.com/plugins/nessus/306131</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-39666]]></title>
            <link>https://www.tenable.com/plugins/nessus/306130</link>
            <guid>https://www.tenable.com/plugins/nessus/306130</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306130 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Local privilege escalation in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before     2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows a site user to escalate their privileges to root,     by manipulating files in the site context that are processed when the `omd` administrative command is run     by root. (CVE-2025-39666)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306130">https://www.tenable.com/plugins/nessus/306130</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-12664]]></title>
            <link>https://www.tenable.com/plugins/nessus/306129</link>
            <guid>https://www.tenable.com/plugins/nessus/306129</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306129 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.0 before 18.8.9, 18.9 before     18.9.5, and 18.10 before 18.10.3 that could have allowed an unauthenticated user to cause denial of     service by sending repeated GraphQL queries. (CVE-2025-12664)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306129">https://www.tenable.com/plugins/nessus/306129</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-9484]]></title>
            <link>https://www.tenable.com/plugins/nessus/306128</link>
            <guid>https://www.tenable.com/plugins/nessus/306128</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306128 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab EE affecting all versions from 16.6 before 18.8.9, 18.9 before     18.9.5, and 18.10 before 18.10.3 that under certain circumstances could have allowed an authenticated user     to have access to other users' email addresses via certain GraphQL queries. (CVE-2025-9484)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306128">https://www.tenable.com/plugins/nessus/306128</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5735]]></title>
            <link>https://www.tenable.com/plugins/nessus/306127</link>
            <guid>https://www.tenable.com/plugins/nessus/306127</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306127 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Memory safety bugs present in Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence     of memory corruption and we presume that with enough effort some of these could have been exploited to run     arbitrary code. This vulnerability affects Firefox < 149.0.2 and Thunderbird < 149.0.2. (CVE-2026-5735)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306127">https://www.tenable.com/plugins/nessus/306127</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-14551]]></title>
            <link>https://www.tenable.com/plugins/nessus/306126</link>
            <guid>https://www.tenable.com/plugins/nessus/306126</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306126 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In Ubuntu, Subiquity version 24.04.4 could leak sensitive user credentials during crash reporting. Upon     installation failure, if a user submitted a bug report to Launchpad, Subiquity could include certain user     credentials, such as the user's plaintext Wi-Fi password, in the attached logs. (CVE-2025-14551)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306126">https://www.tenable.com/plugins/nessus/306126</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-1092]]></title>
            <link>https://www.tenable.com/plugins/nessus/306125</link>
            <guid>https://www.tenable.com/plugins/nessus/306125</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306125 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.10 before 18.8.9, 18.9     before 18.9.5, and 18.10 before 18.10.3 that could have allowed an unauthenticated user to cause denial of     service due to improper input validation of JSON payloads. (CVE-2026-1092)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306125">https://www.tenable.com/plugins/nessus/306125</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-22666]]></title>
            <link>https://www.tenable.com/plugins/nessus/306124</link>
            <guid>https://www.tenable.com/plugins/nessus/306124</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306124 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Dolibarr ERP/CRM versions prior to 23.0.2 contain an authenticated remote code execution vulnerability in     the dol_eval_standard() function that fails to apply forbidden string checks in whitelist mode and does     not detect PHP dynamic callable syntax. Attackers with administrator privileges can inject malicious     payloads through computed extrafields or other evaluation paths using PHP dynamic callable syntax to     bypass validation and achieve arbitrary command execution via eval(). (CVE-2026-22666)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306124">https://www.tenable.com/plugins/nessus/306124</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dell PowerScale OneFS 9.5.x < 9.10.1.7 / 9.11.x < 9.13.0.1 Information Disclosure (DSA-2026-125)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306123</link>
            <guid>https://www.tenable.com/plugins/nessus/306123</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306123 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Dell PowerScale OneFS is affected by an information disclosure vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Dell PowerScale OneFS running on the remote host is 9.5.x prior to 9.10.1.7 or 9.11.x prior to 9.13.0.1. It is, therefore, affected by a vulnerability:<br /></span><span><br /></span><span>  - A generation of error message containing sensitive information vulnerability allows a high privileged attacker     with local access to potentially access sensitive information. (CVE-2026-24511)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Dell PowerScale OneFS version 9.10.1.7 / 9.13.0.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306123">https://www.tenable.com/plugins/nessus/306123</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dell PowerScale OneFS 9.5.x < 9.10.1.7 / 9.11.x < 9.13.0.2 Incorrect Privilege Assignment (DSA-2026-125)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306122</link>
            <guid>https://www.tenable.com/plugins/nessus/306122</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306122 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Dell PowerScale OneFS is affected by an incorrect privilege assignment vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Dell PowerScale OneFS running on the remote host is 9.5.x prior to 9.10.1.7 or 9.11.x prior to 9.13.0.2. It is, therefore, affected by a vulnerability:<br /></span><span><br /></span><span>  - An incorrect privilege assignment vulnerability allows a low privileged attacker with local access to     potentially escalate privileges. (CVE-2026-27102)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Dell PowerScale OneFS version 9.10.1.7 / 9.13.0.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306122">https://www.tenable.com/plugins/nessus/306122</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 10 : nghttp2 (ELSA-2026-7666)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306121</link>
            <guid>https://www.tenable.com/plugins/nessus/306121</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306121 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 10 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2026-7666 advisory.<br /></span><span><br /></span><span>    [1.64.0-2.1]<br /></span><span>    - fix Denial of service: Assertion failure due to the missing state validation (CVE-2026-27135)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected libnghttp2, libnghttp2-devel and / or nghttp2 packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306121">https://www.tenable.com/plugins/nessus/306121</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 10 : openexr (ELSA-2026-7682)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306120</link>
            <guid>https://www.tenable.com/plugins/nessus/306120</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306120 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 10 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2026-7682 advisory.<br /></span><span><br /></span><span>    [3.1.10-8.1]<br /></span><span>    - fix CVE-2026-27622<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected openexr, openexr-devel and / or openexr-libs packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306120">https://www.tenable.com/plugins/nessus/306120</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 8 : nghttp2 (ELSA-2026-7667)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306119</link>
            <guid>https://www.tenable.com/plugins/nessus/306119</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306119 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 8 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2026-7667 advisory.<br /></span><span><br /></span><span>    [1.33.0-6.2]<br /></span><span>    - fix Denial of service: Assertion failure due to the missing state validation (CVE-2026-27135)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected libnghttp2, libnghttp2-devel and / or nghttp2 packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306119">https://www.tenable.com/plugins/nessus/306119</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 9 : nginx:1.26 (ELSA-2026-7343)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306118</link>
            <guid>https://www.tenable.com/plugins/nessus/306118</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306118 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2026-7343 advisory.<br /></span><span><br /></span><span>    - Resolves: RHEL-157887 - CVE-2026-32647 nginx:1.26/nginx: NGINX: Denial of       Service or Code Execution via specially crafted MP4 files<br /></span><span>    - Resolves: RHEL-159446 - CVE-2026-27651 nginx:1.26/nginx: NGINX: Denial of       Service via undisclosed requests when ngx_mail_auth_http_module is       enabled<br /></span><span>    - Resolves: RHEL-159538 - CVE-2026-27784 nginx:1.26/nginx: NGINX: Denial of       Service due to memory corruption via crafted MP4 file<br /></span><span>    - Resolves: RHEL-159559 - CVE-2026-27654 nginx:1.26/nginx: NGINX: Denial of       Service or file modification via buffer overflow in ngx_http_dav_module<br /></span><span>    - nginx: NGINX: Data injection via man-in-the-middle attack on TLS proxied       connections (CVE-2026-1642)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306118">https://www.tenable.com/plugins/nessus/306118</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MiracleLinux 9 : git-lfs-3.6.1-8.el9_7 (AXSA:2026-420:04)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306117</link>
            <guid>https://www.tenable.com/plugins/nessus/306117</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306117 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote MiracleLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote MiracleLinux 9 host has a package installed that is affected by a vulnerability as referenced in the AXSA:2026-420:04 advisory.<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected git-lfs package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306117">https://www.tenable.com/plugins/nessus/306117</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MiracleLinux 9 : python3.9-3.9.25-3.el9_7.2 (AXSA:2026-419:03)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306116</link>
            <guid>https://www.tenable.com/plugins/nessus/306116</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306116 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote MiracleLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote MiracleLinux 9 host has packages installed that are affected by a vulnerability as referenced in the AXSA:2026-419:03 advisory.<br /></span><span><br /></span><span>    * python: Python: Command-line option injection in webbrowser.open() via crafted URLs (CVE-2026-4519)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306116">https://www.tenable.com/plugins/nessus/306116</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MiracleLinux 9 : [security - high] gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free (AXSA:2026-421:01)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306115</link>
            <guid>https://www.tenable.com/plugins/nessus/306115</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306115 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote MiracleLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote MiracleLinux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the AXSA:2026-421:01 advisory.<br /></span><span><br /></span><span>    * GStreamer: GStreamer: Arbitrary code execution via ASF file processing (CVE-2026-2920)<br /></span><span>      * GStreamer: GStreamer: Remote Code Execution via heap-based buffer overflow in JPEG parser     (CVE-2026-3082)<br /></span><span>      * GStreamer: GStreamer: Remote Code Execution via Heap-based Buffer Overflow in rtpqdm2depay     (CVE-2026-3085)<br /></span><span>      * GStreamer: GStreamer: Arbitrary code execution via RIFF palette integer overflow in AVI file handling     (CVE-2026-2921)<br /></span><span>      * GStreamer: GStreamer: Remote Code Execution via Out-Of-Bounds Write in rtpqdm2depay (CVE-2026-3083)<br /></span><span>      * GStreamer: GStreamer: Remote Code Execution via out-of-bounds write in RealMedia Demuxer     (CVE-2026-2922)<br /></span><span>      * GStreamer: GStreamer: Remote Code Execution via out-of-bounds write in DVB Subtitles handling     (CVE-2026-2923)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306115">https://www.tenable.com/plugins/nessus/306115</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MiracleLinux 9 : fontforge-20201107-8.el9_7 (AXSA:2026-417:02)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306114</link>
            <guid>https://www.tenable.com/plugins/nessus/306114</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306114 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote MiracleLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote MiracleLinux 9 host has a package installed that is affected by a vulnerability as referenced in the AXSA:2026-417:02 advisory.<br /></span><span><br /></span><span>    * fontforge: FontForge: Remote Code Execution via malicious SFD file parsing (CVE-2025-15270)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected fontforge package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306114">https://www.tenable.com/plugins/nessus/306114</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MiracleLinux 8 : freerdp-2.11.7-6.el8_10 (AXSA:2026-416:12)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306113</link>
            <guid>https://www.tenable.com/plugins/nessus/306113</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306113 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote MiracleLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote MiracleLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the AXSA:2026-416:12 advisory.<br /></span><span><br /></span><span>    * freerdp: FreeRDP heap-use-after-free (CVE-2026-22856)<br /></span><span>      * freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22854)<br /></span><span>      * freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22852)<br /></span><span>      * freerdp: FreeRDP: Denial of Service via FastGlyph parsing buffer overflow (CVE-2026-23732)<br /></span><span>      * freerdp: FreeRDP: Denial of Service via use-after-free in AUDIN format renegotiation (CVE-2026-24676)<br /></span><span>      * freerdp: FreeRDP has a heap-use-after-free in video_timer (CVE-2026-24491)<br /></span><span>      * freerdp: FreeRDP has a NULL Pointer Dereference in rdp_write_logon_info_v2() (CVE-2026-23948)<br /></span><span>      * freerdp: FreeRDP has a Heap-use-after-free in play_thread (CVE-2026-24684)<br /></span><span>      * freerdp: FreeRDP has a heap-use-after-free in urb_bulk_transfer_cb (CVE-2026-24681)<br /></span><span>      * freerdp: FreeRDP has a heap-use-after-free in ainput_send_input_event (CVE-2026-24683)<br /></span><span>      * freerdp: FreeRDP has a heap-buffer-overflow in urb_select_interface (CVE-2026-24679)<br /></span><span>      * freerdp: FreeRDP has a Heap-use-after-free in urb_select_interface (CVE-2026-24675)<br /></span><span>      * freerdp: FreeRDP: Arbitrary code execution via crafted Remote Desktop Protocol (RDP) server messages     (CVE-2026-31806)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306113">https://www.tenable.com/plugins/nessus/306113</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : firefox (RHSA-2026:7839)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306112</link>
            <guid>https://www.tenable.com/plugins/nessus/306112</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306112 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for firefox.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7839 advisory.<br /></span><span><br /></span><span>    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and     portability.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR     140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)<br /></span><span><br /></span><span>    * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component     (CVE-2026-4688)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4695)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4689)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine     component (CVE-2026-4716)<br /></span><span><br /></span><span>    * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component     (CVE-2026-4684)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)<br /></span><span><br /></span><span>    * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)<br /></span><span><br /></span><span>    * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4697)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4690)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component     (CVE-2026-4699)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component     (CVE-2026-4693)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component     (CVE-2026-4694)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149     and Thunderbird 149 (CVE-2026-4720)<br /></span><span><br /></span><span>    * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)<br /></span><span><br /></span><span>    * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component     (CVE-2026-4687)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL firefox package based on the guidance in RHSA-2026:7839.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306112">https://www.tenable.com/plugins/nessus/306112</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : rhc (RHSA-2026:7665)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306111</link>
            <guid>https://www.tenable.com/plugins/nessus/306111</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306111 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for rhc.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:7665 advisory.<br /></span><span><br /></span><span>    rhc is a client tool and daemon that connects the system to Red Hat hosted services enabling system and     subscription management.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL rhc package based on the guidance in RHSA-2026:7665.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306111">https://www.tenable.com/plugins/nessus/306111</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : perl-XML-Parser (RHSA-2026:7680)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306110</link>
            <guid>https://www.tenable.com/plugins/nessus/306110</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306110 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for perl-XML-Parser.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7680 advisory.<br /></span><span><br /></span><span>    This module provides ways to parse XML documents. It is built on top of XML::Parser::Expat, which is a     lower level interface to James Clark's expat library. Each call to one of the parsing methods creates a     new instance of XML::Parser::Expat which is then used to parse the document. Expat options may be provided     when the XML::Parser object is created. These options are then passed on to the Expat object on each parse     call. They can also be given as extra arguments to the parse methods, in which case they override options     given at XML::Parser creation time.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * perl-xml-parser: XML::Parser: Memory corruption via deeply nested XML files (CVE-2006-10003)<br /></span><span><br /></span><span>    * perl-xml-parser: XML::Parser for Perl: Heap corruption and denial of service from crafted XML input     (CVE-2006-10002)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL perl-XML-Parser package based on the guidance in RHSA-2026:7680.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306110">https://www.tenable.com/plugins/nessus/306110</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : firefox (RHSA-2026:7843)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306109</link>
            <guid>https://www.tenable.com/plugins/nessus/306109</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306109 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for firefox.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7843 advisory.<br /></span><span><br /></span><span>    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and     portability.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR     140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)<br /></span><span><br /></span><span>    * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component     (CVE-2026-4688)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4695)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4689)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine     component (CVE-2026-4716)<br /></span><span><br /></span><span>    * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component     (CVE-2026-4684)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)<br /></span><span><br /></span><span>    * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)<br /></span><span><br /></span><span>    * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4697)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4690)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component     (CVE-2026-4699)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component     (CVE-2026-4693)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component     (CVE-2026-4694)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149     and Thunderbird 149 (CVE-2026-4720)<br /></span><span><br /></span><span>    * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)<br /></span><span><br /></span><span>    * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component     (CVE-2026-4687)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL firefox package based on the guidance in RHSA-2026:7843.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306109">https://www.tenable.com/plugins/nessus/306109</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : firefox (RHSA-2026:7840)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306108</link>
            <guid>https://www.tenable.com/plugins/nessus/306108</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306108 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for firefox.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7840 advisory.<br /></span><span><br /></span><span>    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and     portability.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR     140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)<br /></span><span><br /></span><span>    * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component     (CVE-2026-4688)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4695)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4689)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine     component (CVE-2026-4716)<br /></span><span><br /></span><span>    * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component     (CVE-2026-4684)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)<br /></span><span><br /></span><span>    * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)<br /></span><span><br /></span><span>    * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4697)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4690)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component     (CVE-2026-4699)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component     (CVE-2026-4693)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component     (CVE-2026-4694)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149     and Thunderbird 149 (CVE-2026-4720)<br /></span><span><br /></span><span>    * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)<br /></span><span><br /></span><span>    * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component     (CVE-2026-4687)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL firefox package based on the guidance in RHSA-2026:7840.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306108">https://www.tenable.com/plugins/nessus/306108</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : rhc (RHSA-2026:7669)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306107</link>
            <guid>https://www.tenable.com/plugins/nessus/306107</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306107 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for rhc.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has a package installed that is affected by a vulnerability as referenced in the RHSA-2026:7669 advisory.<br /></span><span><br /></span><span>    rhc is a client tool and daemon that connects the system to Red Hat hosted services enabling system and     subscription management.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL rhc package based on the guidance in RHSA-2026:7669.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306107">https://www.tenable.com/plugins/nessus/306107</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : fontforge (RHSA-2026:7677)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306106</link>
            <guid>https://www.tenable.com/plugins/nessus/306106</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306106 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for fontforge.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7677 advisory.<br /></span><span><br /></span><span>    FontForge is a font editor for outline and bitmap fonts. It supports a range of font formats, including     PostScript (ASCII and binary Type 1, some Type 3 and Type 0), TrueType, OpenType (Type2) and CID-keyed     fonts.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * fontforge: FontForge: Remote Code Execution via heap-based buffer overflow in BMP file parsing     (CVE-2025-15279)<br /></span><span><br /></span><span>    * fontforge: FontForge: Remote Code Execution via Use-After-Free in SFD file parsing (CVE-2025-15269)<br /></span><span><br /></span><span>    * fontforge: FontForge: Arbitrary code execution via SFD file parsing buffer overflow (CVE-2025-15275)<br /></span><span><br /></span><span>    * fontforge: FontForge: Remote Code Execution via malicious SFD file parsing (CVE-2025-15270)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL fontforge package based on the guidance in RHSA-2026:7677.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306106">https://www.tenable.com/plugins/nessus/306106</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : openexr (RHSA-2026:7682)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306105</link>
            <guid>https://www.tenable.com/plugins/nessus/306105</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306105 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for openexr.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:7682 advisory.<br /></span><span><br /></span><span>    OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image     processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are     specific to this format.  This package containes the binaries for OpenEXR.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * openexr: OpenEXR: Arbitrary code execution via integer overflow in EXR file processing (CVE-2026-27622)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL openexr package based on the guidance in RHSA-2026:7682.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306105">https://www.tenable.com/plugins/nessus/306105</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : firefox (RHSA-2026:7841)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306104</link>
            <guid>https://www.tenable.com/plugins/nessus/306104</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306104 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for firefox.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7841 advisory.<br /></span><span><br /></span><span>    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and     portability.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR     140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)<br /></span><span><br /></span><span>    * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component     (CVE-2026-4688)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4695)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4689)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine     component (CVE-2026-4716)<br /></span><span><br /></span><span>    * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component     (CVE-2026-4684)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)<br /></span><span><br /></span><span>    * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)<br /></span><span><br /></span><span>    * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4697)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4690)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component     (CVE-2026-4699)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component     (CVE-2026-4693)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component     (CVE-2026-4694)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149     and Thunderbird 149 (CVE-2026-4720)<br /></span><span><br /></span><span>    * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)<br /></span><span><br /></span><span>    * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component     (CVE-2026-4687)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL firefox package based on the guidance in RHSA-2026:7841.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306104">https://www.tenable.com/plugins/nessus/306104</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : vim (RHSA-2026:7711)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306103</link>
            <guid>https://www.tenable.com/plugins/nessus/306103</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306103 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for vim.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7711 advisory.<br /></span><span><br /></span><span>    Vim (Vi IMproved) is an updated and improved version of the vi editor.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * vim: Vim: Arbitrary code execution via OS command injection in the netrw plugin (CVE-2026-28417)<br /></span><span><br /></span><span>    * vim: Vim: Denial of service and information disclosure via crafted swap file (CVE-2026-28421)<br /></span><span><br /></span><span>    * vim: Vim: Arbitrary code execution via command injection in glob() function (CVE-2026-33412)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL vim package based on the guidance in RHSA-2026:7711.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306103">https://www.tenable.com/plugins/nessus/306103</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : perl-XML-Parser (RHSA-2026:7681)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306102</link>
            <guid>https://www.tenable.com/plugins/nessus/306102</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306102 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for perl-XML-Parser.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7681 advisory.<br /></span><span><br /></span><span>    This module provides ways to parse XML documents. It is built on top of XML::Parser::Expat, which is a     lower level interface to James Clark's expat library. Each call to one of the parsing methods creates a     new instance of XML::Parser::Expat which is then used to parse the document. Expat options may be provided     when the XML::Parser object is created. These options are then passed on to the Expat object on each parse     call. They can also be given as extra arguments to the parse methods, in which case they override options     given at XML::Parser creation time.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * perl-xml-parser: XML::Parser: Memory corruption via deeply nested XML files (CVE-2006-10003)<br /></span><span><br /></span><span>    * perl-xml-parser: XML::Parser for Perl: Heap corruption and denial of service from crafted XML input     (CVE-2006-10002)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL perl-XML-Parser package based on the guidance in RHSA-2026:7681.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306102">https://www.tenable.com/plugins/nessus/306102</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : nghttp2 (RHSA-2026:7666)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306101</link>
            <guid>https://www.tenable.com/plugins/nessus/306101</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306101 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for nghttp2.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:7666 advisory.<br /></span><span><br /></span><span>    libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination     (CVE-2026-27135)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL nghttp2 package based on the guidance in RHSA-2026:7666.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306101">https://www.tenable.com/plugins/nessus/306101</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : firefox (RHSA-2026:7672)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306100</link>
            <guid>https://www.tenable.com/plugins/nessus/306100</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306100 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for firefox.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7672 advisory.<br /></span><span><br /></span><span>    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and     portability.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * libpng: libpng: Arbitrary code execution due to use-after-free vulnerability (CVE-2026-33416)<br /></span><span><br /></span><span>    * libpng: libpng: Information disclosure and denial of service via out-of-bounds read/write in Neon     palette expansion (CVE-2026-33636)<br /></span><span><br /></span><span>    * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox     149.0.2 and Thunderbird 149.0.2 (CVE-2026-5734)<br /></span><span><br /></span><span>    * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird     ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2 (CVE-2026-5731)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics: Text component     (CVE-2026-5732)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL firefox package based on the guidance in RHSA-2026:7672.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306100">https://www.tenable.com/plugins/nessus/306100</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 20.04 LTS / 22.04 LTS : Linux kernel vulnerabilities (USN-8159-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306099</link>
            <guid>https://www.tenable.com/plugins/nessus/306099</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306099 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 20.04 LTS / 22.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-8159-1 advisory.<br /></span><span><br /></span><span>    Several security issues were discovered in the Linux kernel. An attacker could possibly use these to     compromise the system. This update corrects flaws in the following subsystems:<br /></span><span><br /></span><span>    - ARM64 architecture;<br /></span><span><br /></span><span>    - Cryptographic API;<br /></span><span><br /></span><span>    - Netfilter;<br /></span><span><br /></span><span>    - Network traffic control; (CVE-2025-37849, CVE-2026-23060, CVE-2026-23074, CVE-2026-23111)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306099">https://www.tenable.com/plugins/nessus/306099</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 14.04 LTS : Salt vulnerabilities (USN-8153-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306098</link>
            <guid>https://www.tenable.com/plugins/nessus/306098</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306098 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 14.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8153-1 advisory.<br /></span><span><br /></span><span>    Zach Malone discovered that Salt did not properly handle permissions to cache data. A local attacker could     possibly use this issue to obtain sensitive information. (CVE-2015-8034) Dylan Frese discovered that Salt     incorrectly allowed users to specify PAM service. An attacker could possibly use this issue to bypass     authentication. (CVE-2016-3176)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306098">https://www.tenable.com/plugins/nessus/306098</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu Pro Realtime 22.04 LTS : Linux kernel (Intel IoTG Real-time) vulnerabilities (USN-8164-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306097</link>
            <guid>https://www.tenable.com/plugins/nessus/306097</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306097 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu Pro Realtime 22.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-8164-1 advisory.<br /></span><span><br /></span><span>    Qualys discovered that several vulnerabilities existed in the AppArmor Linux kernel Security Module (LSM).<br /></span><span>    An unprivileged local attacker could use these issues to load, replace, and remove arbitrary AppArmor     profiles causing denial of service, exposure of sensitive information (kernel memory), local privilege     escalation, or possibly escape a container. (LP: #2143853, CVE-2026-23268, CVE-2026-23269, CVE-2026-23403,     CVE-2026-23404, CVE-2026-23405, CVE-2026-23406, CVE-2026-23407, CVE-2026-23408, CVE-2026-23409,     CVE-2026-23410, CVE-2026-23411)<br /></span><span><br /></span><span>    Several security issues were discovered in the Linux kernel. An attacker could possibly use these to     compromise the system. This update corrects flaws in the following subsystems:<br /></span><span><br /></span><span>    - ARM64 architecture;<br /></span><span><br /></span><span>    - Cryptographic API;<br /></span><span><br /></span><span>    - Netfilter;<br /></span><span><br /></span><span>    - Network traffic control; (CVE-2025-37849, CVE-2026-23060, CVE-2026-23074, CVE-2026-23111)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306097">https://www.tenable.com/plugins/nessus/306097</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 24.04 LTS / 25.10 : RetroArch vulnerability (USN-8166-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306096</link>
            <guid>https://www.tenable.com/plugins/nessus/306096</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306096 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 24.04 LTS / 25.10 host has packages installed that are affected by a vulnerability as referenced in the USN-8166-1 advisory.<br /></span><span><br /></span><span>    It was discovered that RetroArch did not correctly handle certain memory operations, which could lead to a     buffer overflow. If a user or automated system were tricked into opening a specially crafted file, an     attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue     only affected Ubuntu 24.04 LTS and Ubuntu 25.10.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected retroarch and / or retroarch-dev packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306096">https://www.tenable.com/plugins/nessus/306096</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 18.04 LTS / 20.04 LTS / 22.04 LTS / 24.04 LTS / 25.10 : Django vulnerabilities (USN-8154-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306095</link>
            <guid>https://www.tenable.com/plugins/nessus/306095</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306095 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 18.04 LTS / 20.04 LTS / 22.04 LTS / 24.04 LTS / 25.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8154-1 advisory.<br /></span><span><br /></span><span>    Seokchan Yoon discovered that Django incorrectly handled copying memory when parsing multipart uploads     with excessive whitespace. A remote attacker could possibly use this issue to cause Django to use     excessive resources, leading to a denial of service. (CVE-2026-33033)<br /></span><span><br /></span><span>    It was discovered that Django did not enforce an upload memory size limit in the Content-Length header. A     remote attacker could possibly use this issue to cause Django to use excessive resources, leading to a     denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-33034)<br /></span><span><br /></span><span>    Tarek Nakkouch discovered that Django incorrectly handled underscores in the ASGI headers. A remote     attacker could possibly use this issue to spoof HTTP headers. This issue only affected Ubuntu 22.04 LTS,     Ubuntu 24.04 LTS, and Ubuntu 25.10. (CVE-2026-3902)<br /></span><span><br /></span><span>    It was discovered that Django incorrectly handled verification of model data created with POST requests. A     remote attacker could possibly use this issue to forge new model permissions. (CVE-2026-4277,     CVE-2026-4292)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected python-django, python-django-common and / or python3-django packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306095">https://www.tenable.com/plugins/nessus/306095</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu Pro FIPS-updates 24.04 LTS : Linux kernel (Azure FIPS) vulnerabilities (USN-8165-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306094</link>
            <guid>https://www.tenable.com/plugins/nessus/306094</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306094 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu Pro FIPS-updates 24.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-8165-1 advisory.<br /></span><span><br /></span><span>    Qualys discovered that several vulnerabilities existed in the AppArmor Linux kernel Security Module (LSM).<br /></span><span>    An unprivileged local attacker could use these issues to load, replace, and remove arbitrary AppArmor     profiles causing denial of service, exposure of sensitive information (kernel memory), local privilege     escalation, or possibly escape a container. (LP: #2143853, CVE-2026-23268, CVE-2026-23269, CVE-2026-23403,     CVE-2026-23404, CVE-2026-23405, CVE-2026-23406, CVE-2026-23407, CVE-2026-23408, CVE-2026-23409,     CVE-2026-23410, CVE-2026-23411)<br /></span><span><br /></span><span>    Several security issues were discovered in the Linux kernel. An attacker could possibly use these to     compromise the system. This update corrects flaws in the following subsystems:<br /></span><span><br /></span><span>    - ARM64 architecture;<br /></span><span><br /></span><span>    - MIPS architecture;<br /></span><span><br /></span><span>    - Nios II architecture;<br /></span><span><br /></span><span>    - PA-RISC architecture;<br /></span><span><br /></span><span>    - RISC-V architecture;<br /></span><span><br /></span><span>    - S390 architecture;<br /></span><span><br /></span><span>    - Sun Sparc architecture;<br /></span><span><br /></span><span>    - User-Mode Linux (UML);<br /></span><span><br /></span><span>    - x86 architecture;<br /></span><span><br /></span><span>    - Xtensa architecture;<br /></span><span><br /></span><span>    - Block layer subsystem;<br /></span><span><br /></span><span>    - Cryptographic API;<br /></span><span><br /></span><span>    - Compute Acceleration Framework;<br /></span><span><br /></span><span>    - ACPI drivers;<br /></span><span><br /></span><span>    - ATM drivers;<br /></span><span><br /></span><span>    - Drivers core;<br /></span><span><br /></span><span>    - Block device driver;<br /></span><span><br /></span><span>    - Network block device driver;<br /></span><span><br /></span><span>    - Bluetooth drivers;<br /></span><span><br /></span><span>    - Bus devices;<br /></span><span><br /></span><span>    - Hardware random number generator core;<br /></span><span><br /></span><span>    - Character device driver;<br /></span><span><br /></span><span>    - Data acquisition framework and drivers;<br /></span><span><br /></span><span>    - CPU frequency scaling framework;<br /></span><span><br /></span><span>    - Hardware crypto device drivers;<br /></span><span><br /></span><span>    - Device frequency scaling framework;<br /></span><span><br /></span><span>    - DMA engine subsystem;<br /></span><span><br /></span><span>    - ARM SCMI message protocol;<br /></span><span><br /></span><span>    - EFI core;<br /></span><span><br /></span><span>    - Intel Stratix 10 firmware drivers;<br /></span><span><br /></span><span>    - GPU drivers;<br /></span><span><br /></span><span>    - HID subsystem;<br /></span><span><br /></span><span>    - CoreSight HW tracing drivers;<br /></span><span><br /></span><span>    - IIO subsystem;<br /></span><span><br /></span><span>    - InfiniBand drivers;<br /></span><span><br /></span><span>    - Input Device core drivers;<br /></span><span><br /></span><span>    - Input Device (Miscellaneous) drivers;<br /></span><span><br /></span><span>    - Input Device (Tablet) drivers;<br /></span><span><br /></span><span>    - IOMMU subsystem;<br /></span><span><br /></span><span>    - ISDN/mISDN subsystem;<br /></span><span><br /></span><span>    - Mailbox framework;<br /></span><span><br /></span><span>    - Multiple devices driver;<br /></span><span><br /></span><span>    - Media drivers;<br /></span><span><br /></span><span>    - Fastrpc Driver;<br /></span><span><br /></span><span>    - MOST (Media Oriented Systems Transport) drivers;<br /></span><span><br /></span><span>    - MTD block device drivers;<br /></span><span><br /></span><span>    - Ethernet bonding driver;<br /></span><span><br /></span><span>    - Network drivers;<br /></span><span><br /></span><span>    - Mellanox network drivers;<br /></span><span><br /></span><span>    - STMicroelectronics network drivers;<br /></span><span><br /></span><span>    - Texas Instruments network drivers;<br /></span><span><br /></span><span>    - Ethernet team driver;<br /></span><span><br /></span><span>    - NVME drivers;<br /></span><span><br /></span><span>    - PCI subsystem;<br /></span><span><br /></span><span>    - PCCARD (PCMCIA/CardBus) bus subsystem;<br /></span><span><br /></span><span>    - Performance monitor drivers;<br /></span><span><br /></span><span>    - Pin controllers subsystem;<br /></span><span><br /></span><span>    - x86 platform drivers;<br /></span><span><br /></span><span>    - ARM PM domains;<br /></span><span><br /></span><span>    - PPS (Pulse Per Second) driver;<br /></span><span><br /></span><span>    - PTP clock framework;<br /></span><span><br /></span><span>    - PWM drivers;<br /></span><span><br /></span><span>    - Remote Processor subsystem;<br /></span><span><br /></span><span>    - S/390 drivers;<br /></span><span><br /></span><span>    - SCSI subsystem;<br /></span><span><br /></span><span>    - Texas Instruments SoC drivers;<br /></span><span><br /></span><span>    - TCM subsystem;<br /></span><span><br /></span><span>    - Trusted Execution Environment drivers;<br /></span><span><br /></span><span>    - TTY drivers;<br /></span><span><br /></span><span>    - Userspace I/O drivers;<br /></span><span><br /></span><span>    - Cadence USB3 driver;<br /></span><span><br /></span><span>    - DesignWare USB3 driver;<br /></span><span><br /></span><span>    - USB Gadget drivers;<br /></span><span><br /></span><span>    - USB Host Controller drivers;<br /></span><span><br /></span><span>    - Renesas USBHS Controller drivers;<br /></span><span><br /></span><span>    - USB Mass Storage drivers;<br /></span><span><br /></span><span>    - Virtio Host (VHOST) subsystem;<br /></span><span><br /></span><span>    - Framebuffer layer;<br /></span><span><br /></span><span>    - Xen hypervisor drivers;<br /></span><span><br /></span><span>    - AFS file system;<br /></span><span><br /></span><span>    - BTRFS file system;<br /></span><span><br /></span><span>    - Ceph distributed file system;<br /></span><span><br /></span><span>    - File systems infrastructure;<br /></span><span><br /></span><span>    - EFI Variable file system;<br /></span><span><br /></span><span>    - exFAT file system;<br /></span><span><br /></span><span>    - Ext4 file system;<br /></span><span><br /></span><span>    - F2FS file system;<br /></span><span><br /></span><span>    - FUSE (File system in Userspace);<br /></span><span><br /></span><span>    - GFS2 file system;<br /></span><span><br /></span><span>    - HFS file system;<br /></span><span><br /></span><span>    - HFS+ file system;<br /></span><span><br /></span><span>    - HugeTLB file system;<br /></span><span><br /></span><span>    - JFS file system;<br /></span><span><br /></span><span>    - KERNFS file system;<br /></span><span><br /></span><span>    - Network file system (NFS) client;<br /></span><span><br /></span><span>    - Network file system (NFS) server daemon;<br /></span><span><br /></span><span>    - File system notification infrastructure;<br /></span><span><br /></span><span>    - NTFS3 file system;<br /></span><span><br /></span><span>    - OCFS2 file system;<br /></span><span><br /></span><span>    - OrangeFS file system;<br /></span><span><br /></span><span>    - Proc file system;<br /></span><span><br /></span><span>    - Diskquota system;<br /></span><span><br /></span><span>    - SMB network file system;<br /></span><span><br /></span><span>    - SquashFS file system;<br /></span><span><br /></span><span>    - UDF file system;<br /></span><span><br /></span><span>    - XFS file system;<br /></span><span><br /></span><span>    - Asynchronous Transfer Mode (ATM) subsystem;<br /></span><span><br /></span><span>    - BPF subsystem;<br /></span><span><br /></span><span>    - Mellanox drivers;<br /></span><span><br /></span><span>    - NFS page cache wrapper;<br /></span><span><br /></span><span>    - Memory management;<br /></span><span><br /></span><span>    - Memory Management;<br /></span><span><br /></span><span>    - Media input infrastructure;<br /></span><span><br /></span><span>    - Bluetooth subsystem;<br /></span><span><br /></span><span>    - IP tunnels definitions;<br /></span><span><br /></span><span>    - Network traffic control;<br /></span><span><br /></span><span>    - Rose network layer;<br /></span><span><br /></span><span>    - Network sockets;<br /></span><span><br /></span><span>    - io_uring subsystem;<br /></span><span><br /></span><span>    - Control group (cgroup);<br /></span><span><br /></span><span>    - Kernel crash support code;<br /></span><span><br /></span><span>    - Kernel futex primitives;<br /></span><span><br /></span><span>    - PID allocator;<br /></span><span><br /></span><span>    - Scheduler infrastructure;<br /></span><span><br /></span><span>    - Syscalls implementation;<br /></span><span><br /></span><span>    - Timer subsystem;<br /></span><span><br /></span><span>    - Tracing infrastructure;<br /></span><span><br /></span><span>    - 9P file system network protocol;<br /></span><span><br /></span><span>    - Amateur Radio drivers;<br /></span><span><br /></span><span>    - B.A.T.M.A.N. meshing protocol;<br /></span><span><br /></span><span>    - Ethernet bridge;<br /></span><span><br /></span><span>    - Ceph Core library;<br /></span><span><br /></span><span>    - Networking core;<br /></span><span><br /></span><span>    - Devlink API;<br /></span><span><br /></span><span>    - IPv4 networking;<br /></span><span><br /></span><span>    - IPv6 networking;<br /></span><span><br /></span><span>    - MAC80211 subsystem;<br /></span><span><br /></span><span>    - Multipath TCP;<br /></span><span><br /></span><span>    - Netfilter;<br /></span><span><br /></span><span>    - NFC subsystem;<br /></span><span><br /></span><span>    - Open vSwitch;<br /></span><span><br /></span><span>    - RF switch subsystem;<br /></span><span><br /></span><span>    - SCTP protocol;<br /></span><span><br /></span><span>    - SMC sockets;<br /></span><span><br /></span><span>    - Sun RPC protocol;<br /></span><span><br /></span><span>    - TIPC protocol;<br /></span><span><br /></span><span>    - TLS protocol;<br /></span><span><br /></span><span>    - VMware vSockets driver;<br /></span><span><br /></span><span>    - Wireless networking;<br /></span><span><br /></span><span>    - eXpress Data Path;<br /></span><span><br /></span><span>    - XFRM subsystem;<br /></span><span><br /></span><span>    - Integrity Measurement Architecture(IMA) framework;<br /></span><span><br /></span><span>    - Intel ASoC drivers;<br /></span><span><br /></span><span>    - QCOM ASoC drivers;<br /></span><span><br /></span><span>    - USB sound devices; (CVE-2025-21833, CVE-2025-22103, CVE-2025-22105, CVE-2025-22106, CVE-2025-22107,     CVE-2025-22113, CVE-2025-22121, CVE-2025-22124, CVE-2025-22125, CVE-2025-23129, CVE-2025-23130,     CVE-2025-23133, CVE-2025-23143, CVE-2025-37860, CVE-2025-38105, CVE-2025-38502, CVE-2025-38556,     CVE-2025-38627, CVE-2025-38643, CVE-2025-38709, CVE-2025-39678, CVE-2025-39697, CVE-2025-39805,     CVE-2025-39806, CVE-2025-39807, CVE-2025-39808, CVE-2025-39810, CVE-2025-39811, CVE-2025-39812,     CVE-2025-39813, CVE-2025-39815, CVE-2025-39817, CVE-2025-39819, CVE-2025-39823, CVE-2025-39824,     CVE-2025-39825, CVE-2025-39826, CVE-2025-39827, CVE-2025-39828, CVE-2025-39829, CVE-2025-39832,     CVE-2025-39835, CVE-2025-39836, CVE-2025-39838, CVE-2025-39839, CVE-2025-39841, CVE-2025-39842,     CVE-2025-39843, CVE-2025-39844, CVE-2025-39845, CVE-2025-39846, CVE-2025-39847, CVE-2025-39848,     CVE-2025-39849, CVE-2025-39850, CVE-2025-39851, CVE-2025-39852, CVE-2025-39853, CVE-2025-39854,     CVE-2025-39857, CVE-2025-39860, CVE-2025-39861, CVE-2025-39863, CVE-2025-39864, CVE-2025-39865,     CVE-2025-39866, CVE-2025-39869, CVE-2025-39870, CVE-2025-39871, CVE-2025-39873, CVE-2025-39876,     CVE-2025-39877, CVE-2025-39880, CVE-2025-39881, CVE-2025-39883, CVE-2025-39885, CVE-2025-39886,     CVE-2025-39891, CVE-2025-39894, CVE-2025-39895, CVE-2025-39897, CVE-2025-39899, CVE-2025-39901,     CVE-2025-39902, CVE-2025-39907, CVE-2025-39909, CVE-2025-39911, CVE-2025-39913, CVE-2025-39914,     CVE-2025-39916, CVE-2025-39920, CVE-2025-39923, CVE-2025-39927, CVE-2025-39929, CVE-2025-39931,     CVE-2025-39932, CVE-2025-39934, CVE-2025-39937, CVE-2025-39938, CVE-2025-39940, CVE-2025-39942,     CVE-2025-39943, CVE-2025-39944, CVE-2025-39945, CVE-2025-39947, CVE-2025-39948, CVE-2025-39949,     CVE-2025-39950, CVE-2025-39951, CVE-2025-39952, CVE-2025-39953, CVE-2025-39955, CVE-2025-39957,     CVE-2025-39961, CVE-2025-39965, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969, CVE-2025-39970,     CVE-2025-39971, CVE-2025-39972, CVE-2025-39973, CVE-2025-39977, CVE-2025-39978, CVE-2025-39980,     CVE-2025-39981, CVE-2025-39982, CVE-2025-39985, CVE-2025-39986, CVE-2025-39987, CVE-2025-39988,     CVE-2025-39991, CVE-2025-39992, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996, CVE-2025-39998,     CVE-2025-40000, CVE-2025-40001, CVE-2025-40006, CVE-2025-40008, CVE-2025-40009, CVE-2025-40010,     CVE-2025-40011, CVE-2025-40013, CVE-2025-40016, CVE-2025-40020, CVE-2025-40021, CVE-2025-40024,     CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030, CVE-2025-40031, CVE-2025-40032,     CVE-2025-40033, CVE-2025-40035, CVE-2025-40036, CVE-2025-40037, CVE-2025-40038, CVE-2025-40042,     CVE-2025-40043, CVE-2025-40044, CVE-2025-40047, CVE-2025-40048, CVE-2025-40049, CVE-2025-40051,     CVE-2025-40052, CVE-2025-40053, CVE-2025-40055, CVE-2025-40056, CVE-2025-40057, CVE-2025-40058,     CVE-2025-40059, CVE-2025-40060, CVE-2025-40061, CVE-2025-40062, CVE-2025-40067, CVE-2025-40068,     CVE-2025-40070, CVE-2025-40071, CVE-2025-40077, CVE-2025-40078, CVE-2025-40079, CVE-2025-40080,     CVE-2025-40081, CVE-2025-40083, CVE-2025-40084, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088,     CVE-2025-40092, CVE-2025-40093, CVE-2025-40094, CVE-2025-40095, CVE-2025-40096, CVE-2025-40099,     CVE-2025-40100, CVE-2025-40101, CVE-2025-40103, CVE-2025-40104, CVE-2025-40105, CVE-2025-40106,     CVE-2025-40107, CVE-2025-40109, CVE-2025-40110, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115,     CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121, CVE-2025-40123, CVE-2025-40124,     CVE-2025-40125, CVE-2025-40126, CVE-2025-40127, CVE-2025-40129, CVE-2025-40134, CVE-2025-40137,     CVE-2025-40140, CVE-2025-40141, CVE-2025-40153, CVE-2025-40154, CVE-2025-40155, CVE-2025-40156,     CVE-2025-40159, CVE-2025-40160, CVE-2025-40165, CVE-2025-40166, CVE-2025-40167, CVE-2025-40169,     CVE-2025-40171, CVE-2025-40172, CVE-2025-40173, CVE-2025-40176, CVE-2025-40178, CVE-2025-40179,     CVE-2025-40180, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188, CVE-2025-40192, CVE-2025-40193,     CVE-2025-40194, CVE-2025-40196, CVE-2025-40198, CVE-2025-40200, CVE-2025-40201, CVE-2025-40202,     CVE-2025-40204, CVE-2025-40205, CVE-2025-40206, CVE-2025-40207, CVE-2025-40211, CVE-2025-40218,     CVE-2025-40219, CVE-2025-40220, CVE-2025-40221, CVE-2025-40223, CVE-2025-40226, CVE-2025-40231,     CVE-2025-40233, CVE-2025-40235, CVE-2025-40237, CVE-2025-40238, CVE-2025-40240, CVE-2025-40242,     CVE-2025-40243, CVE-2025-40244, CVE-2025-40245, CVE-2025-40248, CVE-2025-40250, CVE-2025-40251,     CVE-2025-40252, CVE-2025-40253, CVE-2025-40254, CVE-2025-40257, CVE-2025-40258, CVE-2025-40259,     CVE-2025-40261, CVE-2025-40262, CVE-2025-40263, CVE-2025-40264, CVE-2025-40266, CVE-2025-40268,     CVE-2025-40269, CVE-2025-40271, CVE-2025-40272, CVE-2025-40273, CVE-2025-40275, CVE-2025-40277,     CVE-2025-40278, CVE-2025-40279, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282, CVE-2025-40283,     CVE-2025-40284, CVE-2025-40285, CVE-2025-40286, CVE-2025-40287, CVE-2025-40288, CVE-2025-40289,     CVE-2025-40292, CVE-2025-40293, CVE-2025-40294, CVE-2025-40301, CVE-2025-40303, CVE-2025-40304,     CVE-2025-40305, CVE-2025-40306, CVE-2025-40307, CVE-2025-40308, CVE-2025-40309, CVE-2025-40310,     CVE-2025-40311, CVE-2025-40312, CVE-2025-40313, CVE-2025-40314, CVE-2025-40315, CVE-2025-40317,     CVE-2025-40318, CVE-2025-40319, CVE-2025-40320, CVE-2025-40321, CVE-2025-40322, CVE-2025-40323,     CVE-2025-40324, CVE-2025-40328, CVE-2025-40329, CVE-2025-40331, CVE-2025-40333, CVE-2025-40337,     CVE-2025-40339, CVE-2025-40341, CVE-2025-40342, CVE-2025-40343, CVE-2025-40345, CVE-2025-40346,     CVE-2025-40347, CVE-2025-40349, CVE-2025-40350, CVE-2025-40351, CVE-2025-40353, CVE-2025-40358,     CVE-2025-40360, CVE-2025-40363, CVE-2025-68168, CVE-2025-68171, CVE-2025-68172, CVE-2025-68173,     CVE-2025-68176, CVE-2025-68177, CVE-2025-68178, CVE-2025-68179, CVE-2025-68180, CVE-2025-68183,     CVE-2025-68184, CVE-2025-68185, CVE-2025-68190, CVE-2025-68191, CVE-2025-68192, CVE-2025-68194,     CVE-2025-68198, CVE-2025-68200, CVE-2025-68201, CVE-2025-68204, CVE-2025-68208, CVE-2025-68213,     CVE-2025-68214, CVE-2025-68217, CVE-2025-68218, CVE-2025-68219, CVE-2025-68220, CVE-2025-68222,     CVE-2025-68223, CVE-2025-68227, CVE-2025-68229, CVE-2025-68231, CVE-2025-68233, CVE-2025-68235,     CVE-2025-68237, CVE-2025-68238, CVE-2025-68241, CVE-2025-68244, CVE-2025-68245, CVE-2025-68246,     CVE-2025-68249, CVE-2025-68282, CVE-2025-68283, CVE-2025-68284, CVE-2025-68285, CVE-2025-68286,     CVE-2025-68287, CVE-2025-68288, CVE-2025-68289, CVE-2025-68290, CVE-2025-68295, CVE-2025-68297,     CVE-2025-68301, CVE-2025-68302, CVE-2025-68303, CVE-2025-68305, CVE-2025-68307, CVE-2025-68308,     CVE-2025-68310, CVE-2025-68311, CVE-2025-68312, CVE-2025-68313, CVE-2025-68315, CVE-2025-68320,     CVE-2025-68321, CVE-2025-68322, CVE-2025-68327, CVE-2025-68328, CVE-2025-68330, CVE-2025-68331,     CVE-2025-68339, CVE-2025-68340, CVE-2025-68342, CVE-2025-68343, CVE-2025-68734, CVE-2026-23060,     CVE-2026-23074, CVE-2026-23111)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306094">https://www.tenable.com/plugins/nessus/306094</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 18.04 LTS / 20.04 LTS : MongoDB vulnerability (USN-8160-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306093</link>
            <guid>https://www.tenable.com/plugins/nessus/306093</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306093 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 18.04 LTS / 20.04 LTS host has packages installed that are affected by a vulnerability as referenced in the USN-8160-1 advisory.<br /></span><span><br /></span><span>    It was discovered that MongoDB incorrectly handled length parameters in zlib-compressed network messages     prior to authentication. An unauthenticated remote attacker could possibly use this issue to cause MongoDB     to allocate an oversized memory buffer, resulting in the exposure of sensitive information.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306093">https://www.tenable.com/plugins/nessus/306093</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 20.04 LTS : Linux kernel (NVIDIA Tegra) vulnerabilities (USN-8162-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306092</link>
            <guid>https://www.tenable.com/plugins/nessus/306092</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306092 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 20.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-8162-1 advisory.<br /></span><span><br /></span><span>    Several security issues were discovered in the Linux kernel. An attacker could possibly use these to     compromise the system. This update corrects flaws in the following subsystems:<br /></span><span><br /></span><span>    - ARM64 architecture;<br /></span><span><br /></span><span>    - Block layer subsystem;<br /></span><span><br /></span><span>    - Cryptographic API;<br /></span><span><br /></span><span>    - Drivers core;<br /></span><span><br /></span><span>    - Bluetooth drivers;<br /></span><span><br /></span><span>    - DMA engine subsystem;<br /></span><span><br /></span><span>    - GPU drivers;<br /></span><span><br /></span><span>    - HID subsystem;<br /></span><span><br /></span><span>    - Intel Trace Hub HW tracing drivers;<br /></span><span><br /></span><span>    - IIO ADC drivers;<br /></span><span><br /></span><span>    - IRQ chip drivers;<br /></span><span><br /></span><span>    - Modular ISDN driver;<br /></span><span><br /></span><span>    - LED subsystem;<br /></span><span><br /></span><span>    - UACCE accelerator framework;<br /></span><span><br /></span><span>    - Ethernet bonding driver;<br /></span><span><br /></span><span>    - Network drivers;<br /></span><span><br /></span><span>    - STMicroelectronics network drivers;<br /></span><span><br /></span><span>    - Ethernet team driver;<br /></span><span><br /></span><span>    - NVME drivers;<br /></span><span><br /></span><span>    - PHY drivers;<br /></span><span><br /></span><span>    - SLIMbus drivers;<br /></span><span><br /></span><span>    - W1 Dallas's 1-wire bus driver;<br /></span><span><br /></span><span>    - Xen hypervisor drivers;<br /></span><span><br /></span><span>    - BTRFS file system;<br /></span><span><br /></span><span>    - Ext4 file system;<br /></span><span><br /></span><span>    - Network file system (NFS) client;<br /></span><span><br /></span><span>    - Network file system (NFS) server daemon;<br /></span><span><br /></span><span>    - NTFS3 file system;<br /></span><span><br /></span><span>    - SMB network file system;<br /></span><span><br /></span><span>    - NFC subsystem;<br /></span><span><br /></span><span>    - BPF subsystem;<br /></span><span><br /></span><span>    - IRQ subsystem;<br /></span><span><br /></span><span>    - Memory management;<br /></span><span><br /></span><span>    - Bluetooth subsystem;<br /></span><span><br /></span><span>    - CAN network layer;<br /></span><span><br /></span><span>    - Networking core;<br /></span><span><br /></span><span>    - IPv4 networking;<br /></span><span><br /></span><span>    - IPv6 networking;<br /></span><span><br /></span><span>    - L2TP protocol;<br /></span><span><br /></span><span>    - Netfilter;<br /></span><span><br /></span><span>    - NET/ROM layer;<br /></span><span><br /></span><span>    - Network traffic control;<br /></span><span><br /></span><span>    - SCTP protocol;<br /></span><span><br /></span><span>    - TLS protocol;<br /></span><span><br /></span><span>    - XFRM subsystem;<br /></span><span><br /></span><span>    - Creative Sound Blaster X-Fi driver;<br /></span><span><br /></span><span>    - USB sound devices; (CVE-2023-53421, CVE-2023-53520, CVE-2023-53662, CVE-2023-54207, CVE-2025-37849,     CVE-2025-38057, CVE-2025-38125, CVE-2025-38232, CVE-2025-38408, CVE-2025-38591, CVE-2025-40149,     CVE-2025-40164, CVE-2025-68211, CVE-2025-68340, CVE-2025-68365, CVE-2025-68725, CVE-2025-68817,     CVE-2025-71080, CVE-2025-71163, CVE-2025-71185, CVE-2025-71186, CVE-2025-71188, CVE-2025-71190,     CVE-2025-71191, CVE-2025-71194, CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22997,     CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003, CVE-2026-23011, CVE-2026-23026,     CVE-2026-23033, CVE-2026-23037, CVE-2026-23038, CVE-2026-23049, CVE-2026-23056, CVE-2026-23058,     CVE-2026-23060, CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23071, CVE-2026-23073,     CVE-2026-23074, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078, CVE-2026-23080, CVE-2026-23083,     CVE-2026-23084, CVE-2026-23085, CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091,     CVE-2026-23093, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097, CVE-2026-23098, CVE-2026-23099,     CVE-2026-23101, CVE-2026-23103, CVE-2026-23105, CVE-2026-23108, CVE-2026-23111, CVE-2026-23119,     CVE-2026-23120, CVE-2026-23121, CVE-2026-23124, CVE-2026-23125, CVE-2026-23128, CVE-2026-23133,     CVE-2026-23145, CVE-2026-23146, CVE-2026-23150, CVE-2026-23164, CVE-2026-23167, CVE-2026-23170,     CVE-2026-23209)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306092">https://www.tenable.com/plugins/nessus/306092</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 22.04 LTS / 24.04 LTS / 25.10 : QEMU vulnerabilities (USN-8161-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306091</link>
            <guid>https://www.tenable.com/plugins/nessus/306091</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306091 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 22.04 LTS / 24.04 LTS / 25.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8161-1 advisory.<br /></span><span><br /></span><span>    It was discovered that the LSI53C895A SCSI Host Bus Adapter implementation of QEMU incorrectly handled     memory. An attacker inside the guest could possibly use this issue to cause QEMU to crash, resulting in a     denial of service, or possibly execute arbitrary code. (CVE-2024-6519)<br /></span><span><br /></span><span>    It was discovered that QEMU could be made to read out of bounds when reading VMDK images. If a user or an     automated system were tricked into opening a specially crafted VMDK image, an attacker could possibly use     this issue to leak sensitive informaton or cause QEMU to crash, resulting in a denial of service.<br /></span><span>    (CVE-2026-2243)<br /></span><span><br /></span><span>    It was discovered that the virtio-snd device implementation of QEMU could be made to write out of bounds.<br /></span><span>    An attacker inside the guest could possibly use this issue to cause QEMU to crash, resulting in a denial     of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu     25.10. (CVE-2026-3195)<br /></span><span><br /></span><span>    It was discovered that the virtio-snd device implementation of QEMU contained an arithmetic overflow. An     attacker inside the guest could possibly use this issue to cause QEMU to crash, resulting in a denial of     service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.10.<br /></span><span>    (CVE-2026-3196)<br /></span><span><br /></span><span>    It was discovered that the Hyper-V Synthetic Debugging device implementation of QEMU could me made to     write out of bounds. An attacker inside the guest could possibly use this issue to cause QEMU to crash,     resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu     24.04 LTS and Ubuntu 25.10. (CVE-2026-3842)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306091">https://www.tenable.com/plugins/nessus/306091</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 22.04 LTS / 24.04 LTS / 25.10 : OpenSSL vulnerabilities (USN-8155-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306090</link>
            <guid>https://www.tenable.com/plugins/nessus/306090</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306090 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 22.04 LTS / 24.04 LTS / 25.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8155-1 advisory.<br /></span><span><br /></span><span>    Viktor Dukhovni discovered that OpenSSL incorrectly negotiated the expected preferred key exchange group     when used as a TLS 1.3 server. This could result in a less preferred key exchange being used, contrary to     expectations. This issue only affected Ubuntu 25.10. (CVE-2026-2673)<br /></span><span><br /></span><span>    Igor Morgenstern discovered that OpenSSL incorrectly handled certain memory operations when used as a DANE     client. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of     service, or possibly execute arbitrary code. (CVE-2026-28387)<br /></span><span><br /></span><span>    Igor Morgenstern discovered that OpenSSL incorrectly handled certain memory operations when processing a     delta CRL. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a     denial of service. (CVE-2026-28388)<br /></span><span><br /></span><span>    Nathan Sportsman, Daniel Rhea, and Jaeho Nam discovered that OpenSSL incorrectly handled certain memory     operations when processing a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo. A remote     attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service.<br /></span><span>    (CVE-2026-28389)<br /></span><span><br /></span><span>    Muhammad Daffa, Joshua Rogers, and Chanho Kim discovered that OpenSSL incorrectly handled processing of a     crafted CMS EnvelopedData message with KeyTransportRecipientInfo. A remote attacker could possibly use     this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2026-28390)<br /></span><span><br /></span><span>    Quoc Tran discovered that OpenSSL incorrectly handled hexadecimal conversion on 32-bit platforms. A remote     attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly     execute arbitrary code. (CVE-2026-31789)<br /></span><span><br /></span><span>    Simo Sorce discovered that OpenSSL incorrectly handled failures in RSA KEM RSASVE Encapsulation. A remote     attacker could possibly use this issue to obtain sensitive information. (CVE-2026-31790)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306090">https://www.tenable.com/plugins/nessus/306090</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 22.04 LTS / 24.04 LTS / 25.10 : Squid vulnerabilities (USN-8157-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306089</link>
            <guid>https://www.tenable.com/plugins/nessus/306089</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306089 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 22.04 LTS / 24.04 LTS / 25.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8157-1 advisory.<br /></span><span><br /></span><span>    It was discovered that Squid incorrectly handled certain ICP traffic. In environments where ICP support is     enabled, a remote attacker could use this issue to cause Squid to crash, resulting in a denial of service,     or obtain small amounts of sensitive information.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306089">https://www.tenable.com/plugins/nessus/306089</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 22.04 LTS / 24.04 LTS / 25.10 : GDK-PixBuf vulnerability (USN-8156-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306088</link>
            <guid>https://www.tenable.com/plugins/nessus/306088</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306088 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 22.04 LTS / 24.04 LTS / 25.10 host has packages installed that are affected by a vulnerability as referenced in the USN-8156-1 advisory.<br /></span><span><br /></span><span>    It was discovered that GDK-PixBuf incorrectly handled certain JPEG files. An attacker could use this issue     to cause GDK-PixBuf to crash, resulting in a denial of service, or possibly execute arbitrary code.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306088">https://www.tenable.com/plugins/nessus/306088</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu Pro FIPS-updates 22.04 LTS : Linux kernel (Azure FIPS) vulnerabilities (USN-8163-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306087</link>
            <guid>https://www.tenable.com/plugins/nessus/306087</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306087 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu Pro FIPS-updates 22.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-8163-1 advisory.<br /></span><span><br /></span><span>    Qualys discovered that several vulnerabilities existed in the AppArmor Linux kernel Security Module (LSM).<br /></span><span>    An unprivileged local attacker could use these issues to load, replace, and remove arbitrary AppArmor     profiles causing denial of service, exposure of sensitive information (kernel memory), local privilege     escalation, or possibly escape a container. (LP: #2143853, CVE-2026-23268, CVE-2026-23269, CVE-2026-23403,     CVE-2026-23404, CVE-2026-23405, CVE-2026-23406, CVE-2026-23407, CVE-2026-23408, CVE-2026-23409,     CVE-2026-23410, CVE-2026-23411)<br /></span><span><br /></span><span>    Several security issues were discovered in the Linux kernel. An attacker could possibly use these to     compromise the system. This update corrects flaws in the following subsystems:<br /></span><span><br /></span><span>    - ARM64 architecture;<br /></span><span><br /></span><span>    - Nios II architecture;<br /></span><span><br /></span><span>    - PowerPC architecture;<br /></span><span><br /></span><span>    - Sun Sparc architecture;<br /></span><span><br /></span><span>    - User-Mode Linux (UML);<br /></span><span><br /></span><span>    - x86 architecture;<br /></span><span><br /></span><span>    - Block layer subsystem;<br /></span><span><br /></span><span>    - Cryptographic API;<br /></span><span><br /></span><span>    - ACPI drivers;<br /></span><span><br /></span><span>    - ATM drivers;<br /></span><span><br /></span><span>    - Drivers core;<br /></span><span><br /></span><span>    - Network block device driver;<br /></span><span><br /></span><span>    - Bluetooth drivers;<br /></span><span><br /></span><span>    - Bus devices;<br /></span><span><br /></span><span>    - Character device driver;<br /></span><span><br /></span><span>    - Hardware random number generator core;<br /></span><span><br /></span><span>    - TPM device driver;<br /></span><span><br /></span><span>    - Data acquisition framework and drivers;<br /></span><span><br /></span><span>    - Counter interface drivers;<br /></span><span><br /></span><span>    - CPU frequency scaling framework;<br /></span><span><br /></span><span>    - DMA engine subsystem;<br /></span><span><br /></span><span>    - Intel Stratix 10 firmware drivers;<br /></span><span><br /></span><span>    - GPU drivers;<br /></span><span><br /></span><span>    - HID subsystem;<br /></span><span><br /></span><span>    - Hardware monitoring drivers;<br /></span><span><br /></span><span>    - CoreSight HW tracing drivers;<br /></span><span><br /></span><span>    - IIO subsystem;<br /></span><span><br /></span><span>    - InfiniBand drivers;<br /></span><span><br /></span><span>    - Input Device core drivers;<br /></span><span><br /></span><span>    - Input Device (Miscellaneous) drivers;<br /></span><span><br /></span><span>    - Input Device (Tablet) drivers;<br /></span><span><br /></span><span>    - ISDN/mISDN subsystem;<br /></span><span><br /></span><span>    - Macintosh device drivers;<br /></span><span><br /></span><span>    - Multiple devices driver;<br /></span><span><br /></span><span>    - Media drivers;<br /></span><span><br /></span><span>    - MOST (Media Oriented Systems Transport) drivers;<br /></span><span><br /></span><span>    - MTD block device drivers;<br /></span><span><br /></span><span>    - Network drivers;<br /></span><span><br /></span><span>    - Mellanox network drivers;<br /></span><span><br /></span><span>    - Texas Instruments network drivers;<br /></span><span><br /></span><span>    - Ethernet team driver;<br /></span><span><br /></span><span>    - MediaTek network drivers;<br /></span><span><br /></span><span>    - NVME drivers;<br /></span><span><br /></span><span>    - PA-RISC drivers;<br /></span><span><br /></span><span>    - PCI subsystem;<br /></span><span><br /></span><span>    - Performance monitor drivers;<br /></span><span><br /></span><span>    - Pin controllers subsystem;<br /></span><span><br /></span><span>    - Chrome hardware platform drivers;<br /></span><span><br /></span><span>    - x86 platform drivers;<br /></span><span><br /></span><span>    - ARM PM domains;<br /></span><span><br /></span><span>    - PPS (Pulse Per Second) driver;<br /></span><span><br /></span><span>    - PWM drivers;<br /></span><span><br /></span><span>    - Voltage and Current Regulator drivers;<br /></span><span><br /></span><span>    - S/390 drivers;<br /></span><span><br /></span><span>    - SCSI subsystem;<br /></span><span><br /></span><span>    - Texas Instruments SoC drivers;<br /></span><span><br /></span><span>    - SPI subsystem;<br /></span><span><br /></span><span>    - Realtek RTL8723BS SDIO drivers;<br /></span><span><br /></span><span>    - TCM subsystem;<br /></span><span><br /></span><span>    - Userspace I/O drivers;<br /></span><span><br /></span><span>    - Cadence USB3 driver;<br /></span><span><br /></span><span>    - DesignWare USB3 driver;<br /></span><span><br /></span><span>    - USB Gadget drivers;<br /></span><span><br /></span><span>    - USB Host Controller drivers;<br /></span><span><br /></span><span>    - Renesas USBHS Controller drivers;<br /></span><span><br /></span><span>    - USB Mass Storage drivers;<br /></span><span><br /></span><span>    - USB Type-C Connector System Software Interface driver;<br /></span><span><br /></span><span>    - Backlight driver;<br /></span><span><br /></span><span>    - Framebuffer layer;<br /></span><span><br /></span><span>    - Watchdog drivers;<br /></span><span><br /></span><span>    - BFS file system;<br /></span><span><br /></span><span>    - BTRFS file system;<br /></span><span><br /></span><span>    - File systems infrastructure;<br /></span><span><br /></span><span>    - Ext4 file system;<br /></span><span><br /></span><span>    - F2FS file system;<br /></span><span><br /></span><span>    - FUSE (File system in Userspace);<br /></span><span><br /></span><span>    - HFS file system;<br /></span><span><br /></span><span>    - HFS+ file system;<br /></span><span><br /></span><span>    - HugeTLB file system;<br /></span><span><br /></span><span>    - Journaling layer for block devices (JBD2);<br /></span><span><br /></span><span>    - JFS file system;<br /></span><span><br /></span><span>    - Network file system (NFS) client;<br /></span><span><br /></span><span>    - Network file system (NFS) server daemon;<br /></span><span><br /></span><span>    - File system notification infrastructure;<br /></span><span><br /></span><span>    - NTFS3 file system;<br /></span><span><br /></span><span>    - OCFS2 file system;<br /></span><span><br /></span><span>    - OrangeFS file system;<br /></span><span><br /></span><span>    - Proc file system;<br /></span><span><br /></span><span>    - SMB network file system;<br /></span><span><br /></span><span>    - SquashFS file system;<br /></span><span><br /></span><span>    - UDF file system;<br /></span><span><br /></span><span>    - XFS file system;<br /></span><span><br /></span><span>    - BPF subsystem;<br /></span><span><br /></span><span>    - Ethernet bridge;<br /></span><span><br /></span><span>    - Memory management;<br /></span><span><br /></span><span>    - padata parallel execution mechanism;<br /></span><span><br /></span><span>    - IP tunnels definitions;<br /></span><span><br /></span><span>    - Network traffic control;<br /></span><span><br /></span><span>    - Network sockets;<br /></span><span><br /></span><span>    - XFRM subsystem;<br /></span><span><br /></span><span>    - io_uring subsystem;<br /></span><span><br /></span><span>    - Control group (cgroup);<br /></span><span><br /></span><span>    - Locking primitives;<br /></span><span><br /></span><span>    - Padata parallel execution mechanism;<br /></span><span><br /></span><span>    - PID allocator;<br /></span><span><br /></span><span>    - Scheduler infrastructure;<br /></span><span><br /></span><span>    - Shadow Call Stack mechanism;<br /></span><span><br /></span><span>    - Tracing infrastructure;<br /></span><span><br /></span><span>    - 9P file system network protocol;<br /></span><span><br /></span><span>    - Bluetooth subsystem;<br /></span><span><br /></span><span>    - CAIF protocol;<br /></span><span><br /></span><span>    - CAN network layer;<br /></span><span><br /></span><span>    - Ceph Core library;<br /></span><span><br /></span><span>    - Networking core;<br /></span><span><br /></span><span>    - Ethtool driver;<br /></span><span><br /></span><span>    - HSR network protocol;<br /></span><span><br /></span><span>    - IPv4 networking;<br /></span><span><br /></span><span>    - IPv6 networking;<br /></span><span><br /></span><span>    - MAC80211 subsystem;<br /></span><span><br /></span><span>    - Multipath TCP;<br /></span><span><br /></span><span>    - Netfilter;<br /></span><span><br /></span><span>    - NET/ROM layer;<br /></span><span><br /></span><span>    - NFC subsystem;<br /></span><span><br /></span><span>    - Open vSwitch;<br /></span><span><br /></span><span>    - RF switch subsystem;<br /></span><span><br /></span><span>    - Rose network layer;<br /></span><span><br /></span><span>    - SCTP protocol;<br /></span><span><br /></span><span>    - Sun RPC protocol;<br /></span><span><br /></span><span>    - TIPC protocol;<br /></span><span><br /></span><span>    - Unix domain sockets;<br /></span><span><br /></span><span>    - VMware vSockets driver;<br /></span><span><br /></span><span>    - Wireless networking;<br /></span><span><br /></span><span>    - Rust bindings mechanism;<br /></span><span><br /></span><span>    - Integrity Measurement Architecture(IMA) framework;<br /></span><span><br /></span><span>    - Key management;<br /></span><span><br /></span><span>    - Simplified Mandatory Access Control Kernel framework;<br /></span><span><br /></span><span>    - FireWire sound drivers;<br /></span><span><br /></span><span>    - Turtle Beach Wavefront ALSA driver;<br /></span><span><br /></span><span>    - Intel ASoC drivers;<br /></span><span><br /></span><span>    - STMicroelectronics SoC drivers;<br /></span><span><br /></span><span>    - USB sound devices; (CVE-2022-49465, CVE-2022-49635, CVE-2023-53041, CVE-2024-36903, CVE-2024-36927,     CVE-2024-37354, CVE-2024-41014, CVE-2024-46830, CVE-2024-47666, CVE-2024-49968, CVE-2024-53114,     CVE-2024-56538, CVE-2024-58011, CVE-2025-21780, CVE-2025-21861, CVE-2025-22022, CVE-2025-22058,     CVE-2025-22111, CVE-2025-22121, CVE-2025-23143, CVE-2025-37849, CVE-2025-38022, CVE-2025-38129,     CVE-2025-38236, CVE-2025-38248, CVE-2025-38556, CVE-2025-38584, CVE-2025-39869, CVE-2025-39873,     CVE-2025-39876, CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907, CVE-2025-39911,     CVE-2025-39913, CVE-2025-39923, CVE-2025-39934, CVE-2025-39937, CVE-2025-39943, CVE-2025-39945,     CVE-2025-39949, CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967, CVE-2025-39968,     CVE-2025-39969, CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973, CVE-2025-39980,     CVE-2025-39985, CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994, CVE-2025-39995,     CVE-2025-39996, CVE-2025-39998, CVE-2025-40001, CVE-2025-40006, CVE-2025-40011, CVE-2025-40020,     CVE-2025-40021, CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030, CVE-2025-40035,     CVE-2025-40040, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044, CVE-2025-40048, CVE-2025-40049,     CVE-2025-40053, CVE-2025-40055, CVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078,     CVE-2025-40081, CVE-2025-40083, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088, CVE-2025-40092,     CVE-2025-40094, CVE-2025-40105, CVE-2025-40106, CVE-2025-40109, CVE-2025-40110, CVE-2025-40111,     CVE-2025-40112, CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121,     CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127, CVE-2025-40134, CVE-2025-40140,     CVE-2025-40153, CVE-2025-40154, CVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178,     CVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188, CVE-2025-40194, CVE-2025-40200,     CVE-2025-40204, CVE-2025-40205, CVE-2025-40211, CVE-2025-40215, CVE-2025-40219, CVE-2025-40220,     CVE-2025-40223, CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243, CVE-2025-40244,     CVE-2025-40245, CVE-2025-40248, CVE-2025-40252, CVE-2025-40253, CVE-2025-40254, CVE-2025-40257,     CVE-2025-40258, CVE-2025-40259, CVE-2025-40261, CVE-2025-40262, CVE-2025-40263, CVE-2025-40264,     CVE-2025-40269, CVE-2025-40271, CVE-2025-40272, CVE-2025-40273, CVE-2025-40275, CVE-2025-40277,     CVE-2025-40278, CVE-2025-40279, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282, CVE-2025-40283,     CVE-2025-40304, CVE-2025-40306, CVE-2025-40308, CVE-2025-40309, CVE-2025-40312, CVE-2025-40313,     CVE-2025-40314, CVE-2025-40315, CVE-2025-40317, CVE-2025-40319, CVE-2025-40321, CVE-2025-40322,     CVE-2025-40324, CVE-2025-40331, CVE-2025-40342, CVE-2025-40343, CVE-2025-40345, CVE-2025-40346,     CVE-2025-40349, CVE-2025-40351, CVE-2025-40360, CVE-2025-40363, CVE-2025-68168, CVE-2025-68176,     CVE-2025-68177, CVE-2025-68185, CVE-2025-68191, CVE-2025-68192, CVE-2025-68194, CVE-2025-68200,     CVE-2025-68204, CVE-2025-68217, CVE-2025-68220, CVE-2025-68227, CVE-2025-68229, CVE-2025-68238,     CVE-2025-68241, CVE-2025-68244, CVE-2025-68245, CVE-2025-68249, CVE-2025-68254, CVE-2025-68255,     CVE-2025-68257, CVE-2025-68258, CVE-2025-68261, CVE-2025-68264, CVE-2025-68266, CVE-2025-68282,     CVE-2025-68284, CVE-2025-68285, CVE-2025-68286, CVE-2025-68287, CVE-2025-68288, CVE-2025-68289,     CVE-2025-68290, CVE-2025-68295, CVE-2025-68301, CVE-2025-68302, CVE-2025-68303, CVE-2025-68308,     CVE-2025-68312, CVE-2025-68321, CVE-2025-68325, CVE-2025-68327, CVE-2025-68328, CVE-2025-68330,     CVE-2025-68331, CVE-2025-68332, CVE-2025-68335, CVE-2025-68336, CVE-2025-68337, CVE-2025-68339,     CVE-2025-68344, CVE-2025-68346, CVE-2025-68349, CVE-2025-68354, CVE-2025-68362, CVE-2025-68364,     CVE-2025-68366, CVE-2025-68367, CVE-2025-68372, CVE-2025-68724, CVE-2025-68727, CVE-2025-68728,     CVE-2025-68732, CVE-2025-68733, CVE-2025-68734, CVE-2025-68740, CVE-2025-68746, CVE-2025-68757,     CVE-2025-68758, CVE-2025-68759, CVE-2025-68764, CVE-2025-68765, CVE-2025-68767, CVE-2025-68769,     CVE-2025-68771, CVE-2025-68774, CVE-2025-68776, CVE-2025-68777, CVE-2025-68780, CVE-2025-68782,     CVE-2025-68783, CVE-2025-68785, CVE-2025-68787, CVE-2025-68788, CVE-2025-68795, CVE-2025-68796,     CVE-2025-68797, CVE-2025-68799, CVE-2025-68800, CVE-2025-68801, CVE-2025-68803, CVE-2025-68804,     CVE-2025-68808, CVE-2025-68813, CVE-2025-68814, CVE-2025-68815, CVE-2025-68816, CVE-2025-68818,     CVE-2025-68819, CVE-2025-68820, CVE-2025-71064, CVE-2025-71066, CVE-2025-71068, CVE-2025-71069,     CVE-2025-71075, CVE-2025-71077, CVE-2025-71078, CVE-2025-71079, CVE-2025-71081, CVE-2025-71082,     CVE-2025-71083, CVE-2025-71084, CVE-2025-71085, CVE-2025-71086, CVE-2025-71087, CVE-2025-71091,     CVE-2025-71093, CVE-2025-71094, CVE-2025-71096, CVE-2025-71097, CVE-2025-71098, CVE-2025-71102,     CVE-2025-71104, CVE-2025-71105, CVE-2025-71108, CVE-2025-71111, CVE-2025-71112, CVE-2025-71113,     CVE-2025-71114, CVE-2025-71116, CVE-2025-71118, CVE-2025-71120, CVE-2025-71121, CVE-2025-71125,     CVE-2025-71127, CVE-2025-71131, CVE-2025-71132, CVE-2025-71133, CVE-2025-71136, CVE-2025-71137,     CVE-2025-71147, CVE-2025-71154, CVE-2025-71180, CVE-2025-71182, CVE-2026-22976, CVE-2026-22977,     CVE-2026-22978, CVE-2026-22980, CVE-2026-22982, CVE-2026-22984, CVE-2026-22990, CVE-2026-22991,     CVE-2026-22992, CVE-2026-23019, CVE-2026-23020, CVE-2026-23021, CVE-2026-23047, CVE-2026-23060,     CVE-2026-23074, CVE-2026-23111, CVE-2026-23202, CVE-2026-23207)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306087">https://www.tenable.com/plugins/nessus/306087</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 18.04 LTS / 20.04 LTS : Dogtag PKI vulnerability (USN-8158-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306086</link>
            <guid>https://www.tenable.com/plugins/nessus/306086</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306086 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 18.04 LTS / 20.04 LTS host has packages installed that are affected by a vulnerability as referenced in the USN-8158-1 advisory.<br /></span><span><br /></span><span>    Fraser Tweedale and Geetika Kapoor discovered that Dogtag PKI could renew a certificate without proper     authentication. An attacker could possibly use this to repeatedly renew a compromised certificate and     maintain unauthorized access to a system or resource.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306086">https://www.tenable.com/plugins/nessus/306086</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : firefox (RHSA-2026:7845)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306085</link>
            <guid>https://www.tenable.com/plugins/nessus/306085</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306085 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for firefox.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7845 advisory.<br /></span><span><br /></span><span>    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and     portability.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR     140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)<br /></span><span><br /></span><span>    * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component     (CVE-2026-4688)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4695)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4689)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine     component (CVE-2026-4716)<br /></span><span><br /></span><span>    * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component     (CVE-2026-4684)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)<br /></span><span><br /></span><span>    * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)<br /></span><span><br /></span><span>    * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4697)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4690)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component     (CVE-2026-4699)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component     (CVE-2026-4693)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component     (CVE-2026-4694)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149     and Thunderbird 149 (CVE-2026-4720)<br /></span><span><br /></span><span>    * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)<br /></span><span><br /></span><span>    * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component     (CVE-2026-4687)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL firefox package based on the guidance in RHSA-2026:7845.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306085">https://www.tenable.com/plugins/nessus/306085</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : golang (RHSA-2026:7834)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306084</link>
            <guid>https://www.tenable.com/plugins/nessus/306084</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306084 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for golang.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7834 advisory.<br /></span><span><br /></span><span>    The golang packages provide the Go programming language compiler.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL golang package based on the guidance in RHSA-2026:7834.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306084">https://www.tenable.com/plugins/nessus/306084</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : firefox (RHSA-2026:7842)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306083</link>
            <guid>https://www.tenable.com/plugins/nessus/306083</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306083 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for firefox.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7842 advisory.<br /></span><span><br /></span><span>    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and     portability.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR     140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)<br /></span><span><br /></span><span>    * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component     (CVE-2026-4688)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4695)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4689)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine     component (CVE-2026-4716)<br /></span><span><br /></span><span>    * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component     (CVE-2026-4684)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)<br /></span><span><br /></span><span>    * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)<br /></span><span><br /></span><span>    * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4697)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4690)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component     (CVE-2026-4699)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component     (CVE-2026-4693)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component     (CVE-2026-4694)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149     and Thunderbird 149 (CVE-2026-4720)<br /></span><span><br /></span><span>    * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)<br /></span><span><br /></span><span>    * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component     (CVE-2026-4687)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL firefox package based on the guidance in RHSA-2026:7842.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306083">https://www.tenable.com/plugins/nessus/306083</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 7 : gstreamer-plugins-base and gstreamer-plugins-good (RHSA-2026:7850)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306082</link>
            <guid>https://www.tenable.com/plugins/nessus/306082</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306082 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for gstreamer-plugins-base / gstreamer-plugins-good.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7850 advisory.<br /></span><span><br /></span><span>    GStreamer is a streaming media framework, based on graphs of filters which operate on media data.<br /></span><span>    Applications using this library can do anything from real-time sound processing to playing videos, and     just about anything else media-related.  Its plugin-based architecture means that new data types or     processing capabilities can be added simply by installing new plug-ins.  GStreamer Good Plug-ins is a     collection of well-supported plug-ins of good quality and under the LGPL license.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * GStreamer: GStreamer: Remote Code Execution via Heap-based Buffer Overflow in rtpqdm2depay     (CVE-2026-3085)<br /></span><span><br /></span><span>    * GStreamer: GStreamer: Arbitrary code execution via RIFF palette integer overflow in AVI file handling     (CVE-2026-2921)<br /></span><span><br /></span><span>    * GStreamer: GStreamer: Remote Code Execution via Out-Of-Bounds Write in rtpqdm2depay (CVE-2026-3083)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL gstreamer-plugins-base / gstreamer-plugins-good packages based on the guidance in RHSA-2026:7850.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306082">https://www.tenable.com/plugins/nessus/306082</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : perl-XML-Parser (RHSA-2026:7679)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306081</link>
            <guid>https://www.tenable.com/plugins/nessus/306081</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306081 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for perl-XML-Parser.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7679 advisory.<br /></span><span><br /></span><span>    This module provides ways to parse XML documents. It is built on top of XML::Parser::Expat, which is a     lower level interface to James Clark's expat library. Each call to one of the parsing methods creates a     new instance of XML::Parser::Expat which is then used to parse the document. Expat options may be provided     when the XML::Parser object is created. These options are then passed on to the Expat object on each parse     call. They can also be given as extra arguments to the parse methods, in which case they override options     given at XML::Parser creation time.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * perl-xml-parser: XML::Parser: Memory corruption via deeply nested XML files (CVE-2006-10003)<br /></span><span><br /></span><span>    * perl-xml-parser: XML::Parser for Perl: Heap corruption and denial of service from crafted XML input     (CVE-2006-10002)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL perl-XML-Parser package based on the guidance in RHSA-2026:7679.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306081">https://www.tenable.com/plugins/nessus/306081</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : firefox (RHSA-2026:7837)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306080</link>
            <guid>https://www.tenable.com/plugins/nessus/306080</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306080 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for firefox.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7837 advisory.<br /></span><span><br /></span><span>    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and     portability.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR     140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)<br /></span><span><br /></span><span>    * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component     (CVE-2026-4688)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4695)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4689)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine     component (CVE-2026-4716)<br /></span><span><br /></span><span>    * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component     (CVE-2026-4684)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)<br /></span><span><br /></span><span>    * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)<br /></span><span><br /></span><span>    * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4697)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4690)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component     (CVE-2026-4699)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component     (CVE-2026-4693)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component     (CVE-2026-4694)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149     and Thunderbird 149 (CVE-2026-4720)<br /></span><span><br /></span><span>    * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)<br /></span><span><br /></span><span>    * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component     (CVE-2026-4687)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL firefox package based on the guidance in RHSA-2026:7837.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306080">https://www.tenable.com/plugins/nessus/306080</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : Python -- HTTP proxy CONNECT tunnel does not sanitize CR/LF (30bda1c3-369b-11f1-b51c-6dd25bec137b)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306079</link>
            <guid>https://www.tenable.com/plugins/nessus/306079</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306079 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 30bda1c3-369b-11f1-b51c-6dd25bec137b advisory.<br /></span><span><br /></span><span>    Seth Larson reports:<br /></span><span>    HTTP proxy via CONNECT tunneling doesn't sanitize CR/LF (CVE-2026-1502).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306079">https://www.tenable.com/plugins/nessus/306079</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : Python -- configparser vulnerable to excessive CPU use (5ec4dcf6-3588-11f1-b51c-6dd25bec137b)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306078</link>
            <guid>https://www.tenable.com/plugins/nessus/306078</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306078 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 5ec4dcf6-3588-11f1-b51c-6dd25bec137b advisory.<br /></span><span><br /></span><span>    Stan Ulbrych reports:<br /></span><span>    configparser.RawConfigParser.{OPTCRE,OPTCRE_NV} regexes [are] vulnerable to quadratic backtracking.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306078">https://www.tenable.com/plugins/nessus/306078</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : Vaultwarden -- Multiple vulnerabilities (57f31f61-36a1-11f1-9839-8447094a420f)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306077</link>
            <guid>https://www.tenable.com/plugins/nessus/306077</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306077 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 57f31f61-36a1-11f1-9839-8447094a420f advisory.<br /></span><span><br /></span><span>    The Vaultwarden project reports:<br /></span><span>    GHSA-937x-3j8m-7w7p Unconfirmed Owner Can Purge Entire Organization Vault.<br /></span><span>    GHSA-569v-845w-g82p Cross-Org Group Binding Enables Unauthorized Read And Write Access Into Another     Organization     GHSA-6j4w-g4jh-xjfx Refresh tokens not invalidated on security stamp rotation<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306077">https://www.tenable.com/plugins/nessus/306077</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : vim (2026-c718defeb6)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306076</link>
            <guid>https://www.tenable.com/plugins/nessus/306076</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306076 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-c718defeb6 advisory.<br /></span><span><br /></span><span>    Security fix for CVE-2026-34714, CVE-2026-35177, CVE-2026-34982<br /></span><span><br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected 2:vim package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306076">https://www.tenable.com/plugins/nessus/306076</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : polkit (2026-1774635f74)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306075</link>
            <guid>https://www.tenable.com/plugins/nessus/306075</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306075 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2026-1774635f74 advisory.<br /></span><span><br /></span><span>    CVE-2026-4897 aisle.com fix of unsanitized getline<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected polkit package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306075">https://www.tenable.com/plugins/nessus/306075</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : trivy (2026-868e266938)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306074</link>
            <guid>https://www.tenable.com/plugins/nessus/306074</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306074 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-868e266938 advisory.<br /></span><span><br /></span><span>    Update to 0.69.3<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected trivy package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306074">https://www.tenable.com/plugins/nessus/306074</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : libcap (2026-ccc66d5ab4)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306073</link>
            <guid>https://www.tenable.com/plugins/nessus/306073</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306073 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2026-ccc66d5ab4 advisory.<br /></span><span><br /></span><span>    An update to patch a security vulnerability.<br /></span><span>    Advisory: https://github.com/AndrewGMorgan/libcap_mirror/security/advisories/GHSA-f78v-p5hx-m7hh<br /></span><span><br /></span><span>    # Changelog<br /></span><span><br /></span><span>    ```<br /></span><span>    * Mon Apr 06 2026 Carlos Rodriguez-Fernandez <carlosrodrifernandez@gmail.com> - 2.76-4<br /></span><span>    - Patch for security vulnerability     ```<br /></span><span><br /></span><span><br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected libcap package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306073">https://www.tenable.com/plugins/nessus/306073</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : pdns-recursor (2026-9c582575e5)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306072</link>
            <guid>https://www.tenable.com/plugins/nessus/306072</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306072 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-9c582575e5 advisory.<br /></span><span><br /></span><span>    Update to latest 5.2 release, fixing multiple security issues<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected pdns-recursor package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306072">https://www.tenable.com/plugins/nessus/306072</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : libpng (2026-67c20bfb74)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306071</link>
            <guid>https://www.tenable.com/plugins/nessus/306071</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306071 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-67c20bfb74 advisory.<br /></span><span><br /></span><span>    1.6.56 is release fixes for the following two security vulnerabilities:<br /></span><span><br /></span><span>    - CVE-2026-33416 (high severity): Use-after-free memory bug in the transparency and palette-handling code.<br /></span><span>    Similar to its predecessor CVE-2026-25646, this latent bug has existed for 25 years. Both Halil Oktay and     Ryo Shimada discovered it within days of one another.<br /></span><span><br /></span><span>    - CVE-2026-33636 (high severity): Out-of-bounds read and write vulnerability in the ARM Neon palette-     expansion code. This one was found and fixed by Taegu Ha and has existed since 1.6.36.<br /></span><span><br /></span><span>    The images that trigger these bugs are valid. Users are encouraged to update immediately.<br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected 2:libpng package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306071">https://www.tenable.com/plugins/nessus/306071</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : openexr (RHSA-2026:7678)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306070</link>
            <guid>https://www.tenable.com/plugins/nessus/306070</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306070 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for openexr.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:7678 advisory.<br /></span><span><br /></span><span>    OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image     processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are     specific to this format.  This package containes the binaries for OpenEXR.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * openexr: OpenEXR: Arbitrary code execution via integer overflow in EXR file processing (CVE-2026-27622)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL openexr package based on the guidance in RHSA-2026:7678.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306070">https://www.tenable.com/plugins/nessus/306070</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : nghttp2 (RHSA-2026:7667)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306069</link>
            <guid>https://www.tenable.com/plugins/nessus/306069</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306069 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for nghttp2.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:7667 advisory.<br /></span><span><br /></span><span>    libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination     (CVE-2026-27135)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL nghttp2 package based on the guidance in RHSA-2026:7667.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306069">https://www.tenable.com/plugins/nessus/306069</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 7 : gstreamer1-plugins-bad-free, gstreamer1-plugins-base, and gstreamer1-plugins-good (RHSA-2026:7673)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306068</link>
            <guid>https://www.tenable.com/plugins/nessus/306068</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306068 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for gstreamer1-plugins-bad-free / gstreamer1-plugins- base / gstreamer1-plugins-good.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7673 advisory.<br /></span><span><br /></span><span>    GStreamer is a streaming media framework based on graphs of filters which operate on media data. The     gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * GStreamer: GStreamer: Remote Code Execution via heap-based buffer overflow in JPEG parser     (CVE-2026-3082)<br /></span><span><br /></span><span>    * GStreamer: GStreamer: Remote Code Execution via Heap-based Buffer Overflow in rtpqdm2depay     (CVE-2026-3085)<br /></span><span><br /></span><span>    * GStreamer: GStreamer: Arbitrary code execution via RIFF palette integer overflow in AVI file handling     (CVE-2026-2921)<br /></span><span><br /></span><span>    * GStreamer: GStreamer: Remote Code Execution via Out-Of-Bounds Write in rtpqdm2depay (CVE-2026-3083)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL gstreamer1-plugins-bad-free / gstreamer1-plugins-base / gstreamer1-plugins-good packages based on the guidance in RHSA-2026:7673.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306068">https://www.tenable.com/plugins/nessus/306068</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : nodejs24 (RHSA-2026:7675)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306067</link>
            <guid>https://www.tenable.com/plugins/nessus/306067</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306067 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for nodejs24.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7675 advisory.<br /></span><span><br /></span><span>    Node.js is a platform built on Chrome's JavaScript runtime for easily building fast, scalable network     applications. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and     efficient, perfect for data-intensive real-time applications that run across distributed devices.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * nodejs: Nodejs denial of service (CVE-2026-21637)<br /></span><span><br /></span><span>    * brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)<br /></span><span><br /></span><span>    * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)<br /></span><span><br /></span><span>    * undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)<br /></span><span><br /></span><span>    * undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)<br /></span><span><br /></span><span>    * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate     decompression (CVE-2026-1526)<br /></span><span><br /></span><span>    * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter     (CVE-2026-2229)<br /></span><span><br /></span><span>    * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers     (CVE-2026-1525)<br /></span><span><br /></span><span>    * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)<br /></span><span><br /></span><span>    * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination     (CVE-2026-27135)<br /></span><span><br /></span><span>    * Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing     (CVE-2026-21712)<br /></span><span><br /></span><span>    * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)<br /></span><span><br /></span><span>    * Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read     restrictions (CVE-2026-21715)<br /></span><span><br /></span><span>    * nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership     via incomplete security fix. (CVE-2026-21716)<br /></span><span><br /></span><span>    * Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission     checks (CVE-2026-21711)<br /></span><span><br /></span><span>    * Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)<br /></span><span><br /></span><span>    * Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames     (CVE-2026-21714)<br /></span><span><br /></span><span>    * nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash     collisions (CVE-2026-21717)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL nodejs24 package based on the guidance in RHSA-2026:7675.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306067">https://www.tenable.com/plugins/nessus/306067</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : nodejs:24 (RHSA-2026:7670)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306066</link>
            <guid>https://www.tenable.com/plugins/nessus/306066</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306066 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for nodejs:24.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7670 advisory.<br /></span><span><br /></span><span>    Node.js is a software development platform for building fast and scalable network applications in the     JavaScript programming language.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * nodejs: Nodejs denial of service (CVE-2026-21637)<br /></span><span><br /></span><span>    * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)<br /></span><span><br /></span><span>    * undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)<br /></span><span><br /></span><span>    * undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)<br /></span><span><br /></span><span>    * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate     decompression (CVE-2026-1526)<br /></span><span><br /></span><span>    * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter     (CVE-2026-2229)<br /></span><span><br /></span><span>    * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers     (CVE-2026-1525)<br /></span><span><br /></span><span>    * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)<br /></span><span><br /></span><span>    * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination     (CVE-2026-27135)<br /></span><span><br /></span><span>    * Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing     (CVE-2026-21712)<br /></span><span><br /></span><span>    * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)<br /></span><span><br /></span><span>    * Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read     restrictions (CVE-2026-21715)<br /></span><span><br /></span><span>    * nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership     via incomplete security fix. (CVE-2026-21716)<br /></span><span><br /></span><span>    * Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission     checks (CVE-2026-21711)<br /></span><span><br /></span><span>    * Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)<br /></span><span><br /></span><span>    * Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames     (CVE-2026-21714)<br /></span><span><br /></span><span>    * nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash     collisions (CVE-2026-21717)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL nodejs:24 package based on the guidance in RHSA-2026:7670.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306066">https://www.tenable.com/plugins/nessus/306066</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : rhc (RHSA-2026:7674)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306065</link>
            <guid>https://www.tenable.com/plugins/nessus/306065</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306065 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for rhc.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has a package installed that is affected by a vulnerability as referenced in the RHSA-2026:7674 advisory.<br /></span><span><br /></span><span>    rhc is a client tool and daemon that connects the system to Red Hat hosted services enabling system and     subscription management.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL rhc package based on the guidance in RHSA-2026:7674.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306065">https://www.tenable.com/plugins/nessus/306065</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : firefox (RHSA-2026:7671)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306064</link>
            <guid>https://www.tenable.com/plugins/nessus/306064</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306064 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for firefox.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:7671 advisory.<br /></span><span><br /></span><span>    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and     portability.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * libpng: libpng: Arbitrary code execution due to use-after-free vulnerability (CVE-2026-33416)<br /></span><span><br /></span><span>    * libpng: libpng: Information disclosure and denial of service via out-of-bounds read/write in Neon     palette expansion (CVE-2026-33636)<br /></span><span><br /></span><span>    * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox     149.0.2 and Thunderbird 149.0.2 (CVE-2026-5734)<br /></span><span><br /></span><span>    * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird     ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2 (CVE-2026-5731)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics: Text component     (CVE-2026-5732)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL firefox package based on the guidance in RHSA-2026:7671.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306064">https://www.tenable.com/plugins/nessus/306064</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : nghttp2 (RHSA-2026:7668)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306063</link>
            <guid>https://www.tenable.com/plugins/nessus/306063</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306063 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for nghttp2.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:7668 advisory.<br /></span><span><br /></span><span>    libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination     (CVE-2026-27135)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL nghttp2 package based on the guidance in RHSA-2026:7668.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306063">https://www.tenable.com/plugins/nessus/306063</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 7 : rhc (RHSA-2026:7676)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306062</link>
            <guid>https://www.tenable.com/plugins/nessus/306062</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306062 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for rhc.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 7 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2026:7676 advisory.<br /></span><span><br /></span><span>    rhc is a client tool and daemon that connects the system to Red Hat hosted services enabling system and     subscription management.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate     (CVE-2025-61729)<br /></span><span><br /></span><span>    * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL rhc package based on the guidance in RHSA-2026:7676.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306062">https://www.tenable.com/plugins/nessus/306062</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 8 : nodejs:24 (RLSA-2026:7670)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306061</link>
            <guid>https://www.tenable.com/plugins/nessus/306061</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306061 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:7670 advisory.<br /></span><span><br /></span><span>    * nodejs: Nodejs denial of service (CVE-2026-21637)<br /></span><span><br /></span><span>    * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)<br /></span><span><br /></span><span>    * undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)<br /></span><span><br /></span><span>    * undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)<br /></span><span><br /></span><span>    * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate     decompression (CVE-2026-1526)<br /></span><span><br /></span><span>    * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter     (CVE-2026-2229)<br /></span><span><br /></span><span>    * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers     (CVE-2026-1525)<br /></span><span><br /></span><span>    * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)<br /></span><span><br /></span><span>    * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination     (CVE-2026-27135)<br /></span><span><br /></span><span>    * Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing     (CVE-2026-21712)<br /></span><span><br /></span><span>    * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)<br /></span><span><br /></span><span>    * Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read     restrictions (CVE-2026-21715)<br /></span><span><br /></span><span>    * nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership     via incomplete security fix. (CVE-2026-21716)<br /></span><span><br /></span><span>    * Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission     checks (CVE-2026-21711)<br /></span><span><br /></span><span>    * Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)<br /></span><span><br /></span><span>    * Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames     (CVE-2026-21714)<br /></span><span><br /></span><span>    * nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash     collisions (CVE-2026-21717)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected nodejs-nodemon, nodejs-packaging and / or nodejs-packaging-bundler packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306061">https://www.tenable.com/plugins/nessus/306061</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : pdns-recursor (2026-2490896a5d)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306060</link>
            <guid>https://www.tenable.com/plugins/nessus/306060</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306060 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-2490896a5d advisory.<br /></span><span><br /></span><span>    Update to latest 5.2 release, fixing multiple security issues<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected pdns-recursor package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306060">https://www.tenable.com/plugins/nessus/306060</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40386]]></title>
            <link>https://www.tenable.com/plugins/nessus/306059</link>
            <guid>https://www.tenable.com/plugins/nessus/306059</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306059 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In libexif through 0.6.25, an integer underflow in size checking for Fuji and Olympus MakerNote decoding     could be used by attackers to crash or leak information out of libexif-using programs. (CVE-2026-40386)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306059">https://www.tenable.com/plugins/nessus/306059</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-1502]]></title>
            <link>https://www.tenable.com/plugins/nessus/306058</link>
            <guid>https://www.tenable.com/plugins/nessus/306058</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306058 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host. (CVE-2026-1502)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306058">https://www.tenable.com/plugins/nessus/306058</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40393]]></title>
            <link>https://www.tenable.com/plugins/nessus/306057</link>
            <guid>https://www.tenable.com/plugins/nessus/306057</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306057 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In Mesa before 25.3.6 and 26 before 26.0.1, out-of-bounds memory access can occur in WebGPU because the     amount of to-be-allocated data depends on an untrusted party, and is then used for alloca.<br /></span><span>    (CVE-2026-40393)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306057">https://www.tenable.com/plugins/nessus/306057</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40385]]></title>
            <link>https://www.tenable.com/plugins/nessus/306056</link>
            <guid>https://www.tenable.com/plugins/nessus/306056</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306056 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In libexif through 0.6.25, an unsigned 32bit integer overflow in Nikon MakerNote handling could be used by     local attackers to cause crashes or information leaks. This only affects 32bit systems. (CVE-2026-40385)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306056">https://www.tenable.com/plugins/nessus/306056</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : libmicrohttpd (2026-7a0641ca41)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306055</link>
            <guid>https://www.tenable.com/plugins/nessus/306055</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306055 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-7a0641ca41 advisory.<br /></span><span><br /></span><span>    Update to 1.0.3-1<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected 1:libmicrohttpd package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306055">https://www.tenable.com/plugins/nessus/306055</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : yarnpkg (2026-085abeea02)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306054</link>
            <guid>https://www.tenable.com/plugins/nessus/306054</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306054 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-085abeea02 advisory.<br /></span><span><br /></span><span>    Refresh vendor bundle, fixes CVE-2026-4800.<br /></span><span><br /></span><span>    ----<br /></span><span><br /></span><span>    Update vendor bundle.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected yarnpkg package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306054">https://www.tenable.com/plugins/nessus/306054</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : trafficserver (2026-a157bd84c4)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306053</link>
            <guid>https://www.tenable.com/plugins/nessus/306053</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306053 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-a157bd84c4 advisory.<br /></span><span><br /></span><span>    Resolves:<br /></span><span>    CVE-2025-58136 - A simple legitimate POST request causes a crash     CVE-2025-65114 - Malformed chunked message body allows request smuggling<br /></span><span><br /></span><span>    Changes with Apache Traffic Server 10.1.2       #12864 - Fix ppa log field       #13037 - Fix prev_is_cr flag handling in chunked encoding parser       #13040 - HttpSM - make sure we have a valid buffer to write on.<br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected trafficserver package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306053">https://www.tenable.com/plugins/nessus/306053</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : mupdf (2026-b56fe1f040)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306052</link>
            <guid>https://www.tenable.com/plugins/nessus/306052</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306052 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2026-b56fe1f040 advisory.<br /></span><span><br /></span><span>    fix CVE-2026-3308 (rhbz#2454360)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected mupdf package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306052">https://www.tenable.com/plugins/nessus/306052</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : trafficserver (2026-7b719a7a58)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306051</link>
            <guid>https://www.tenable.com/plugins/nessus/306051</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306051 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-7b719a7a58 advisory.<br /></span><span><br /></span><span>    Resolves:<br /></span><span>    CVE-2025-58136 - A simple legitimate POST request causes a crash     CVE-2025-65114 - Malformed chunked message body allows request smuggling<br /></span><span><br /></span><span>    Changes with Apache Traffic Server 10.1.2       #12864 - Fix ppa log field       #13037 - Fix prev_is_cr flag handling in chunked encoding parser       #13040 - HttpSM - make sure we have a valid buffer to write on.<br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected trafficserver package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306051">https://www.tenable.com/plugins/nessus/306051</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : mingw-exiv2 (2026-592e4238fa)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306050</link>
            <guid>https://www.tenable.com/plugins/nessus/306050</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306050 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-592e4238fa advisory.<br /></span><span><br /></span><span>    Update to exiv2-0.28.8.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected mingw-exiv2 package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306050">https://www.tenable.com/plugins/nessus/306050</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : mupdf (2026-7a9c0c8c04)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306049</link>
            <guid>https://www.tenable.com/plugins/nessus/306049</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306049 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2026-7a9c0c8c04 advisory.<br /></span><span><br /></span><span>    fix CVE-2026-3308 (rhbz#2454361)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected mupdf package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306049">https://www.tenable.com/plugins/nessus/306049</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : mingw-exiv2 (2026-5eb6f779c0)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306048</link>
            <guid>https://www.tenable.com/plugins/nessus/306048</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306048 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-5eb6f779c0 advisory.<br /></span><span><br /></span><span>    Update to exiv2-0.28.8.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected mingw-exiv2 package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306048">https://www.tenable.com/plugins/nessus/306048</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : corosync (2026-95ee0edcd5)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306047</link>
            <guid>https://www.tenable.com/plugins/nessus/306047</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306047 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-95ee0edcd5 advisory.<br /></span><span><br /></span><span>    Security fix for CVE-2026-35091 and CVE-2026-35092<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected corosync package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306047">https://www.tenable.com/plugins/nessus/306047</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : yarnpkg (2026-7a6943e57d)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306046</link>
            <guid>https://www.tenable.com/plugins/nessus/306046</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306046 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2026-7a6943e57d advisory.<br /></span><span><br /></span><span>    Refresh vendor bundle, fixes CVE-2026-4800.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected yarnpkg package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306046">https://www.tenable.com/plugins/nessus/306046</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : libmicrohttpd (2026-65a08d1312)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306045</link>
            <guid>https://www.tenable.com/plugins/nessus/306045</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306045 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-65a08d1312 advisory.<br /></span><span><br /></span><span>    Update to 1.0.3-1<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected 1:libmicrohttpd package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306045">https://www.tenable.com/plugins/nessus/306045</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34479]]></title>
            <link>https://www.tenable.com/plugins/nessus/306044</link>
            <guid>https://www.tenable.com/plugins/nessus/306044</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306044 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the     XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents     containing such characters with a fatal error, which may cause downstream log processing systems to drop     or fail to index affected records. Two groups of users are affected: * Those using Log4j1XmlLayout     directly in a Log4j Core 2 configuration file. * Those using the Log4j 1 configuration compatibility layer     with org.apache.log4j.xml.XMLLayout specified as the layout class. Users are advised to upgrade to Apache     Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue. Note: The Apache Log4j 1-to-Log4j 2     bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to     Log4j 2 migration guide https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html , and specifically     the section on eliminating reliance on the bridge. (CVE-2026-34479)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306044">https://www.tenable.com/plugins/nessus/306044</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34480]]></title>
            <link>https://www.tenable.com/plugins/nessus/306043</link>
            <guid>https://www.tenable.com/plugins/nessus/306043</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306043 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Apache Log4j Core's XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in     versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification     https://www.w3.org/TR/xml/#charsets producing invalid XML output whenever a log message or MDC value     contains such characters. The impact depends on the StAX implementation in use: * JRE built-in StAX:<br /></span><span>    Forbidden characters are silently written to the output, producing malformed XML. Conforming parsers must     reject such documents with a fatal error, which may cause downstream log-processing systems to drop the     affected records. * Alternative StAX implementations (e.g., Woodstox https://github.com/FasterXML/woodstox     , a transitive dependency of the Jackson XML Dataformat module): An exception is thrown during the logging     call, and the log event is never delivered to its intended appender, only to Log4j's internal status     logger. Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue by sanitizing     forbidden characters before XML output. (CVE-2026-34480)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306043">https://www.tenable.com/plugins/nessus/306043</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3446]]></title>
            <link>https://www.tenable.com/plugins/nessus/306042</link>
            <guid>https://www.tenable.com/plugins/nessus/306042</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306042 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - When calling base64.b64decode() or related functions the decoding process would stop after encountering     the first padded quad regardless of whether there was more information to be processed. This can lead to     data being accepted which may be processed differently by other implementations. Use validate=True to     enable stricter processing of base64 data. (CVE-2026-3446)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306042">https://www.tenable.com/plugins/nessus/306042</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34481]]></title>
            <link>https://www.tenable.com/plugins/nessus/306041</link>
            <guid>https://www.tenable.com/plugins/nessus/306041</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306041 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Apache Log4j's JsonTemplateLayout https://logging.apache.org/log4j/2.x/manual/json-template-layout.html ,     in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite     floating-point values (NaN, Infinity, or -Infinity), which are prohibited by RFC 8259. This may cause     downstream log processing systems to reject or fail to index affected records. An attacker can exploit     this issue only if both of the following conditions are met: * The application uses JsonTemplateLayout. *     The application logs a MapMessage containing an attacker-controlled floating-point value. Users are     advised to upgrade to Apache Log4j JSON Template Layout 2.25.4, which corrects this issue.<br /></span><span>    (CVE-2026-34481)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306041">https://www.tenable.com/plugins/nessus/306041</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : py-ormar -- vulnerabilities (8d549898-3598-11f1-a8bc-3c7c3fba4204)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306040</link>
            <guid>https://www.tenable.com/plugins/nessus/306040</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306040 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 8d549898-3598-11f1-a8bc-3c7c3fba4204 advisory.<br /></span><span><br /></span><span>    https://github.com/ormar-orm/ormar/security/advisories reports:<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306040">https://www.tenable.com/plugins/nessus/306040</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : (lib)tiff -- Integer Overflow or Wraparound (766bb9b5-357f-11f1-98f0-00a098b42aeb)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306039</link>
            <guid>https://www.tenable.com/plugins/nessus/306039</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306039 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 766bb9b5-357f-11f1-98f0-00a098b42aeb advisory.<br /></span><span><br /></span><span>    PrymEvol and Quang Luong reports:<br /></span><span>    A flaw was found in the libtiff library.  A remote attacker could                  exploit a signed integer overflow vulnerability in the                  putcontig8bitYCbCr44tile function by providing a specially crafted                  TIFF file.  This flaw can lead to an out-of-bounds heap write due                  to incorrect memory pointer calculations, potentially causing a                  denial of service (application crash) or arbitrary code execution.<br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306039">https://www.tenable.com/plugins/nessus/306039</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 10 : nodejs22 (RLSA-2026:7080)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306038</link>
            <guid>https://www.tenable.com/plugins/nessus/306038</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306038 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:7080 advisory.<br /></span><span><br /></span><span>    * brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)<br /></span><span><br /></span><span>    * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)<br /></span><span><br /></span><span>    * minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions     (CVE-2026-27904)<br /></span><span><br /></span><span>    * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate     decompression (CVE-2026-1526)<br /></span><span><br /></span><span>    * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter     (CVE-2026-2229)<br /></span><span><br /></span><span>    * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers     (CVE-2026-1525)<br /></span><span><br /></span><span>    * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)<br /></span><span><br /></span><span>    * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination     (CVE-2026-27135)<br /></span><span><br /></span><span>    * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306038">https://www.tenable.com/plugins/nessus/306038</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 10 : kernel (RLSA-2026:6632)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306037</link>
            <guid>https://www.tenable.com/plugins/nessus/306037</guid>
            <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306037 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:6632 advisory.<br /></span><span><br /></span><span>    * kernel: Linux kernel (net/mlx5): Use-after-free in ECVF vports unload leads to denial of service     (CVE-2025-38109)<br /></span><span><br /></span><span>    * kernel: Linux kernel: Local denial of service and memory leak in DAMON sysfs via setup failure     (CVE-2026-23144)<br /></span><span><br /></span><span>    * kernel: Linux kernel: Use-after-free in bonding module can cause system crash or arbitrary code     execution (CVE-2026-23171)<br /></span><span><br /></span><span>    * kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (CVE-2026-23193)<br /></span><span><br /></span><span>    * kernel: macvlan: fix error recovery in macvlan_common_newlink() (CVE-2026-23209)<br /></span><span><br /></span><span>    * kernel: net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204)<br /></span><span><br /></span><span>    * kernel: ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306037">https://www.tenable.com/plugins/nessus/306037</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 45 : micropython (2026-d619d8d077)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306036</link>
            <guid>https://www.tenable.com/plugins/nessus/306036</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306036 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 45 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-d619d8d077 advisory.<br /></span><span><br /></span><span>    Automatic update for micropython-1.28.0-1.fc45.<br /></span><span><br /></span><span>    ##### **Changelog**<br /></span><span><br /></span><span>    ```<br /></span><span>    * Mon Apr  6 2026 Lumr Balhar <lbalhar@redhat.com> - 1.28.0-1<br /></span><span>    - Update to 1.28.0<br /></span><span>    - Security fix for CVE-2026-1998<br /></span><span>    - Update mbedtls submodule to 3.6.6<br /></span><span>    - mbedtls security fixes for CVE-2026-25834, CVE-2026-34871, CVE-2026-25833<br /></span><span>    - CVE-2025-52496, CVE-2025-52497, CVE-2025-49087, CVE-2025-54764, CVE-2025-59438      Resolves: rhbz#2455368, rhbz#2376688, rhbz#2376701, rhbz#2382261, rhbz#2405245,      rhbz#2405374, rhbz#2437327, rhbz#2454032, rhbz#2454086, rhbz#2454213<br /></span><span><br /></span><span>    ```<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected micropython package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306036">https://www.tenable.com/plugins/nessus/306036</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Slackware Linux 15.0 / current openssl  Multiple Vulnerabilities (SSA:2026-101-01)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306035</link>
            <guid>https://www.tenable.com/plugins/nessus/306035</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306035 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Slackware Linux host is missing a security update to openssl.<br /></span>
      <h3>Description</h3>
      <span>The version of openssl installed on the remote host is prior to 1.1.1zg / 3.5.6. It is, therefore, affected by multiple vulnerabilities as referenced in the SSA:2026-101-01 advisory.<br /></span><span><br /></span><span>    New openssl packages are available for Slackware 15.0 and -current to fix security issues.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the openssl security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the affected openssl package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306035">https://www.tenable.com/plugins/nessus/306035</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 8 : thunderbird (RLSA-2026:6917)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306034</link>
            <guid>https://www.tenable.com/plugins/nessus/306034</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306034 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:6917 advisory.<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR     140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)<br /></span><span><br /></span><span>    * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component     (CVE-2026-4688)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4695)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4689)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine     component (CVE-2026-4716)<br /></span><span><br /></span><span>    * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component     (CVE-2026-4684)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)<br /></span><span><br /></span><span>    * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)<br /></span><span><br /></span><span>    * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component     (CVE-2026-4697)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM     component (CVE-2026-4690)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component     (CVE-2026-4699)<br /></span><span><br /></span><span>    * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component     (CVE-2026-4693)<br /></span><span><br /></span><span>    * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)<br /></span><span><br /></span><span>    * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component     (CVE-2026-4694)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)<br /></span><span><br /></span><span>    * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149     and Thunderbird 149 (CVE-2026-4720)<br /></span><span><br /></span><span>    * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)<br /></span><span><br /></span><span>    * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)<br /></span><span><br /></span><span>    * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)<br /></span><span><br /></span><span>    * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component     (CVE-2026-4687)<br /></span><span><br /></span><span>    * thunderbird: Out of bounds read in IMAP parsing (CVE-2026-4371)<br /></span><span><br /></span><span>    * thunderbird: Spoofing issue in Thunderbird (CVE-2026-3889)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected thunderbird, thunderbird-debuginfo and / or thunderbird-debugsource packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306034">https://www.tenable.com/plugins/nessus/306034</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 8 : kernel (RLSA-2026:6571)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306033</link>
            <guid>https://www.tenable.com/plugins/nessus/306033</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306033 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:6571 advisory.<br /></span><span><br /></span><span>    * kernel: nouveau: fix instmem race condition around ptr stores (CVE-2024-26984)<br /></span><span><br /></span><span>    * kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (CVE-2026-23193)<br /></span><span><br /></span><span>    * kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()     (CVE-2026-23231)<br /></span><span><br /></span><span>    * kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential     privilege escalation. (CVE-2025-71238)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306033">https://www.tenable.com/plugins/nessus/306033</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 9 : kernel (RLSA-2026:6570)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306032</link>
            <guid>https://www.tenable.com/plugins/nessus/306032</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306032 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:6570 advisory.<br /></span><span><br /></span><span>    * kernel: Linux kernel (net/mlx5): Use-after-free in ECVF vports unload leads to denial of service     (CVE-2025-38109)<br /></span><span><br /></span><span>    * kernel: Kernel: Privilege escalation or denial of service in nf_tables via inverted element activity     check (CVE-2026-23111)<br /></span><span><br /></span><span>    * kernel: Linux kernel: Denial of Service in ice driver due to race condition during VSI rebuild     (CVE-2026-23210)<br /></span><span><br /></span><span>    * kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()     (CVE-2026-23231)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306032">https://www.tenable.com/plugins/nessus/306032</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 8 : kernel-rt (RLSA-2026:6572)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306031</link>
            <guid>https://www.tenable.com/plugins/nessus/306031</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306031 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:6572 advisory.<br /></span><span><br /></span><span>    * kernel: nouveau: fix instmem race condition around ptr stores (CVE-2024-26984)<br /></span><span><br /></span><span>    * kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (CVE-2026-23193)<br /></span><span><br /></span><span>    * kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()     (CVE-2026-23231)<br /></span><span><br /></span><span>    * kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential     privilege escalation. (CVE-2025-71238)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306031">https://www.tenable.com/plugins/nessus/306031</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40194]]></title>
            <link>https://www.tenable.com/plugins/nessus/306030</link>
            <guid>https://www.tenable.com/plugins/nessus/306030</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306030 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - phpseclib is a PHP secure communications library. Prior to 3.0.51, 2.0.53, and 1.0.28,     phpseclib\Net\SSH2::get_binary_packet() uses PHP's != operator to compare a received SSH packet HMAC     against the locally computed HMAC. != on equal-length binary strings in PHP uses memcmp(), which short-     circuits on the first differing byte. This is a real variable-time comparison (CWE-208), proven by scaling     benchmarks. This vulnerability is fixed in 3.0.51, 2.0.53, and 1.0.28. (CVE-2026-40194)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306030">https://www.tenable.com/plugins/nessus/306030</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-4150]]></title>
            <link>https://www.tenable.com/plugins/nessus/306029</link>
            <guid>https://www.tenable.com/plugins/nessus/306029</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306029 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows     remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required     to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The     specific flaw exists within the parsing of PSD files. The issue results from the lack of proper validation     of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can     leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28807.<br /></span><span>    (CVE-2026-4150)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306029">https://www.tenable.com/plugins/nessus/306029</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40354]]></title>
            <link>https://www.tenable.com/plugins/nessus/306028</link>
            <guid>https://www.tenable.com/plugins/nessus/306028</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306028 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Flatpak xdg-desktop-portal before 1.20.4 and 1.21.x before 1.21.1 allows any Flatpak app to trash any file     in the host context via a symlink attack on g_file_trash. (CVE-2026-40354)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306028">https://www.tenable.com/plugins/nessus/306028</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40021]]></title>
            <link>https://www.tenable.com/plugins/nessus/306027</link>
            <guid>https://www.tenable.com/plugins/nessus/306027</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306027 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Apache Log4net's XmlLayout https://logging.apache.org/log4net/manual/configuration/layouts.html#layout-     list and XmlLayoutSchemaLog4J https://logging.apache.org/log4net/manual/configuration/layouts.html#layout-     list , in versions before 3.3.0, fail to sanitize characters forbidden by the XML 1.0 specification     https://www.w3.org/TR/xml/#charsets in MDC property keys and values, as well as the identity field that     may carry attacker-influenced data. This causes an exception during serialization and the silent loss of     the affected log event. An attacker who can influence any of these fields can exploit this to suppress     individual log records, impairing audit trails and detection of malicious activity. Users are advised to     upgrade to Apache Log4net 3.3.0, which fixes this issue. (CVE-2026-40021)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306027">https://www.tenable.com/plugins/nessus/306027</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-4153]]></title>
            <link>https://www.tenable.com/plugins/nessus/306026</link>
            <guid>https://www.tenable.com/plugins/nessus/306026</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306026 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability     allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is     required to exploit this vulnerability in that the target must visit a malicious page or open a malicious     file. The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper     validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can     leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28874.<br /></span><span>    (CVE-2026-4153)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306026">https://www.tenable.com/plugins/nessus/306026</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40175]]></title>
            <link>https://www.tenable.com/plugins/nessus/306025</link>
            <guid>https://www.tenable.com/plugins/nessus/306025</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306025 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, the Axios library is     vulnerable to a specific Gadget attack chain that allows Prototype Pollution in any third-party     dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDSv2     bypass). This vulnerability is fixed in 1.15.0. (CVE-2026-40175)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306025">https://www.tenable.com/plugins/nessus/306025</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5795]]></title>
            <link>https://www.tenable.com/plugins/nessus/306024</link>
            <guid>https://www.tenable.com/plugins/nessus/306024</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306024 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In Eclipse Jetty, the class JASPIAuthenticator initiates the authentication checks, which set two     ThreadLocal variable. Upon returning from the initial checks, there are conditions that cause an early     return from the JASPIAuthenticator code without clearing those ThreadLocals. A subsequent request using     the same thread inherits the ThreadLocal values, leading to a broken access control and privilege     escalation. (CVE-2026-5795)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306024">https://www.tenable.com/plugins/nessus/306024</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40198]]></title>
            <link>https://www.tenable.com/plugins/nessus/306023</link>
            <guid>https://www.tenable.com/plugins/nessus/306023</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306023 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which may allow IP ACL     bypass. _pack_ipv6() does not check that uncompressed IPv6 addresses (without ::) have exactly 8 hex     groups. Inputs like abcd, 1:2:3, or 1:2:3:4:5:6:7 are accepted and produce packed values of wrong     length (3, 7, or 15 bytes instead of 17). The packed values are used internally for mask and comparison     operations. find() and bin_find() use Perl string comparison (lt/gt) on these values, and comparing     strings of different lengths gives wrong results. This can cause find() to incorrectly report an address     as inside or outside a range. Example: my $cidr = Net::CIDR::Lite->new(::/8); $cidr->find(1:2:3); #     invalid input, incorrectly returns true This is the same class of input validation issue as CVE-2021-47154     (IPv4 leading zeros) previously fixed in this module. See also CVE-2026-40199, a related issue in the same     function affecting IPv4 mapped IPv6 addresses. (CVE-2026-40198)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306023">https://www.tenable.com/plugins/nessus/306023</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-4154]]></title>
            <link>https://www.tenable.com/plugins/nessus/306022</link>
            <guid>https://www.tenable.com/plugins/nessus/306022</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306022 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows     remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required     to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The     specific flaw exists within the parsing of XPM files. The issue results from the lack of proper validation     of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can     leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28901.<br /></span><span>    (CVE-2026-4154)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306022">https://www.tenable.com/plugins/nessus/306022</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-4151]]></title>
            <link>https://www.tenable.com/plugins/nessus/306021</link>
            <guid>https://www.tenable.com/plugins/nessus/306021</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306021 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows     remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required     to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The     specific flaw exists within the parsing of ANI files. The issue results from the lack of proper validation     of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can     leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28813.<br /></span><span>    (CVE-2026-4151)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306021">https://www.tenable.com/plugins/nessus/306021</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40199]]></title>
            <link>https://www.tenable.com/plugins/nessus/306020</link>
            <guid>https://www.tenable.com/plugins/nessus/306020</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306020 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Net::CIDR::Lite versions before 0.23 for Perl mishandles IPv4 mapped IPv6 addresses, which may allow IP     ACL bypass. _pack_ipv6() includes the sentinel byte from _pack_ipv4() when building the packed     representation of IPv4 mapped addresses like ::ffff:192.168.1.1. This produces an 18 byte value instead of     17 bytes, misaligning the IPv4 part of the address. The wrong length causes incorrect results in mask     operations (bitwise AND truncates to the shorter operand) and in find() / bin_find() which use Perl string     comparison (lt/gt). This can cause find() to incorrectly match or miss addresses. Example: my $cidr =     Net::CIDR::Lite->new(::ffff:192.168.1.0/120); $cidr->find(::ffff:192.168.2.0); # incorrectly returns     true This is triggered by valid RFC 4291 IPv4 mapped addresses (::ffff:x.x.x.x). See also CVE-2026-40198,     a related issue in the same function affecting malformed IPv6 addresses. (CVE-2026-40199)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306020">https://www.tenable.com/plugins/nessus/306020</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-4152]]></title>
            <link>https://www.tenable.com/plugins/nessus/306019</link>
            <guid>https://www.tenable.com/plugins/nessus/306019</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306019 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability     allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is     required to exploit this vulnerability in that the target must visit a malicious page or open a malicious     file. The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper     validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can     leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28863.<br /></span><span>    (CVE-2026-4152)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306019">https://www.tenable.com/plugins/nessus/306019</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-40023]]></title>
            <link>https://www.tenable.com/plugins/nessus/306018</link>
            <guid>https://www.tenable.com/plugins/nessus/306018</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306018 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Apache Log4cxx's XMLLayout https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html     , in versions before 1.7.0, fails to sanitize characters forbidden by the XML 1.0 specification     https://www.w3.org/TR/xml/#charsets in log messages, NDC, and MDC property keys and values, producing     invalid XML output. Conforming XML parsers must reject such documents with a fatal error, which may cause     downstream log processing systems to drop or fail to index affected records. An attacker who can influence     logged data can exploit this to suppress individual log records, impairing audit trails and detection of     malicious activity. Users are advised to upgrade to Apache Log4cxx 1.7.0, which fixes this issue.<br /></span><span>    (CVE-2026-40023)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306018">https://www.tenable.com/plugins/nessus/306018</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CBL Mariner 2.0 Security Update: CBL-Mariner Releases (CVE-2026-34743)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306017</link>
            <guid>https://www.tenable.com/plugins/nessus/306017</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306017 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote CBL Mariner host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The version of CBL-Mariner Releases installed on the remote CBL Mariner 2.0 host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the CVE-2026-34743 advisory.<br /></span><span><br /></span><span>  - XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version     5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting     lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little     memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3. (CVE-2026-34743)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306017">https://www.tenable.com/plugins/nessus/306017</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Azure Linux 3.0 Security Update: CBL-Mariner Releases (CVE-2026-35535)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306016</link>
            <guid>https://www.tenable.com/plugins/nessus/306016</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306016 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Azure Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The version of CBL-Mariner Releases installed on the remote Azure Linux 3.0 host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the CVE-2026-35535 advisory.<br /></span><span><br /></span><span>  - In Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgroups call, during a     privilege drop before running the mailer, is not a fatal error and can lead to privilege escalation.<br /></span><span>    (CVE-2026-35535)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306016">https://www.tenable.com/plugins/nessus/306016</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 10 : kea (RLSA-2026:7342)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306015</link>
            <guid>https://www.tenable.com/plugins/nessus/306015</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306015 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 10 host has packages installed that are affected by a vulnerability as referenced in the RLSA-2026:7342 advisory.<br /></span><span><br /></span><span>    * Kea: Kea: Denial of Service via maliciously crafted message (CVE-2026-3608)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306015">https://www.tenable.com/plugins/nessus/306015</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) (SUSE-SU-2026:1242-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306014</link>
            <guid>https://www.tenable.com/plugins/nessus/306014</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306014 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1242-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.179 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150400_24_179-default and / or kernel- livepatch-5_14_21-150500_55_110-default packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306014">https://www.tenable.com/plugins/nessus/306014</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : nghttp2 (SUSE-SU-2026:1247-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306013</link>
            <guid>https://www.tenable.com/plugins/nessus/306013</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306013 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2026:1247-1 advisory.<br /></span><span><br /></span><span>    This update for nghttp2 fixes the following issue:<br /></span><span><br /></span><span>    - CVE-2026-27135: assertion failure due to missing state validation can lead to DoS (bsc#1259845).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306013">https://www.tenable.com/plugins/nessus/306013</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : openssl-1_1 (SUSE-SU-2026:1257-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306012</link>
            <guid>https://www.tenable.com/plugins/nessus/306012</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306012 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1257-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-28387: Potential use-after-free in DANE client code (bsc#1260441).<br /></span><span>    - CVE-2026-28388: NULL Pointer Dereference When Processing a Delta CRL (bsc#1260442).<br /></span><span>    - CVE-2026-28389: Possible NULL dereference when processing CMS KeyAgreeRecipientInfo (bsc#1260443).<br /></span><span>    - CVE-2026-31789: Heap buffer overflow in hexadecimal conversion (bsc#1260444).<br /></span><span>    - CVE-2026-31790: Incorrect failure handling in RSA KEM RSASVE encapsulation (bsc#1260445).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306012">https://www.tenable.com/plugins/nessus/306012</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : openssl-1_1 (SUSE-SU-2026:1255-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306011</link>
            <guid>https://www.tenable.com/plugins/nessus/306011</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306011 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1255-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-28387: Potential use-after-free in DANE client code (bsc#1260441).<br /></span><span>    - CVE-2026-28388: NULL Pointer Dereference When Processing a Delta CRL (bsc#1260442).<br /></span><span>    - CVE-2026-28389: Possible NULL dereference when processing CMS KeyAgreeRecipientInfo (bsc#1260443).<br /></span><span>    - CVE-2026-31789: Heap buffer overflow in hexadecimal conversion (bsc#1260444).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306011">https://www.tenable.com/plugins/nessus/306011</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) (SUSE-SU-2026:1244-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306010</link>
            <guid>https://www.tenable.com/plugins/nessus/306010</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306010 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1244-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150700.53.16 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253404).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150700_53_16-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306010">https://www.tenable.com/plugins/nessus/306010</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Reader < 26.001.21411 Vulnerability (APSB26-43) (macOS)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306009</link>
            <guid>https://www.tenable.com/plugins/nessus/306009</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306009 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The version of Adobe Reader installed on the remote macOS host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Reader installed on the remote macOS host is a version prior to 26.001.21411. It is, therefore, affected by a vulnerability.<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled     Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in     arbitrary code execution in the context of the current user. Exploitation of this issue requires user     interaction in that a victim must open a malicious file. (CVE-2026-34621)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Reader version 26.001.21411 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306009">https://www.tenable.com/plugins/nessus/306009</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Reader < 26.001.21411 Vulnerability (APSB26-43)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306008</link>
            <guid>https://www.tenable.com/plugins/nessus/306008</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306008 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The version of Adobe Reader installed on the remote Windows host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Reader installed on the remote Windows host is a version prior to 26.001.21411. It is, therefore, affected by a vulnerability.<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled     Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in     arbitrary code execution in the context of the current user. Exploitation of this issue requires user     interaction in that a victim must open a malicious file. (CVE-2026-34621)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Reader version 26.001.21411 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306008">https://www.tenable.com/plugins/nessus/306008</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Acrobat < 24.001.30362 / 26.001.21411 Vulnerability (APSB26-43)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306007</link>
            <guid>https://www.tenable.com/plugins/nessus/306007</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306007 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The version of Adobe Acrobat installed on the remote Windows host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Acrobat installed on the remote Windows host is a version prior to 24.001.30362 or 26.001.21411. It is, therefore, affected by a vulnerability.<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled     Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in     arbitrary code execution in the context of the current user. Exploitation of this issue requires user     interaction in that a victim must open a malicious file. (CVE-2026-34621)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Acrobat version 24.001.30362 / 26.001.21411 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306007">https://www.tenable.com/plugins/nessus/306007</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Acrobat < 24.001.30360 / 26.001.21411 Vulnerability (APSB26-43) (macOS)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306006</link>
            <guid>https://www.tenable.com/plugins/nessus/306006</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306006 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The version of Adobe Acrobat installed on the remote macOS host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Acrobat installed on the remote macOS host is a version prior to 24.001.30360 or 26.001.21411. It is, therefore, affected by a vulnerability.<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled     Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in     arbitrary code execution in the context of the current user. Exploitation of this issue requires user     interaction in that a victim must open a malicious file. (CVE-2026-34621)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Acrobat version 24.001.30360 / 26.001.21411 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306006">https://www.tenable.com/plugins/nessus/306006</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Linux PHSA-2026-5.0-0813]]></title>
            <link>https://www.tenable.com/plugins/nessus/306005</link>
            <guid>https://www.tenable.com/plugins/nessus/306005</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306005 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the linux package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306005">https://www.tenable.com/plugins/nessus/306005</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Openssl PHSA-2026-5.0-0810]]></title>
            <link>https://www.tenable.com/plugins/nessus/306004</link>
            <guid>https://www.tenable.com/plugins/nessus/306004</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306004 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the openssl package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306004">https://www.tenable.com/plugins/nessus/306004</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : openssl-1_0_0 (SUSE-SU-2026:1256-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306003</link>
            <guid>https://www.tenable.com/plugins/nessus/306003</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306003 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1256-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-28387: Potential use-after-free in DANE client code (bsc#1260441).<br /></span><span>    - CVE-2026-28388: NULL Pointer Dereference When Processing a Delta CRL (bsc#1260442).<br /></span><span>    - CVE-2026-28389: Possible NULL dereference when processing CMS KeyAgreeRecipientInfo (bsc#1260443).<br /></span><span>    - CVE-2026-31789: Heap buffer overflow in hexadecimal conversion (bsc#1260444).<br /></span><span>    - CVE-2026-31790: Incorrect failure handling in RSA KEM RSASVE encapsulation (bsc#1260445).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306003">https://www.tenable.com/plugins/nessus/306003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) (SUSE-SU-2026:1254-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306002</link>
            <guid>https://www.tenable.com/plugins/nessus/306002</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306002 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1254-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150500.55.133 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150500_55_133-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306002">https://www.tenable.com/plugins/nessus/306002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6) (SUSE-SU-2026:1239-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/306001</link>
            <guid>https://www.tenable.com/plugins/nessus/306001</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306001 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1239-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 6.4.0-150600.23.50 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253404).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()     (bsc#1258183).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-6_4_0-150600_23_50-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306001">https://www.tenable.com/plugins/nessus/306001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Rubygem PHSA-2026-5.0-0816]]></title>
            <link>https://www.tenable.com/plugins/nessus/306000</link>
            <guid>https://www.tenable.com/plugins/nessus/306000</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 306000 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the rubygem package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/306000">https://www.tenable.com/plugins/nessus/306000</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Mysql PHSA-2026-5.0-0815]]></title>
            <link>https://www.tenable.com/plugins/nessus/305999</link>
            <guid>https://www.tenable.com/plugins/nessus/305999</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305999 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the mysql package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305999">https://www.tenable.com/plugins/nessus/305999</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Linux PHSA-2026-5.0-0806]]></title>
            <link>https://www.tenable.com/plugins/nessus/305998</link>
            <guid>https://www.tenable.com/plugins/nessus/305998</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305998 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the linux package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305998">https://www.tenable.com/plugins/nessus/305998</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Python3 PHSA-2026-5.0-0816]]></title>
            <link>https://www.tenable.com/plugins/nessus/305997</link>
            <guid>https://www.tenable.com/plugins/nessus/305997</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305997 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the python3 package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305997">https://www.tenable.com/plugins/nessus/305997</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : Mbed TLS -- vulnerabilities (d77bd2f5-34f0-11f1-bc6d-3c7c3fba4204)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305996</link>
            <guid>https://www.tenable.com/plugins/nessus/305996</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305996 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the d77bd2f5-34f0-11f1-bc6d-3c7c3fba4204 advisory.<br /></span><span><br /></span><span>    https://mbed-tls.readthedocs.io/en/latest/security-advisories/ reports:<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305996">https://www.tenable.com/plugins/nessus/305996</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : DNSdist -- vulnerabilities (431c2753-3503-11f1-bc6d-3c7c3fba4204)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305995</link>
            <guid>https://www.tenable.com/plugins/nessus/305995</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305995 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 431c2753-3503-11f1-bc6d-3c7c3fba4204 advisory.<br /></span><span><br /></span><span>    https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-02.html reports:<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305995">https://www.tenable.com/plugins/nessus/305995</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : chromium -- security fixes (4b727a1a-5034-42b4-b29b-2289389f4ba8)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305994</link>
            <guid>https://www.tenable.com/plugins/nessus/305994</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305994 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 4b727a1a-5034-42b4-b29b-2289389f4ba8 advisory.<br /></span><span><br /></span><span>    Chrome Releases reports:<br /></span><span>    This update includes multiple security fixes:<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305994">https://www.tenable.com/plugins/nessus/305994</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 4.0: Nodejs PHSA-2026-4.0-0995]]></title>
            <link>https://www.tenable.com/plugins/nessus/305993</link>
            <guid>https://www.tenable.com/plugins/nessus/305993</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305993 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the nodejs package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305993">https://www.tenable.com/plugins/nessus/305993</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 4.0: Python3 PHSA-2026-4.0-0995]]></title>
            <link>https://www.tenable.com/plugins/nessus/305992</link>
            <guid>https://www.tenable.com/plugins/nessus/305992</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305992 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the python3 package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305992">https://www.tenable.com/plugins/nessus/305992</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Nodejs PHSA-2026-5.0-0814]]></title>
            <link>https://www.tenable.com/plugins/nessus/305991</link>
            <guid>https://www.tenable.com/plugins/nessus/305991</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305991 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the nodejs package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305991">https://www.tenable.com/plugins/nessus/305991</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 4.0: Rubygem PHSA-2026-4.0-0995]]></title>
            <link>https://www.tenable.com/plugins/nessus/305990</link>
            <guid>https://www.tenable.com/plugins/nessus/305990</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305990 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the rubygem package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305990">https://www.tenable.com/plugins/nessus/305990</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 47 for SUSE Linux Enterprise 15 SP4) (SUSE-SU-2026:1237-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305989</link>
            <guid>https://www.tenable.com/plugins/nessus/305989</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305989 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1237-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.187 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150400_24_187-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305989">https://www.tenable.com/plugins/nessus/305989</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) (SUSE-SU-2026:1248-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305988</link>
            <guid>https://www.tenable.com/plugins/nessus/305988</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305988 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1248-1 advisory.<br /></span><span><br /></span><span>    This update for the SUSE Linux Enterprise Kernel 5.14.21-150500.55.113 fixes various security issues<br /></span><span><br /></span><span>    The following security issues were fixed:<br /></span><span><br /></span><span>    - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).<br /></span><span>    - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).<br /></span><span>    - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf     (bsc#1256780).<br /></span><span>    - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).<br /></span><span>    - CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).<br /></span><span>    - CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel-livepatch-5_14_21-150500_55_113-default package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305988">https://www.tenable.com/plugins/nessus/305988</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 / openSUSE 15 Security Update : tigervnc (SUSE-SU-2026:1252-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305987</link>
            <guid>https://www.tenable.com/plugins/nessus/305987</guid>
            <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305987 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2026:1252-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-34352: Fixed permissions to prevent other users from observing the screen, or modifying what is     sent to the client. (bsc#1260871)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305987">https://www.tenable.com/plugins/nessus/305987</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Anthropic Claude Code < 2.1.2 Sandbox Escape via settings.json Injection (CVE-2026-25725)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305986</link>
            <guid>https://www.tenable.com/plugins/nessus/305986</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305986 with High Severity</p>
      <h3>Synopsis</h3>
      <span>An application installed on the remote host is affected by a sandbox escape vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Anthropic Claude Code installed on the remote host is prior to 2.1.2. It is, therefore, affected by a sandbox escape vulnerability.<br /></span><span><br /></span><span>The bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was mounted as writable and .claude/settings.local.json was explicitly protected with read-only constraints, settings.json was not protected if it was missing. This allowed malicious code running inside the sandbox to create this file and inject persistent hooks such as SessionStart commands that would execute with host privileges when Claude Code was restarted.<br /></span><span>(CVE-2026-25725)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Anthropic Claude Code to version 2.1.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305986">https://www.tenable.com/plugins/nessus/305986</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Anthropic Claude Code < 2.0.65 API Key Leak via Project Settings (CVE-2026-21852)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305985</link>
            <guid>https://www.tenable.com/plugins/nessus/305985</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305985 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>An application installed on the remote host is affected by an information disclosure vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Anthropic Claude Code installed on the remote host is prior to 2.0.65. It is, therefore, affected by an information disclosure vulnerability.<br /></span><span><br /></span><span>A vulnerability in the project-load flow allowed malicious repositories to exfiltrate data including Anthropic API keys before users confirmed trust. If a user started Claude Code in an attacker-controlled repository, and the repository included a settings file that set ANTHROPIC_BASE_URL to an attacker-controlled endpoint, Claude Code would issue API requests before showing the trust prompt, potentially leaking the user's API keys. (CVE-2026-21852)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Anthropic Claude Code to version 2.0.65 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305985">https://www.tenable.com/plugins/nessus/305985</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Anthropic Claude Code < 2.1.7 Permission Deny Bypass Through Symbolic Links (CVE-2026-25724)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305984</link>
            <guid>https://www.tenable.com/plugins/nessus/305984</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305984 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>An application installed on the remote host is affected by a permission bypass vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Anthropic Claude Code installed on the remote host is prior to 2.1.7. It is, therefore, affected by a permission bypass vulnerability.<br /></span><span><br /></span><span>Claude Code failed to strictly enforce deny rules configured in settings.json when accessing files through symbolic links. If a user explicitly denied Claude Code access to a file such as /etc/passwd and Claude Code had access to a symbolic link pointing to that file, it was possible for Claude Code to read the restricted file through the symlink without triggering deny rule enforcement. (CVE-2026-25724)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Anthropic Claude Code to version 2.1.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305984">https://www.tenable.com/plugins/nessus/305984</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Anthropic Claude Code Installed (Linux / macOS)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305983</link>
            <guid>https://www.tenable.com/plugins/nessus/305983</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305983 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Anthropic Claude Code is installed on the remote host.<br /></span>
      <h3>Description</h3>
      <span>Anthropic Claude Code, an agentic coding tool, is installed on the remote Linux or macOS host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305983">https://www.tenable.com/plugins/nessus/305983</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dotnetnuke < 10.2.2 Same HostGUID for all new installs (CVE-2026-40306)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305982</link>
            <guid>https://www.tenable.com/plugins/nessus/305982</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305982 with High Severity</p>
      <h3>Synopsis</h3>
      <span>An ASP.NET application running on the remote web server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Dotnetnuke running on the remote web server is prior to 10.2.2.<br /></span><span>It is, therefore, affected by a vulnerability.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Dotnetnuke version 10.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305982">https://www.tenable.com/plugins/nessus/305982</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dotnetnuke 6.0.x < 10.2.2 Force Friend Request Acceptance (CVE-2026-40305)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305981</link>
            <guid>https://www.tenable.com/plugins/nessus/305981</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305981 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>An ASP.NET application running on the remote web server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Dotnetnuke running on the remote web server is 6.0.x prior to 10.2.2. It is, therefore, affected by a vulnerability.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Dotnetnuke version 10.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305981">https://www.tenable.com/plugins/nessus/305981</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Azure Linux 3.0 Security Update: CBL-Mariner Releases (CVE-2026-34743)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305980</link>
            <guid>https://www.tenable.com/plugins/nessus/305980</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305980 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Azure Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The version of CBL-Mariner Releases installed on the remote Azure Linux 3.0 host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the CVE-2026-34743 advisory.<br /></span><span><br /></span><span>  - XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version     5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting     lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little     memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3. (CVE-2026-34743)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305980">https://www.tenable.com/plugins/nessus/305980</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft Edge (Chromium) < 147.0.3912.60 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/305979</link>
            <guid>https://www.tenable.com/plugins/nessus/305979</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305979 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has an web browser installed that is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Microsoft Edge installed on the remote Windows host is prior to 147.0.3912.60. It is, therefore, affected by multiple vulnerabilities as referenced in the April 10, 2026 advisory.<br /></span><span><br /></span><span>  - Use after free in PrivateAI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who     convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted     HTML page. (Chromium security severity: Medium) (CVE-2026-5874)<br /></span><span><br /></span><span>  - User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an     unauthorized attacker to perform spoofing over a network. (CVE-2026-33119)<br /></span><span><br /></span><span>  - Microsoft Edge (Chromium-based) Spoofing Vulnerability (CVE-2026-33118)<br /></span><span><br /></span><span>  - Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute     arbitrary code via a crafted HTML page. (Chromium security severity: Critical) (CVE-2026-5858)<br /></span><span><br /></span><span>  - Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially     exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) (CVE-2026-5859)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft Edge version 147.0.3912.60 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305979">https://www.tenable.com/plugins/nessus/305979</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34734]]></title>
            <link>https://www.tenable.com/plugins/nessus/305978</link>
            <guid>https://www.tenable.com/plugins/nessus/305978</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305978 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - HDF5 is software for managing data. In 1.14.1-2 and earlier, a heap-use-after-free was found in the h5dump     helper utility. An attacker who can supply a malicious h5 file can trigger a heap use-after-free. The     freed object is referenced in a memmove call from H5T__conv_struct. The original object was allocated by     H5D__typeinfo_init_phase3 and freed by H5D__typeinfo_term. (CVE-2026-34734)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305978">https://www.tenable.com/plugins/nessus/305978</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31412]]></title>
            <link>https://www.tenable.com/plugins/nessus/305977</link>
            <guid>https://www.tenable.com/plugins/nessus/305977</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305977 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks() The     `check_command_size_in_blocks()` function calculates the data size in bytes by left shifting     `common->data_size_from_cmnd` by the block size (`common->curlun->blkbits`). However, it does not validate     whether this shift operation will cause an integer overflow. Initially, the block size is set up in     `fsg_lun_open()` , and the `common->data_size_from_cmnd` is set up in `do_scsi_command()`. During     initialization, there is no integer overflow check for the interaction between two variables. So if a     malicious USB host sends a SCSI READ or WRITE command requesting a large amount of data     (`common->data_size_from_cmnd`), the left shift operation can wrap around. This results in a truncated     data size, which can bypass boundary checks and potentially lead to memory corruption or out-of-bounds     accesses. Fix this by using the check_shl_overflow() macro to safely perform the shift and catch any     overflows. (CVE-2026-31412)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305977">https://www.tenable.com/plugins/nessus/305977</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 10 / 9 : Unbreakable Enterprise kernel (ELSA-2026-50184)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305976</link>
            <guid>https://www.tenable.com/plugins/nessus/305976</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305976 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 10 / 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2026-50184 advisory.<br /></span><span><br /></span><span>    - ipv6: use RCU in ip6_xmit() (Eric Dumazet)  [Orabug: 39186444]  {CVE-2025-40135}<br /></span><span>    - netfilter: nf_tables: fix use-after-free in nf_tables_addchain() (Inseo An)  [Orabug: 39181102]     {CVE-2026-23231}<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305976">https://www.tenable.com/plugins/nessus/305976</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1060a / 20.1070a Security Update: grafana (UTSA-2026-007098)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305975</link>
            <guid>https://www.tenable.com/plugins/nessus/305975</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305975 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007098 advisory.<br /></span><span><br /></span><span>    The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines.<br /></span><span>    This can permit request smuggling if a net/http server is used in conjunction with a server that     incorrectly accepts a bare LF as part of a chunk-ext.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected grafana package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305975">https://www.tenable.com/plugins/nessus/305975</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1060a / 20.1070a Security Update: grafana (UTSA-2026-007107)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305974</link>
            <guid>https://www.tenable.com/plugins/nessus/305974</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305974 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007107 advisory.<br /></span><span><br /></span><span>    During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields     mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it     should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or     uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would     not have resumed with during the initial handshake, or cause a server to resume a session with a client     that it would not have resumed with during the initial handshake.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected grafana package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305974">https://www.tenable.com/plugins/nessus/305974</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070a Security Update: vsftpd (UTSA-2026-007108)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305973</link>
            <guid>https://www.tenable.com/plugins/nessus/305973</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305973 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007108 advisory.<br /></span><span><br /></span><span>    A flaw was found in vsftpd. This vulnerability allows a denial of service (DoS) via an integer overflow in     the ls command parameter parsing, triggered by a remote, authenticated attacker sending a crafted STAT     command with a specific byte sequence.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected vsftpd package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305973">https://www.tenable.com/plugins/nessus/305973</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1060a / 20.1070a Security Update: grafana (UTSA-2026-007100)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305972</link>
            <guid>https://www.tenable.com/plugins/nessus/305972</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305972 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007100 advisory.<br /></span><span><br /></span><span>    A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal     and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that     will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous     access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to     exploit the open redirect to achieve a full read SSRF.<br /></span><span><br /></span><span>    The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src`     directive.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected grafana package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305972">https://www.tenable.com/plugins/nessus/305972</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070a Security Update: glibc (UTSA-2026-007101)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305971</link>
            <guid>https://www.tenable.com/plugins/nessus/305971</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305971 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007101 advisory.<br /></span><span><br /></span><span>    The regcomp function in the GNU C library version from 2.4 to 2.41 is     subject to a double free if some previous allocation fails. It can be     accomplished either by a malloc failure or by using an interposed malloc      that injects random malloc failures. The double free can allow buffer     manipulation depending of how the regex is constructed. This issue     affects all architectures and ABIs supported by the GNU C library.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected glibc package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305971">https://www.tenable.com/plugins/nessus/305971</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050a / 20.1060a / 20.1070a Security Update: freerdp (UTSA-2026-007105)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305970</link>
            <guid>https://www.tenable.com/plugins/nessus/305970</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305970 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007105 advisory.<br /></span><span><br /></span><span>    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, a malicious RDP     server can trigger a heap buffer overflow in FreeRDP clients using the GDI surface pipeline (e.g.,     `xfreerdp`) by sending an RDPGFX ClearCodec surface command with an out-of-bounds destination rectangle.<br /></span><span>    The `gdi_SurfaceCommand_ClearCodec()` handler does not call `is_within_surface()` to validate the command     rectangle against the destination surface dimensions, allowing attacker-controlled `cmd->left`/`cmd->top`     (and subcodec rectangle offsets) to reach image copy routines that write into `surface->data` without     bounds enforcement. The OOB write corrupts an adjacent `gdiGfxSurface` struct's `codecs*` pointer with     attacker-controlled pixel data, and corruption of `codecs*` is sufficient to reach an indirect function     pointer call (`NSC_CONTEXT.decode` at `nsc.c:500`) on a subsequent codec command  full instruction     pointer (RIP) control demonstrated in exploitability harness. Users should upgrade to version 3.23.0 to     receive a patch.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected freerdp package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305970">https://www.tenable.com/plugins/nessus/305970</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1060a / 20.1070a Security Update: grafana (UTSA-2026-007102)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305969</link>
            <guid>https://www.tenable.com/plugins/nessus/305969</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305969 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007102 advisory.<br /></span><span><br /></span><span>    Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts     that will be printed out. Furthermore, the error string is constructed by repeated string concatenation,     leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in     excessive resource consumption.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected grafana package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305969">https://www.tenable.com/plugins/nessus/305969</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1060a / 20.1070a Security Update: grafana (UTSA-2026-007106)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305968</link>
            <guid>https://www.tenable.com/plugins/nessus/305968</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305968 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007106 advisory.<br /></span><span><br /></span><span>    archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an     archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP     archive.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected grafana package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305968">https://www.tenable.com/plugins/nessus/305968</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050a / 20.1060a / 20.1070a Security Update: freerdp (UTSA-2026-007104)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305967</link>
            <guid>https://www.tenable.com/plugins/nessus/305967</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305967 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007104 advisory.<br /></span><span><br /></span><span>    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, in the RLE     planar decode path, `planar_decompress_plane_rle()` writes into `pDstData` at `((nYDst+y) * nDstStep) +     (4*nXDst) + nChannel` without verifying that `(nYDst+nSrcHeight)` fits in the destination height or that     `(nXDst+nSrcWidth)` fits in the destination stride. When `TempFormat != DstFormat`, `pDstData` becomes     `planar->pTempData` (sized for the desktop), while `nYDst` is only validated against the **surface** by     `is_within_surface()`. A malicious RDP server can exploit this to perform a heap out-of-bounds write with     attacker-controlled offset and pixel data on any connecting FreeRDP client. The OOB write reaches up to     132,096 bytes past the temp buffer end, and  on the brk heap (desktop  128128), an adjacent     `NSC_CONTEXT` struct's `decode` function pointer is overwritten with attacker-controlled pixel data     control-flowrelevant corruption (function pointer overwritten) demonstrated under deterministic heap     layout (`nsc->decode = 0xFF414141FF414141`). Version 3.23.0 fixes the vulnerability.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected freerdp package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305967">https://www.tenable.com/plugins/nessus/305967</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1060a / 20.1070a Security Update: grafana (UTSA-2026-007103)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305966</link>
            <guid>https://www.tenable.com/plugins/nessus/305966</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305966 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007103 advisory.<br /></span><span><br /></span><span>    The net/url package does not set a limit on the number of query parameters in a query. While the maximum     size of query parameters in URLs is generally limited by the maximum request header size, the     net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many     unique query parameters can cause excessive memory consumption.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected grafana package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305966">https://www.tenable.com/plugins/nessus/305966</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1060a / 20.1070a Security Update: grafana (UTSA-2026-007099)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305965</link>
            <guid>https://www.tenable.com/plugins/nessus/305965</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305965 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007099 advisory.<br /></span><span><br /></span><span>    tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0     sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader     to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a     small compressed input can result in large allocations.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected grafana package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305965">https://www.tenable.com/plugins/nessus/305965</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dotnetnuke < 10.2.2 Same HostGUID for all new installs (GHSA-2rhw-gw3f-477j)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305964</link>
            <guid>https://www.tenable.com/plugins/nessus/305964</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305964 with High Severity</p>
      <h3>Synopsis</h3>
      <span>An ASP.NET application running on the remote web server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Dotnetnuke running on the remote web server is prior to 10.2.2.<br /></span><span>It is, therefore, affected by a vulnerability.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Dotnetnuke version 10.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305964">https://www.tenable.com/plugins/nessus/305964</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dotnetnuke < 10.2.2 Stored cross-site-scripting (XSS) via SVG upload (GHSA-ffq7-898w-9jc4)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305963</link>
            <guid>https://www.tenable.com/plugins/nessus/305963</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305963 with High Severity</p>
      <h3>Synopsis</h3>
      <span>An ASP.NET application running on the remote web server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Dotnetnuke running on the remote web server is prior to 10.2.2.<br /></span><span>It is, therefore, affected by a vulnerability.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Dotnetnuke version 10.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305963">https://www.tenable.com/plugins/nessus/305963</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dotnetnuke 6.0.x < 10.2.2 Force Friend Request Acceptance (GHSA-fpj4-9qhx-5m6m)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305962</link>
            <guid>https://www.tenable.com/plugins/nessus/305962</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305962 with High Severity</p>
      <h3>Synopsis</h3>
      <span>An ASP.NET application running on the remote web server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Dotnetnuke running on the remote web server is 6.0.x prior to 10.2.2. It is, therefore, affected by a vulnerability.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Dotnetnuke version 10.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305962">https://www.tenable.com/plugins/nessus/305962</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ruby Rack 3.x < 3.1.21 / 3.2.x < 3.2.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/305961</link>
            <guid>https://www.tenable.com/plugins/nessus/305961</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305961 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has an application installed that is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of the Rack Ruby library installed on the remote host is 3.0.0.beta1 or later but prior to 3.1.21, or is 3.2.0 or later but prior to 3.2.6. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters using repeated String#index     searches with String#slice! prefix deletion. For escape-heavy quoted values, this causes super-linear     processing leading to denial of service (CVE-2026-34827)<br /></span><span><br /></span><span>  - Rack::Request parses Host header using AUTHORITY regex accepting characters not permitted in     RFC-compliant hostnames (/, ?, #, @). Applications validating hosts with naive prefix/suffix checks     can be bypassed, leading to host header poisoning (CVE-2026-34835)<br /></span><span><br /></span><span>  - Rack::Utils.forwarded_values parses RFC 7239 Forwarded header by splitting on semicolons before     handling quoted-string values, allowing parameter smuggling (CVE-2026-32762)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Rack version 3.1.21 or 3.2.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305961">https://www.tenable.com/plugins/nessus/305961</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ruby Rack 3.2.x < 3.2.6 Header Injection Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nessus/305960</link>
            <guid>https://www.tenable.com/plugins/nessus/305960</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305960 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has an application installed that is affected by a header injection vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of the Rack Ruby library installed on the remote host is 3.2.0 or later but prior to 3.2.6.<br /></span><span>It is, therefore, affected by a header injection vulnerability:<br /></span><span><br /></span><span>  - Rack::Multipart::Parser unfolds folded multipart part headers incorrectly, preserving embedded CRLF     in parsed parameter values instead of removing folded line break. Applications reusing these values     in HTTP response headers may be vulnerable to header injection or response splitting. (CVE-2026-26962)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Rack version 3.2.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305960">https://www.tenable.com/plugins/nessus/305960</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ruby Rack < 2.2.23 / 3.0.x < 3.1.21 / 3.2 < 3.2.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/305959</link>
            <guid>https://www.tenable.com/plugins/nessus/305959</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305959 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has an application installed that is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of the Rack Ruby library installed on the remote host is prior to 2.2.23, prior to 3.1.21, or prior to 3.2.6.<br /></span><span>It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - Rack::Utils.get_byte_ranges parses HTTP Range header without limiting the number of individual byte ranges,     leading to denial of service (CVE-2026-34826)<br /></span><span><br /></span><span>  - Rack::Static uses simple string prefix check allowing unintended file disclosure (CVE-2026-34785)<br /></span><span><br /></span><span>  - Rack::Utils.select_best_encoding has quadratic time complexity with many wildcard Accept-Encoding     entries (CVE-2026-34230)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Rack version 2.2.23, 3.1.21, 3.2.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305959">https://www.tenable.com/plugins/nessus/305959</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : cockpit: Unauthenticated remote code execution due to SSH command-line argument injection (Critical) (RHSA-2026:7381)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305958</link>
            <guid>https://www.tenable.com/plugins/nessus/305958</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305958 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:7381 advisory.<br /></span><span><br /></span><span>    Cockpit enables users to administer GNU/Linux servers using a web browser. It     offers network configuration, log inspection, diagnostic reports, SELinux     troubleshooting, interactive command-line sessions, and more.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * cockpit: ws: be more explicit when handling hostnames on cli (CVE-2026-4631)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS     score, acknowledgments, and other related information, refer to the CVE page(s)     listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305958">https://www.tenable.com/plugins/nessus/305958</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : cockpit: Unauthenticated remote code execution due to SSH command-line argument injection (Critical) (RHSA-2026:7382)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305957</link>
            <guid>https://www.tenable.com/plugins/nessus/305957</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305957 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:7382 advisory.<br /></span><span><br /></span><span>    Cockpit enables users to administer GNU/Linux servers using a web browser. It     offers network configuration, log inspection, diagnostic reports, SELinux     troubleshooting, interactive command-line sessions, and more.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * cockpit: ws: be more explicit when handling hostnames on cli (CVE-2026-4631)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS     score, acknowledgments, and other related information, refer to the CVE page(s)     listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305957">https://www.tenable.com/plugins/nessus/305957</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : cockpit: Unauthenticated remote code execution due to SSH command-line argument injection (Critical) (RHSA-2026:7384)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305956</link>
            <guid>https://www.tenable.com/plugins/nessus/305956</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305956 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:7384 advisory.<br /></span><span><br /></span><span>    Cockpit enables users to administer GNU/Linux servers using a web browser. It     offers network configuration, log inspection, diagnostic reports, SELinux     troubleshooting, interactive command-line sessions, and more.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * cockpit: ws: be more explicit when handling hostnames on cli (CVE-2026-4631)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS     score, acknowledgments, and other related information, refer to the CVE page(s)     listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305956">https://www.tenable.com/plugins/nessus/305956</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache ActiveMQ < 5.19.4 / 6.x < 6.2.3 Improper Input Validation Code Injection]]></title>
            <link>https://www.tenable.com/plugins/nessus/305955</link>
            <guid>https://www.tenable.com/plugins/nessus/305955</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305955 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is running a web application that is affected by a code injection vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Apache ActiveMQ running on the remote host is prior to 5.19.4 or 6.x prior to 6.2.3. It is, therefore, affected by an improper input validation and code injection vulnerability:<br /></span><span><br /></span><span>  - ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ with a default access policy that permits     exec operations on ActiveMQ MBeans. An authenticated attacker can exploit specific broker operations with a crafted     discovery URI that manipulates the VM transport's brokerConfig parameter to load a remote Spring XML context. Since     Spring instantiates singleton beans before validation occurs, arbitrary code execution can occur on the broker's     JVM through bean factory methods such as Runtime.exec(). (CVE-2026-34197)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache ActiveMQ version 5.19.4, 6.2.3, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305955">https://www.tenable.com/plugins/nessus/305955</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache ActiveMQ < 5.19.3 / 5.19.4, 6.x < 6.2.2 / 6.2.3 Classpath Path Traversal]]></title>
            <link>https://www.tenable.com/plugins/nessus/305954</link>
            <guid>https://www.tenable.com/plugins/nessus/305954</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305954 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is running a web application that is affected by a path traversal vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Apache ActiveMQ running on the remote host is prior to 5.19.3 / 5.19.4 or 6.x prior to 6.2.2 / 6.2.3.<br /></span><span>It is, therefore, affected by an improper validation and restriction of classpath path name vulnerability:<br /></span><span><br /></span><span>  - An authenticated user could exploit path concatenation to traverse the classpath in two specific contexts: when     creating a Stomp consumer and when browsing messages via the Web console. This vulnerability enables classpath path     resource loading that could potentially be combined with other attacks for exploitation. (CVE-2026-33227)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache ActiveMQ version 5.19.3 / 5.19.4, 6.2.2 / 6.2.3, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305954">https://www.tenable.com/plugins/nessus/305954</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Logstash Installed (Linux)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305953</link>
            <guid>https://www.tenable.com/plugins/nessus/305953</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305953 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Logstash is installed on the remote Linux host.<br /></span>
      <h3>Description</h3>
      <span>Logstash, a data collection engine by Elastic, is installed on the remote Linux host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305953">https://www.tenable.com/plugins/nessus/305953</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Logstash Installed (macOS)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305952</link>
            <guid>https://www.tenable.com/plugins/nessus/305952</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305952 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Logstash is installed on the remote macOS host.<br /></span>
      <h3>Description</h3>
      <span>Logstash, a data collection engine by Elastic, is installed on the remote macOS host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305952">https://www.tenable.com/plugins/nessus/305952</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Logstash 8.x < 8.19.14 / 9.x < 9.2.8 / 9.3.x < 9.3.3 Path Traversal (ESA-2026-29)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305951</link>
            <guid>https://www.tenable.com/plugins/nessus/305951</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305951 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is affected by a path traversal vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Logstash installed on the remote host is 8.x prior to 8.19.14, 9.x prior to 9.2.8, or 9.3.x prior to 9.3.3. It is, therefore, affected by a path traversal vulnerability:<br /></span><span><br /></span><span>  - The archive extraction utilities used by Logstash do not properly validate file paths within compressed archives.<br /></span><span>    An attacker who can serve a specially crafted archive to Logstash through a compromised or attacker-controlled     update endpoint can write arbitrary files to the host filesystem with the privileges of the Logstash process. In     certain configurations where automatic pipeline reloading is enabled, this can be escalated to remote code     execution. (CVE-2026-33466)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Logstash version 8.19.14, 9.2.8, 9.3.3, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305951">https://www.tenable.com/plugins/nessus/305951</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 10 : freerdp (ALSA-2026:6799)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305950</link>
            <guid>https://www.tenable.com/plugins/nessus/305950</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305950 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALSA-2026:6799 advisory.<br /></span><span><br /></span><span>    * freerdp: FreeRDP heap-use-after-free (CVE-2026-22856)<br /></span><span>      * freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22854)<br /></span><span>      * freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22852)<br /></span><span>      * freerdp: FreeRDP: Denial of Service via FastGlyph parsing buffer overflow (CVE-2026-23732)<br /></span><span>      * freerdp: FreeRDP: Denial of Service via use-after-free in AUDIN format renegotiation (CVE-2026-24676)<br /></span><span>      * freerdp: FreeRDP has a heap-use-after-free in video_timer (CVE-2026-24491)<br /></span><span>      * freerdp: FreeRDP has a NULL Pointer Dereference in rdp_write_logon_info_v2() (CVE-2026-23948)<br /></span><span>      * freerdp: FreeRDP has a Heap-use-after-free in play_thread (CVE-2026-24684)<br /></span><span>      * freerdp: FreeRDP has a heap-use-after-free in urb_bulk_transfer_cb (CVE-2026-24681)<br /></span><span>      * freerdp: FreeRDP has a Heap-buffer-overflow in audio_formats_free (CVE-2026-24682)<br /></span><span>      * freerdp: FreeRDP has a heap-use-after-free in ainput_send_input_event (CVE-2026-24683)<br /></span><span>      * freerdp: FreeRDP has a heap-buffer-overflow in urb_select_interface (CVE-2026-24679)<br /></span><span>      * freerdp: FreeRDP has a Heap-use-after-free in urb_select_interface (CVE-2026-24675)<br /></span><span>      * freerdp: FreeRDP: Arbitrary code execution via crafted Remote Desktop Protocol (RDP) server messages     (CVE-2026-31806)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305950">https://www.tenable.com/plugins/nessus/305950</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 9 : nginx:1.24 (ALSA-2026:6923)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305949</link>
            <guid>https://www.tenable.com/plugins/nessus/305949</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305949 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALSA-2026:6923 advisory.<br /></span><span><br /></span><span>    * nginx: NGINX: Denial of Service or Code Execution via specially crafted MP4 files (CVE-2026-32647)<br /></span><span>      * NGINX: NGINX: Denial of Service or file modification via buffer overflow in ngx_http_dav_module     (CVE-2026-27654)<br /></span><span>      * NGINX: NGINX: Denial of Service due to memory corruption via crafted MP4 file (CVE-2026-27784)<br /></span><span>      * NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled     (CVE-2026-27651)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305949">https://www.tenable.com/plugins/nessus/305949</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 9 : python3.9 (ALSA-2026:6766)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305948</link>
            <guid>https://www.tenable.com/plugins/nessus/305948</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305948 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 9 host has packages installed that are affected by a vulnerability as referenced in the ALSA-2026:6766 advisory.<br /></span><span><br /></span><span>    * python: Python: Command-line option injection in webbrowser.open() via crafted URLs (CVE-2026-4519)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305948">https://www.tenable.com/plugins/nessus/305948</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 9 : openssh (ALSA-2026:6462)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305947</link>
            <guid>https://www.tenable.com/plugins/nessus/305947</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305947 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 9 host has packages installed that are affected by a vulnerability as referenced in the ALSA-2026:6462 advisory.<br /></span><span><br /></span><span>    * openssh: OpenSSH GSSAPI: Information disclosure or denial of service due to uninitialized variables     (CVE-2026-3497)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305947">https://www.tenable.com/plugins/nessus/305947</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 10 : fontforge (ALSA-2026:6631)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305946</link>
            <guid>https://www.tenable.com/plugins/nessus/305946</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305946 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 10 host has a package installed that is affected by a vulnerability as referenced in the ALSA-2026:6631 advisory.<br /></span><span><br /></span><span>    * fontforge: FontForge: Remote Code Execution via malicious SFD file parsing (CVE-2025-15270)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected fontforge package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305946">https://www.tenable.com/plugins/nessus/305946</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 10 : openssh (ALSA-2026:6463)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305945</link>
            <guid>https://www.tenable.com/plugins/nessus/305945</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305945 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 10 host has packages installed that are affected by a vulnerability as referenced in the ALSA-2026:6463 advisory.<br /></span><span><br /></span><span>    * openssh: OpenSSH GSSAPI: Information disclosure or denial of service due to uninitialized variables     (CVE-2026-3497)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305945">https://www.tenable.com/plugins/nessus/305945</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 10 : nodejs22 (ALSA-2026:7080)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305944</link>
            <guid>https://www.tenable.com/plugins/nessus/305944</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305944 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALSA-2026:7080 advisory.<br /></span><span><br /></span><span>    * brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)<br /></span><span>      * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)<br /></span><span>      * minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions     (CVE-2026-27904)<br /></span><span>      * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate     decompression (CVE-2026-1526)<br /></span><span>      * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter     (CVE-2026-2229)<br /></span><span>      * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers     (CVE-2026-1525)<br /></span><span>      * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)<br /></span><span>      * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination     (CVE-2026-27135)<br /></span><span>      * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305944">https://www.tenable.com/plugins/nessus/305944</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 10 : libtiff (ALSA-2026:7081)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305943</link>
            <guid>https://www.tenable.com/plugins/nessus/305943</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305943 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 10 host has packages installed that are affected by a vulnerability as referenced in the ALSA-2026:7081 advisory.<br /></span><span><br /></span><span>    * libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service (CVE-2023-52356)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected libtiff, libtiff-devel and / or libtiff-tools packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305943">https://www.tenable.com/plugins/nessus/305943</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 9 : fontforge (ALSA-2026:6628)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305942</link>
            <guid>https://www.tenable.com/plugins/nessus/305942</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305942 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 9 host has a package installed that is affected by a vulnerability as referenced in the ALSA-2026:6628 advisory.<br /></span><span><br /></span><span>    * fontforge: FontForge: Remote Code Execution via malicious SFD file parsing (CVE-2025-15270)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected fontforge package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305942">https://www.tenable.com/plugins/nessus/305942</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 10 : nginx (ALSA-2026:6906)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305941</link>
            <guid>https://www.tenable.com/plugins/nessus/305941</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305941 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the ALSA-2026:6906 advisory.<br /></span><span><br /></span><span>    * nginx: NGINX: Denial of Service or Code Execution via specially crafted MP4 files (CVE-2026-32647)<br /></span><span>      * NGINX: NGINX: Denial of Service or file modification via buffer overflow in ngx_http_dav_module     (CVE-2026-27654)<br /></span><span>      * NGINX: NGINX: Denial of Service due to memory corruption via crafted MP4 file (CVE-2026-27784)<br /></span><span>      * NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled     (CVE-2026-27651)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305941">https://www.tenable.com/plugins/nessus/305941</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SonicWall SMA 1000 Series <= 12.4.3-03245 / 12.5.x <= 12.5.0-02283 Multiple Vulnerabilities (SNWLID-2026-0003)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305940</link>
            <guid>https://www.tenable.com/plugins/nessus/305940</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305940 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote device is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote host is a SonicWall SMA 1000 Series device that is affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - A privilege escalation vulnerability due to improper neutralization of special elements used in an SQL     command. A remote authenticated attacker with read-only administrator privileges can escalate privileges     to primary administrator. (CVE-2026-4112)<br /></span><span><br /></span><span>  - An observable response discrepancy vulnerability that allows a remote attacker to enumerate SSL VPN user     credentials. (CVE-2026-4113)<br /></span><span><br /></span><span>  - An improper handling of Unicode encoding vulnerability that allows a remote authenticated SSLVPN admin to     bypass AMC TOTP authentication. (CVE-2026-4114)<br /></span><span><br /></span><span>  - An improper handling of Unicode encoding vulnerability that allows a remote authenticated SSLVPN user to     bypass Workplace/Connect Tunnel TOTP authentication. (CVE-2026-4116)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to SonicWall SMA 1000 Series version 12.4.3-03387 or 12.5.0-02624 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305940">https://www.tenable.com/plugins/nessus/305940</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Keycloak < 26.4.11 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/305939</link>
            <guid>https://www.tenable.com/plugins/nessus/305939</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305939 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>Keycloak versions installed prior to 26.4.11 are affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - A flaw was identified in the Account REST API of Keycloak that allows a user authenticated   at a lower security level to perform sensitive actions intended only for higher-assurance   sessions. Specifically, an attacker who has already obtained a victim's password can delete   the victim's registered MFA/OTP credential without first proving possession of that factor.<br /></span><span>  The attacker can then register their own MFA device, effectively taking full control of the   account. This weakness undermines the intended protection provided by multi-factor   authentication. (CVE-2026-3429)<br /></span><span><br /></span><span>  - A flaw was found in Keycloak. An authorization bypass vulnerability in the Keycloak Admin   API allows any authenticated user, even those without administrative privileges, to   enumerate the organization memberships of other users. This information disclosure occurs   if the attacker knows the victim's unique identifier (UUID) and the Organizations feature   is enabled. (CVE-2026-2366)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Keycloak to 26.4.11 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305939">https://www.tenable.com/plugins/nessus/305939</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kibana 8.x < 8.19.14 / 9.0.x < 9.2.8 / 9.3.x < 9.3.3 Multiple Vulnerabilities (ESA-2026-21 / ESA-2026-24 / ESA-2026-25 / ESA-2026-26)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305938</link>
            <guid>https://www.tenable.com/plugins/nessus/305938</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305938 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Kibana installed on the remote host is prior to 8.19.14, 9.2.8, or 9.3.3. It is, therefore, affected by multiple vulnerabilities as referenced in the ESA-2026-21, ESA-2026-24, ESA-2026-25, and ESA-2026-26 advisories.<br /></span><span><br /></span><span>  - An incorrect authorization vulnerability in Kibana Fleet allows a user with limited Fleet privileges to exploit an     internal API endpoint to retrieve sensitive configuration data, including private keys and authentication tokens,     that should only be accessible to users with higher-level settings privileges. The endpoint composes its response     by fetching full configuration objects and returning them directly, bypassing the authorization checks enforced by     the dedicated settings APIs. (CVE-2026-33461)<br /></span><span><br /></span><span>  - A user with Fleet agent management privileges in one Kibana space can retrieve Fleet Server policy details from     other spaces through an internal enrollment endpoint. This endpoint improperly uses an unscoped internal client,     bypassing space-scoped access controls and resulting in cross-space information disclosure. (CVE-2026-33460)<br /></span><span><br /></span><span>  - In Kibana's Fleet plugin debug route handlers, an authenticated user with Fleet sub-feature privileges can read     index data beyond their direct Elasticsearch RBAC scope, allowing unauthorized data access across the deployment.<br /></span><span>    (CVE-2026-4498)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Kibana version 8.19.14, 9.2.8, 9.3.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305938">https://www.tenable.com/plugins/nessus/305938</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007078)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305937</link>
            <guid>https://www.tenable.com/plugins/nessus/305937</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305937 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007078 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, domain=path authorization is checked before final file open/use. A     symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is     fixed in 7.1.2-16 and 6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305937">https://www.tenable.com/plugins/nessus/305937</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: freeipmi (UTSA-2026-007097)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305936</link>
            <guid>https://www.tenable.com/plugins/nessus/305936</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305936 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007097 advisory.<br /></span><span><br /></span><span>    ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent     Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It     is implemented by a large number of hardware manufacturers to support system management. It is most     commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI)     and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI     OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the     ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were     found to have exploitable buffer overflows on response messages. They are: ipmi-oem dell get-last-post-     code - get the last POST code and string describing the error on some Dell servers, ipmi-oem supermicro     extra-firmware-info - get extra firmware info on Supermicro servers, and ipmi-oem wistron read-     proprietary-string - read a proprietary string on Wistron servers.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected freeipmi package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305936">https://www.tenable.com/plugins/nessus/305936</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007079)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305935</link>
            <guid>https://www.tenable.com/plugins/nessus/305935</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305935 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007079 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow vulnerability exists in the MNG encoder. There is     a bounds checks missing that could corrupting the stack with attacker-controlled data. This vulnerability     is fixed in 7.1.2-16 and 6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305935">https://www.tenable.com/plugins/nessus/305935</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007089)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305934</link>
            <guid>https://www.tenable.com/plugins/nessus/305934</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305934 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007089 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization     resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305934">https://www.tenable.com/plugins/nessus/305934</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007075)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305933</link>
            <guid>https://www.tenable.com/plugins/nessus/305933</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305933 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007075 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can     cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap     write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305933">https://www.tenable.com/plugins/nessus/305933</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007087)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305932</link>
            <guid>https://www.tenable.com/plugins/nessus/305932</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305932 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007087 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when     encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305932">https://www.tenable.com/plugins/nessus/305932</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: unbound (UTSA-2026-007095)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305931</link>
            <guid>https://www.tenable.com/plugins/nessus/305931</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305931 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007095 advisory.<br /></span><span><br /></span><span>    NLnet Labs Unbound up to and including version 1.24.1 is vulnerable to possible domain hijack attacks.<br /></span><span>    Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick     resolvers to update their delegation information for the zone. Usually these RRSets are used to update the     resolver's knowledge of the zone's name servers. A malicious actor can exploit the possible poisonous     effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be     done for example by trying to spoof a packet or fragmentation attacks. Unbound would then proceed to     update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for     the delegation point. Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their     respective address records) from replies mitigating the possible poison effect. Unbound 1.24.2 includes an     additional fix that scrubs unsolicited NS RRSets (and their respective address records) from YXDOMAIN and     non-referral nodata replies, further mitigating the possible poison effect.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected unbound package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305931">https://www.tenable.com/plugins/nessus/305931</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: binutils (UTSA-2026-007090)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305930</link>
            <guid>https://www.tenable.com/plugins/nessus/305930</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305930 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007090 advisory.<br /></span><span><br /></span><span>    A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by     this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to     out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed     to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is     recommended to apply a patch to fix this issue.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected binutils package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305930">https://www.tenable.com/plugins/nessus/305930</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: openldap (UTSA-2026-007094)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305929</link>
            <guid>https://www.tenable.com/plugins/nessus/305929</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305929 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007094 advisory.<br /></span><span><br /></span><span>    OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit     8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed     input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-     bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a     limited denial-of-service condition.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected openldap package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305929">https://www.tenable.com/plugins/nessus/305929</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007074)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305928</link>
            <guid>https://www.tenable.com/plugins/nessus/305928</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305928 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007074 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG     decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305928">https://www.tenable.com/plugins/nessus/305928</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007083)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305927</link>
            <guid>https://www.tenable.com/plugins/nessus/305927</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305927 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007083 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows     an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in     7.1.2-16 and 6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305927">https://www.tenable.com/plugins/nessus/305927</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: python-ldap (UTSA-2026-007091)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305926</link>
            <guid>https://www.tenable.com/plugins/nessus/305926</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305926 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007091 advisory.<br /></span><span><br /></span><span>    python-ldap is a lightweight directory access protocol (LDAP) client API for Python. In versions prior to     3.4.5, the sanitization method `ldap.filter.escape_filter_chars` can be tricked to skip escaping of     special characters when a crafted `list` or `dict` is supplied as the `assertion_value` parameter, and the     non-default `escape_mode=1` is configured. The method `ldap.filter.escape_filter_chars` supports 3     different escaping modes. `escape_mode=0` (default) and `escape_mode=2` happen to raise exceptions when a     `list` or `dict` object is supplied as the `assertion_value` parameter. However, `escape_mode=1` computes     without performing adequate logic to ensure a fully escaped return value. If an application relies on the     vulnerable method in the `python-ldap` library to escape untrusted user input, an attacker might be able     to abuse the vulnerability to launch ldap injection attacks which could potentially disclose or manipulate     ldap data meant to be inaccessible to them. Version 3.4.5 fixes the issue by adding a type check at the     start of the `ldap.filter.escape_filter_chars` method to raise an exception when the supplied     `assertion_value` parameter is not of type `str`.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected python-ldap package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305926">https://www.tenable.com/plugins/nessus/305926</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007084)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305925</link>
            <guid>https://www.tenable.com/plugins/nessus/305925</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305925 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007084 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a     cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has     been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305925">https://www.tenable.com/plugins/nessus/305925</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007086)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305924</link>
            <guid>https://www.tenable.com/plugins/nessus/305924</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305924 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007086 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an     undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305924">https://www.tenable.com/plugins/nessus/305924</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007076)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305923</link>
            <guid>https://www.tenable.com/plugins/nessus/305923</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305923 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007076 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing     functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via     memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and     6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305923">https://www.tenable.com/plugins/nessus/305923</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: python-ldap (UTSA-2026-007085)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305922</link>
            <guid>https://www.tenable.com/plugins/nessus/305922</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305922 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007085 advisory.<br /></span><span><br /></span><span>    python-ldap is a lightweight directory access protocol (LDAP) client API for Python. In versions prior to     3.4.5, ldap.dn.escape_dn_chars() escapes \x00 incorrectly by emitting a backslash followed by a literal     NUL byte instead of the RFC-4514 hex form \00. Any application that uses this helper to construct DNs from     untrusted input can be made to consistently fail before a request is sent to the LDAP server (e.g., AD),     resulting in a client-side denial of service. Version 3.4.5 contains a patch for the issue.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected python-ldap package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305922">https://www.tenable.com/plugins/nessus/305922</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007082)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305921</link>
            <guid>https://www.tenable.com/plugins/nessus/305921</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305921 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007082 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image     it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and     6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305921">https://www.tenable.com/plugins/nessus/305921</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: python-xmltodict (UTSA-2026-007093)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305920</link>
            <guid>https://www.tenable.com/plugins/nessus/305920</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305920 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007093 advisory.<br /></span><span><br /></span><span>    XML Injection vulnerability in xmltodict allows Input Data Manipulation.<br /></span><span>    This issue affects xmltodict: from 0.14.2 before 0.15.1.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected python-xmltodict package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305920">https://www.tenable.com/plugins/nessus/305920</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: unbound (UTSA-2026-007096)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305919</link>
            <guid>https://www.tenable.com/plugins/nessus/305919</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305919 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007096 advisory.<br /></span><span><br /></span><span>    A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching     resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS     support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream     name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-     always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to     accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox     attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous     replies.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected unbound package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305919">https://www.tenable.com/plugins/nessus/305919</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: binutils (UTSA-2026-007081)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305918</link>
            <guid>https://www.tenable.com/plugins/nessus/305918</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305918 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007081 advisory.<br /></span><span><br /></span><span>    A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability     is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer     overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be     used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to     fix this issue.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected binutils package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305918">https://www.tenable.com/plugins/nessus/305918</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: vsftpd (UTSA-2026-007077)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305917</link>
            <guid>https://www.tenable.com/plugins/nessus/305917</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305917 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007077 advisory.<br /></span><span><br /></span><span>    A flaw was found in vsftpd. This vulnerability allows a denial of service (DoS) via an integer overflow in     the ls command parameter parsing, triggered by a remote, authenticated attacker sending a crafted STAT     command with a specific byte sequence.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected vsftpd package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305917">https://www.tenable.com/plugins/nessus/305917</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007080)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305916</link>
            <guid>https://www.tenable.com/plugins/nessus/305916</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305916 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007080 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the     WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of     bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305916">https://www.tenable.com/plugins/nessus/305916</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: binutils (UTSA-2026-007092)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305915</link>
            <guid>https://www.tenable.com/plugins/nessus/305915</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305915 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007092 advisory.<br /></span><span><br /></span><span>    A vulnerability was found in GNU Binutils 2.44 and classified as problematic. This issue affects the     function process_debug_info of the file binutils/dwarf.c of the component DWARF Section Handler. The     manipulation leads to memory leak. Attacking locally is a requirement. The identifier of the patch is     e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4. It is recommended to apply a patch to fix this issue.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected binutils package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305915">https://www.tenable.com/plugins/nessus/305915</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: ImageMagick (UTSA-2026-007088)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305914</link>
            <guid>https://www.tenable.com/plugins/nessus/305914</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305914 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-007088 advisory.<br /></span><span><br /></span><span>    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or     write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected ImageMagick package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305914">https://www.tenable.com/plugins/nessus/305914</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira Service Management Data Center and Server 5.17.2 < 10.3.17 / 10.4.x < 11.3.0 (JSDSERVER-16515)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305913</link>
            <guid>https://www.tenable.com/plugins/nessus/305913</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305913 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Atlassian Jira Service Management Data Center and Server (Jira Service Desk) host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of Atlassian Jira Service Management Data Center and Server (Jira Service Desk) running on the remote host is affected by a vulnerability as referenced in the JSDSERVER-16515 advisory.<br /></span><span><br /></span><span>  - Versions of the package ua-parser-js from 0.7.30 and before 0.7.33, from 0.8.1 and before 1.0.33 are     vulnerable to Regular Expression Denial of Service (ReDoS) via the trim() function. (CVE-2022-25927)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira Service Management Data Center and Server version 10.3.17, 11.3.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305913">https://www.tenable.com/plugins/nessus/305913</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira Service Management Data Center and Server 5.15.2 < 10.3.18 / 10.4.x < 11.3.3 (JSDSERVER-16529)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305912</link>
            <guid>https://www.tenable.com/plugins/nessus/305912</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305912 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Atlassian Jira Service Management Data Center and Server (Jira Service Desk) host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of Atlassian Jira Service Management Data Center and Server (Jira Service Desk) running on the remote host is affected by a vulnerability as referenced in the JSDSERVER-16529 advisory.<br /></span><span><br /></span><span>  - node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check     for hardlink entries uses different path resolution semantics than the actual hardlink creation logic.<br /></span><span>    This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections     and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix     for the issue. (CVE-2026-24842)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira Service Management Data Center and Server version 10.3.18, 11.3.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305912">https://www.tenable.com/plugins/nessus/305912</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-29129]]></title>
            <link>https://www.tenable.com/plugins/nessus/305911</link>
            <guid>https://www.tenable.com/plugins/nessus/305911</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305911 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Configured cipher preference order not preserved vulnerability in Apache Tomcat. This issue affects Apache     Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115. Users     are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue. (CVE-2026-29129)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305911">https://www.tenable.com/plugins/nessus/305911</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5460]]></title>
            <link>https://www.tenable.com/plugins/nessus/305910</link>
            <guid>https://www.tenable.com/plugins/nessus/305910</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305910 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare     processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner     function TLSX_KeyShare_ProcessPqcClient_ex() frees a KyberKey object upon encountering an error. The     caller then invokes TLSX_KeyShare_FreeAll(), which attempts to call ForceZero() on the already-freed     KyberKey, resulting in writes of zero bytes over freed heap memory. (CVE-2026-5460)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305910">https://www.tenable.com/plugins/nessus/305910</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5507]]></title>
            <link>https://www.tenable.com/plugins/nessus/305909</link>
            <guid>https://www.tenable.com/plugins/nessus/305909</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305909 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - When restoring a session from cache, a pointer from the serialized session data is used in a free     operation without validation. An attacker who can poison the session cache could trigger an arbitrary     free. Exploitation requires the ability to inject a crafted session into the cache and for the application     to call specific session restore APIs. (CVE-2026-5507)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305909">https://www.tenable.com/plugins/nessus/305909</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5263]]></title>
            <link>https://www.tenable.com/plugins/nessus/305908</link>
            <guid>https://www.tenable.com/plugins/nessus/305908</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305908 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificate chain     verification in wolfcrypt/src/asn.c. A compromised or malicious sub-CA could issue leaf certificates with     URI SAN entries that violate the nameConstraints of the issuing CA, and wolfSSL would accept them as     valid. (CVE-2026-5263)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305908">https://www.tenable.com/plugins/nessus/305908</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-25854]]></title>
            <link>https://www.tenable.com/plugins/nessus/305907</link>
            <guid>https://www.tenable.com/plugins/nessus/305907</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305907 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the     LoadBalancerDrainingValve. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from     10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100. Other, unsupported     versions may also be affected Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116,     which fix the issue. (CVE-2026-25854)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305907">https://www.tenable.com/plugins/nessus/305907</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5501]]></title>
            <link>https://www.tenable.com/plugins/nessus/305906</link>
            <guid>https://www.tenable.com/plugins/nessus/305906</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305906 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which the     leaf's signature is not checked, if the attacker supplies an untrusted intermediate with Basic Constraints     `CA:FALSE` that is legitimately signed by a trusted root. An attacker who obtains any leaf certificate     from a trusted CA (e.g. a free DV cert from Let's Encrypt) can forge a certificate for any subject name     with any public key and arbitrary signature bytes, and the function returns `WOLFSSL_SUCCESS` /     `X509_V_OK`. The native wolfSSL TLS handshake path (`ProcessPeerCerts`) is not susceptible and the issue     is limited to applications using the OpenSSL compatibility API directly, which would include integrations     of wolfSSL into nginx and haproxy. (CVE-2026-5501)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305906">https://www.tenable.com/plugins/nessus/305906</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5295]]></title>
            <link>https://www.tenable.com/plugins/nessus/305905</link>
            <guid>https://www.tenable.com/plugins/nessus/305905</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305905 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A stack buffer overflow exists in wolfSSL's PKCS7 implementation in the wc_PKCS7_DecryptOri() function in     wolfcrypt/src/pkcs7.c. When processing a CMS EnvelopedData message containing an OtherRecipientInfo (ORI)     recipient, the function copies an ASN.1-parsed OID into a fixed 32-byte stack buffer (oriOID[MAX_OID_SZ])     via XMEMCPY without first validating that the parsed OID length does not exceed MAX_OID_SZ. A crafted CMS     EnvelopedData message with an ORI recipient containing an OID longer than 32 bytes triggers a stack buffer     overflow. Exploitation requires the library to be built with --enable-pkcs7 (disabled by default) and the     application to have registered an ORI decrypt callback via wc_PKCS7_SetOriDecryptCb(). (CVE-2026-5295)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305905">https://www.tenable.com/plugins/nessus/305905</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-29146]]></title>
            <link>https://www.tenable.com/plugins/nessus/305904</link>
            <guid>https://www.tenable.com/plugins/nessus/305904</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305904 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration. This issue     affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through     9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109. Users are recommended to upgrade to     version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue. (CVE-2026-29146)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305904">https://www.tenable.com/plugins/nessus/305904</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5477]]></title>
            <link>https://www.tenable.com/plugins/nessus/305903</link>
            <guid>https://www.tenable.com/plugins/nessus/305903</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305903 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge CMAC     tags. The function wc_CmacUpdate used the guard `if (cmac->totalSz != 0)` to skip XOR-chaining on the     first block (where digest is all-zeros and the XOR is a no-op). However, totalSz is word32 and wraps to     zero after 2^28 block flushes (4 GiB), causing the guard to erroneously discard the live CBC-MAC chain     state. Any two messages sharing a common suffix beyond the 4 GiB mark then produce identical CMAC tags,     enabling a zero-work prefix-substitution forgery. The fix removes the guard, making the XOR unconditional;<br /></span><span>    the no-op property on the first block is preserved because digest is zero-initialized by wc_InitCmac_ex.<br /></span><span>    (CVE-2026-5477)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305903">https://www.tenable.com/plugins/nessus/305903</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5194]]></title>
            <link>https://www.tenable.com/plugins/nessus/305902</link>
            <guid>https://www.tenable.com/plugins/nessus/305902</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305902 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA     certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature     verification functions. This could lead to reduced security of ECDSA certificate-based authentication if     the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also     enabled. (CVE-2026-5194)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305902">https://www.tenable.com/plugins/nessus/305902</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34487]]></title>
            <link>https://www.tenable.com/plugins/nessus/305901</link>
            <guid>https://www.tenable.com/plugins/nessus/305901</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305901 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering     component of Apache Tomcat exposed the Kubernetes bearer token. This issue affects Apache Tomcat: from     11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116. Users are     recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue. (CVE-2026-34487)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305901">https://www.tenable.com/plugins/nessus/305901</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5772]]></title>
            <link>https://www.tenable.com/plugins/nessus/305900</link>
            <guid>https://www.tenable.com/plugins/nessus/305900</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305900 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A 1-byte stack buffer over-read was identified in the MatchDomainName function (src/internal.c) during     wildcard hostname validation when the LEFT_MOST_WILDCARD_ONLY flag is active. If a wildcard * exhausts the     entire hostname string, the function reads one byte past the buffer without a bounds check, which could     cause a crash. (CVE-2026-5772)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305900">https://www.tenable.com/plugins/nessus/305900</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5392]]></title>
            <link>https://www.tenable.com/plugins/nessus/305899</link>
            <guid>https://www.tenable.com/plugins/nessus/305899</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305899 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Heap out-of-bounds read in PKCS7 parsing. A crafted PKCS7 message can trigger an OOB read on the heap. The     missing bounds check is in the indefinite-length end-of-content verification loop in     PKCS7_VerifySignedData(). (CVE-2026-5392)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305899">https://www.tenable.com/plugins/nessus/305899</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5504]]></title>
            <link>https://www.tenable.com/plugins/nessus/305898</link>
            <guid>https://www.tenable.com/plugins/nessus/305898</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305898 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A padding oracle exists in wolfSSL's PKCS7 CBC decryption that could allow an attacker to recover     plaintext through repeated decryption queries with modified ciphertext. In previous versions of wolfSSL     the interior padding bytes are not validated. (CVE-2026-5504)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305898">https://www.tenable.com/plugins/nessus/305898</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5479]]></title>
            <link>https://www.tenable.com/plugins/nessus/305897</link>
            <guid>https://www.tenable.com/plugins/nessus/305897</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305897 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In wolfSSL's EVP layer, the ChaCha20-Poly1305 AEAD decryption path in wolfSSL_EVP_CipherFinal (and related     EVP cipher finalization functions) fails to verify the authentication tag before returning plaintext to     the caller. When an application uses the EVP API to perform ChaCha20-Poly1305 decryption, the     implementation computes or accepts the tag but does not compare it against the expected value.<br /></span><span>    (CVE-2026-5479)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305897">https://www.tenable.com/plugins/nessus/305897</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5448]]></title>
            <link>https://www.tenable.com/plugins/nessus/305896</link>
            <guid>https://www.tenable.com/plugins/nessus/305896</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305896 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur     when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only     triggered when calling these two APIs directly from an application, and does not affect TLS or certificate     verify operations in wolfSSL. (CVE-2026-5448)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305896">https://www.tenable.com/plugins/nessus/305896</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5447]]></title>
            <link>https://www.tenable.com/plugins/nessus/305895</link>
            <guid>https://www.tenable.com/plugins/nessus/305895</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305895 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow     occurs when converting an X.509 certificate internally due to incorrect size handling of the     AuthorityKeyIdentifier extension. (CVE-2026-5447)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305895">https://www.tenable.com/plugins/nessus/305895</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5446]]></title>
            <link>https://www.tenable.com/plugins/nessus/305894</link>
            <guid>https://www.tenable.com/plugins/nessus/305894</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305894 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In wolfSSL, ARIA-GCM cipher suites used in TLS 1.2 and DTLS 1.2 reuse an identical 12-byte GCM nonce for     every application-data record. Because wc_AriaEncrypt is stateless and passes the caller-supplied IV     verbatim to the MagicCrypto SDK with no internal counter, and because the explicit IV is zero-initialized     at session setup and never incremented in non-FIPS builds. This vulnerability affects wolfSSL builds     configured with --enable-aria and the proprietary MagicCrypto SDK (a non-default, opt-in configuration     required for Korean regulatory deployments). AES-GCM is not affected because wc_AesGcmEncrypt_ex maintains     an internal invocation counter independently of the call-site guard. (CVE-2026-5446)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305894">https://www.tenable.com/plugins/nessus/305894</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-32990]]></title>
            <link>https://www.tenable.com/plugins/nessus/305893</link>
            <guid>https://www.tenable.com/plugins/nessus/305893</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305893 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614. This     issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113     through 9.0.115. Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the     issue. (CVE-2026-32990)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305893">https://www.tenable.com/plugins/nessus/305893</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-39304]]></title>
            <link>https://www.tenable.com/plugins/nessus/305892</link>
            <guid>https://www.tenable.com/plugins/nessus/305892</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305892 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker,     Apache ActiveMQ. ActiveMQ NIO SSL transports do not correctly handle TLSv1.3 handshake KeyUpdates     triggered by clients. This makes it possible for a client to rapidly trigger updates which causes the     broker to exhaust all its memory in the SSL engine leading to DoS. Note: TLS versions before TLSv1.3 (such     as TLSv1.2) are broken but are not vulnerable to OOM. Previous TLS versions require a full handshake     renegotiation which causes a connection to hang but not OOM. This is fixed as well. This issue affects     Apache ActiveMQ Client: before 5.19.4, from 6.0.0 before 6.2.4; Apache ActiveMQ Broker: before 5.19.4,     from 6.0.0 before 6.2.4; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.4. Users are recommended to     upgrade to version 6.2.4 or 5.19.5, which fixes the issue. (CVE-2026-39304)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305892">https://www.tenable.com/plugins/nessus/305892</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5500]]></title>
            <link>https://www.tenable.com/plugins/nessus/305891</link>
            <guid>https://www.tenable.com/plugins/nessus/305891</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305891 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag     length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field     from 16 bytes to 1 byte, reducing the tag check from 2 to 2. (CVE-2026-5500)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305891">https://www.tenable.com/plugins/nessus/305891</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5187]]></title>
            <link>https://www.tenable.com/plugins/nessus/305890</link>
            <guid>https://www.tenable.com/plugins/nessus/305890</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305890 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Two potential heap out-of-bounds write locations existed in DecodeObjectId() in wolfcrypt/src/asn.c.<br /></span><span>    First, a bounds check only validates one available slot before writing two OID arc values (out[0] and     out[1]), enabling a 2-byte out-of-bounds write when outSz equals 1. Second, multiple callers pass     sizeof(decOid) (64 bytes on 64-bit platforms) instead of the element count MAX_OID_SZ (32), causing the     function to accept crafted OIDs with 33 or more arcs that write past the end of the allocated buffer.<br /></span><span>    (CVE-2026-5187)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305890">https://www.tenable.com/plugins/nessus/305890</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34483]]></title>
            <link>https://www.tenable.com/plugins/nessus/305889</link>
            <guid>https://www.tenable.com/plugins/nessus/305889</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305889 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache     Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53,     from 9.0.40 through 9.0.116. Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 ,     which fix the issue. (CVE-2026-34483)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305889">https://www.tenable.com/plugins/nessus/305889</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5466]]></title>
            <link>https://www.tenable.com/plugins/nessus/305888</link>
            <guid>https://www.tenable.com/plugins/nessus/305888</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305888 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature     blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature     could verify against any message for any identity, using only publicly-known constants. (CVE-2026-5466)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305888">https://www.tenable.com/plugins/nessus/305888</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5264]]></title>
            <link>https://www.tenable.com/plugins/nessus/305887</link>
            <guid>https://www.tenable.com/plugins/nessus/305887</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305887 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK     message that triggers a heap buffer overflow. (CVE-2026-5264)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305887">https://www.tenable.com/plugins/nessus/305887</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5503]]></title>
            <link>https://www.tenable.com/plugins/nessus/305886</link>
            <guid>https://www.tenable.com/plugins/nessus/305886</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305886 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In TLSX_EchChangeSNI, the ctx->extensions branch set extensions unconditionally even when TLSX_Find     returned NULL. This caused TLSX_UseSNI to attach the attacker-controlled publicName to the shared     WOLFSSL_CTX when no inner SNI was configured. TLSX_EchRestoreSNI then failed to clean it up because its     removal was gated on serverNameX != NULL. The inner ClientHello was sized before the pollution but written     after it, causing TLSX_SNI_Write to memcpy 255 bytes past the allocation boundary. (CVE-2026-5503)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305886">https://www.tenable.com/plugins/nessus/305886</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-24880]]></title>
            <link>https://www.tenable.com/plugins/nessus/305885</link>
            <guid>https://www.tenable.com/plugins/nessus/305885</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305885 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache     Tomcat via invalid chunk extension. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from     10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through     7.0.109. Other, unsupported versions may also be affected. Users are recommended to upgrade to version     11.0.20, 10.1.52 or 9.0.116, which fix the issue. (CVE-2026-24880)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305885">https://www.tenable.com/plugins/nessus/305885</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-29145]]></title>
            <link>https://www.tenable.com/plugins/nessus/305884</link>
            <guid>https://www.tenable.com/plugins/nessus/305884</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305884 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled     vulnerability in Apache Tomcat, Apache Tomcat Native. This issue affects Apache Tomcat: from 11.0.0-M1     through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from     1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.<br /></span><span>    Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and     9.0.116, which fix the issue. (CVE-2026-29145)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305884">https://www.tenable.com/plugins/nessus/305884</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34486]]></title>
            <link>https://www.tenable.com/plugins/nessus/305883</link>
            <guid>https://www.tenable.com/plugins/nessus/305883</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305883 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to the fix for CVE-2026-29146     allowing the bypass of the EncryptInterceptor. This issue affects Apache Tomcat: 11.0.20, 10.1.53,     9.0.116. Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.<br /></span><span>    (CVE-2026-34486)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305883">https://www.tenable.com/plugins/nessus/305883</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-34500]]></title>
            <link>https://www.tenable.com/plugins/nessus/305882</link>
            <guid>https://www.tenable.com/plugins/nessus/305882</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305882 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM     is used in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22     through 10.1.53, from 9.0.92 through 9.0.116. Users are recommended to upgrade to version 11.0.21, 10.1.54     or 9.0.117, which fixes the issue. (CVE-2026-34500)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305882">https://www.tenable.com/plugins/nessus/305882</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5778]]></title>
            <link>https://www.tenable.com/plugins/nessus/305881</link>
            <guid>https://www.tenable.com/plugins/nessus/305881</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305881 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Integer underflow in wolfSSL packet sniffer <= 5.9.0 allows an attacker to cause a program crash in the     AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into     traffic inspected by ssl_DecodePacket. The underflow wraps a 16-bit length to a large value that is passed     to AEAD decryption routines, causing a large out-of-bounds read and crash. An unauthenticated attacker can     trigger this remotely via malformed TLS Application Data records. (CVE-2026-5778)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305881">https://www.tenable.com/plugins/nessus/305881</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5188]]></title>
            <link>https://www.tenable.com/plugins/nessus/305880</link>
            <guid>https://www.tenable.com/plugins/nessus/305880</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305880 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extension of     X.509 certificates. A malformed certificate can specify an entry length larger than the enclosing     sequence, causing the internal length counter to wrap during parsing. This results in incorrect handling     of certificate data. The issue is limited to configurations using the original ASN.1 parsing     implementation which is off by default. (CVE-2026-5188)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305880">https://www.tenable.com/plugins/nessus/305880</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-5393]]></title>
            <link>https://www.tenable.com/plugins/nessus/305879</link>
            <guid>https://www.tenable.com/plugins/nessus/305879</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305879 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Dual-Algorithm CertificateVerify out-of-bounds read. When processing a dual-algorithm CertificateVerify     message, an out-of-bounds read can occur on crafted input. This can only occur when --enable-experimental     and --enable-dual-alg-certs is used when building wolfSSL. (CVE-2026-5393)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305879">https://www.tenable.com/plugins/nessus/305879</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OCaml <= 4.14.3 Integer Overflow Information Disclosure (CVE-2026-34353)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305878</link>
            <guid>https://www.tenable.com/plugins/nessus/305878</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305878 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is affected by an information disclosure vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of OCaml installed on the remote host is prior to or equal to 4.14.3. It is, therefore, affected by an information disclosure vulnerability:<br /></span><span><br /></span><span>  - An integer overflow in Bigarray.reshape allows reading of arbitrary memory when     untrusted data is processed. (CVE-2026-34353)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>See vendor advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305878">https://www.tenable.com/plugins/nessus/305878</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OCaml Programming Language Installed (macOS)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305877</link>
            <guid>https://www.tenable.com/plugins/nessus/305877</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305877 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>OCaml is installed on the remote macOS host.<br /></span>
      <h3>Description</h3>
      <span>OCaml is installed on the remote macOS host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305877">https://www.tenable.com/plugins/nessus/305877</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OCaml Programming Language Installed (Linux)]]></title>
            <link>https://www.tenable.com/plugins/nessus/305876</link>
            <guid>https://www.tenable.com/plugins/nessus/305876</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305876 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>OCaml is installed on the remote Linux host.<br /></span>
      <h3>Description</h3>
      <span>OCaml is installed on the remote Linux host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305876">https://www.tenable.com/plugins/nessus/305876</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MariaDB 11.4.1 < 11.4.10 DoS]]></title>
            <link>https://www.tenable.com/plugins/nessus/305875</link>
            <guid>https://www.tenable.com/plugins/nessus/305875</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305875 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote database server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of MariaDB installed on the remote host is prior to 11.4.10. It is, therefore, affected by a vulnerability as referenced in the GHSA-4rj5-2227-9wgc advisory.<br /></span><span><br /></span><span>  - MariaDB server is a community developed fork of MySQL server. An authenticated user can crash MariaDB     versions 11.4 before 11.4.10 and 11.8 before 11.8.6 via a bug in JSON_SCHEMA_VALID() function. Under     certain conditions it might be possible to turn the crash into a remote code execution. These conditions     require tight control over memory layout which is generally only attainable in a lab environment. This     issue is fixed in MariaDB 11.4.10, MariaDB 11.8.6, and MariaDB 12.2.2. (CVE-2026-32710)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to MariaDB version 11.4.10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305875">https://www.tenable.com/plugins/nessus/305875</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MariaDB 11.8.1 < 11.8.6 DoS]]></title>
            <link>https://www.tenable.com/plugins/nessus/305874</link>
            <guid>https://www.tenable.com/plugins/nessus/305874</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305874 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote database server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of MariaDB installed on the remote host is prior to 11.8.6. It is, therefore, affected by a vulnerability as referenced in the GHSA-4rj5-2227-9wgc advisory.<br /></span><span><br /></span><span>  - MariaDB server is a community developed fork of MySQL server. An authenticated user can crash MariaDB     versions 11.4 before 11.4.10 and 11.8 before 11.8.6 via a bug in JSON_SCHEMA_VALID() function. Under     certain conditions it might be possible to turn the crash into a remote code execution. These conditions     require tight control over memory layout which is generally only attainable in a lab environment. This     issue is fixed in MariaDB 11.4.10, MariaDB 11.8.6, and MariaDB 12.2.2. (CVE-2026-32710)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to MariaDB version 11.8.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305874">https://www.tenable.com/plugins/nessus/305874</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MariaDB 12.1.2 < 12.2.2 DoS]]></title>
            <link>https://www.tenable.com/plugins/nessus/305873</link>
            <guid>https://www.tenable.com/plugins/nessus/305873</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 305873 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote database server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of MariaDB installed on the remote host is prior to 12.2.2. It is, therefore, affected by a vulnerability as referenced in the GHSA-4rj5-2227-9wgc advisory.<br /></span><span><br /></span><span>  - MariaDB server is a community developed fork of MySQL server. An authenticated user can crash MariaDB     versions 11.4 before 11.4.10 and 11.8 before 11.8.6 via a bug in JSON_SCHEMA_VALID() function. Under     certain conditions it might be possible to turn the crash into a remote code execution. These conditions     require tight control over memory layout which is generally only attainable in a lab environment. This     issue is fixed in MariaDB 11.4.10, MariaDB 11.8.6, and MariaDB 12.2.2. (CVE-2026-32710)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to MariaDB version 12.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/305873">https://www.tenable.com/plugins/nessus/305873</a></p>
    ]]></description>
        </item>
    </channel>
</rss>