Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
extra_packages_for_enterprise_linux Vendor: fedoraproject

About This Product

extra_packages_for_enterprise_linux is a software product offered by fedoraproject. As an operating system, this product forms the foundation of countless systems, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 76 known vulnerabilities affecting fedoraproject extra_packages_for_enterprise_linux. This includes 6 critical-severity issues and 27 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2020 to 2024, indicating a recent active security attention. 35 medium-severity issues and 8 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-7106 2020-01-16 2024-11-21 6.1 4.3 Likely
CVE-2020-9274 2020-02-26 2024-11-21 7.5 5.0 Likely
CVE-2020-27818 2020-12-08 2024-11-21 3.3 4.3 Likely
CVE-2020-27842 2021-01-05 2024-11-21 5.5 4.3 Likely
CVE-2021-20247 2021-02-23 2024-11-21 7.4 5.8 Likely
CVE-2021-38714 2021-08-24 2024-11-21 8.8 9.3 Likely
CVE-2021-21897 2021-09-08 2024-11-21 8.8 6.8 Likely
CVE-2021-43558 2021-11-22 2024-11-21 6.1 4.3 Likely
CVE-2021-43559 2021-11-22 2024-11-21 8.8 6.8 Likely
CVE-2021-43560 2021-11-22 2024-11-21 5.3 5.0 Likely
CVE-2021-23727 2021-12-29 2024-11-21 7.5 6.0 Unknown
CVE-2021-46141 2022-01-06 2024-11-21 5.5 4.3 Likely
CVE-2021-46142 2022-01-06 2024-11-21 5.5 4.3 Likely
CVE-2021-45079 2022-01-31 2024-11-21 9.1 5.8 Likely
CVE-2022-0571 2022-02-14 2024-11-21 6.1 4.3 Likely
CVE-2022-21698 2022-02-15 2024-11-21 7.5 5.0 Likely
CVE-2022-0546 2022-02-24 2024-11-21 7.8 5.1 Unknown
CVE-2021-3733 2022-03-10 2025-11-03 6.5 4.0 Likely
CVE-2022-0725 2022-03-10 2024-11-21 7.5 5.0 Likely
CVE-2022-27191 2022-03-18 2024-11-21 7.5 4.3 Likely
CVE-2022-0983 2022-03-25 2024-11-21 8.8 6.5 Likely
CVE-2022-25648 2022-04-19 2024-11-21 8.1 7.5 Likely
CVE-2022-28327 2022-04-20 2024-11-21 7.5 5.0 Likely
CVE-2022-24882 2022-04-26 2025-11-03 9.1 5.0 Likely
CVE-2022-32545 2022-06-16 2024-11-21 7.8 6.8 Likely
CVE-2022-32546 2022-06-16 2024-11-21 7.8 6.8 Likely
CVE-2022-2158 2022-07-28 2024-11-21 8.8 - -
CVE-2022-2163 2022-07-28 2024-11-21 8.8 - -
CVE-2022-2294 2022-07-28 2025-10-24 8.8 - -
CVE-2022-2295 2022-07-28 2024-11-21 8.8 - -
CVE-2022-2296 2022-07-28 2024-11-21 8.8 - -
CVE-2022-2719 2022-08-10 2026-03-06 5.5 - -
CVE-2020-14394 2022-08-17 2024-11-21 3.2 - -
CVE-2022-0367 2022-08-29 2025-11-03 7.8 - -
CVE-2022-3213 2022-09-19 2024-11-21 5.5 - -
CVE-2022-40313 2022-09-30 2025-05-20 7.1 - -
CVE-2022-40315 2022-09-30 2025-05-20 9.8 - -
CVE-2022-40316 2022-09-30 2025-05-20 4.3 - -
CVE-2022-45152 2022-11-25 2025-04-29 9.1 - -
CVE-2022-4144 2022-11-29 2025-04-14 6.5 - -
CVE-2022-4170 2022-12-09 2025-04-14 9.8 - -
CVE-2023-1289 2023-03-23 2024-11-21 5.5 - -
CVE-2023-0056 2023-03-23 2025-02-25 6.5 - -
CVE-2023-1906 2023-04-12 2025-02-10 5.5 - -
CVE-2023-30943 2023-05-02 2024-11-21 6.5 - -
CVE-2023-30944 2023-05-02 2024-11-21 5.6 - -
CVE-2023-34151 2023-05-30 2024-12-02 5.5 - -
CVE-2023-34152 2023-05-30 2025-01-13 9.8 - -
CVE-2023-34153 2023-05-30 2026-02-27 7.8 - -
CVE-2023-34474 2023-06-16 2024-11-21 5.5 - -
CVE-2023-34475 2023-06-16 2024-11-21 5.5 - -
CVE-2023-3195 2023-06-16 2024-11-21 5.5 - -
CVE-2023-26590 2023-07-10 2025-06-27 6.2 - -
CVE-2023-32627 2023-07-10 2025-06-27 6.2 - -
CVE-2023-34318 2023-07-10 2025-06-27 7.8 - -
CVE-2023-34432 2023-07-10 2024-11-21 7.8 - -
CVE-2023-38252 2023-07-14 2025-02-08 4.7 - -
CVE-2023-38253 2023-07-14 2024-11-21 4.7 - -
CVE-2022-4318 2023-09-25 2024-11-21 7.8 - -
CVE-2023-3428 2023-10-04 2024-11-21 6.2 - -
CVE-2023-5539 2023-11-09 2024-11-21 4.7 - -
CVE-2023-5540 2023-11-09 2024-11-21 4.7 - -
CVE-2023-5542 2023-11-09 2024-11-21 3.3 - -
CVE-2023-5545 2023-11-09 2024-11-21 3.3 - -
CVE-2023-5548 2023-11-09 2024-11-21 3.3 - -
CVE-2023-5549 2023-11-09 2024-11-21 3.3 - -
CVE-2023-5550 2023-11-09 2024-11-21 6.5 - -
CVE-2023-5551 2023-11-09 2024-11-21 3.3 - -
CVE-2023-5543 2023-11-09 2024-11-21 3.3 - -
CVE-2023-5341 2023-11-19 2025-02-07 6.2 - -
CVE-2023-5764 2023-12-12 2024-11-21 7.1 - -
CVE-2023-4255 2023-12-21 2024-11-21 5.5 - -
CVE-2023-4256 2023-12-21 2024-11-21 5.5 - -
CVE-2023-51766 2023-12-24 2025-11-04 5.3 - -
CVE-2024-0232 2024-01-16 2024-11-21 4.7 - -
CVE-2023-6395 2024-01-16 2024-11-21 6.7 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for fedoraproject extra_packages_for_enterprise_linux by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.