Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-49738 (GCVE-0-2022-49738)
Vulnerability from cvelistv5 – Published: 2025-03-27 16:42 – Updated: 2025-10-01 17:36- CWE-125 - Out-of-bounds Read
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
98e4da8ca301e062d79ae168c67e56f3c3de3ce4 , < e5142a4935c1f15841d06047b8130078fc4d7b8f
(git)
Affected: 98e4da8ca301e062d79ae168c67e56f3c3de3ce4 , < 914e38f02a490dafd980ff0f39cccedc074deb29 (git) Affected: 98e4da8ca301e062d79ae168c67e56f3c3de3ce4 , < 97ccfffcc061e54ce87e4a51a40e2e9cb0b7076a (git) Affected: 98e4da8ca301e062d79ae168c67e56f3c3de3ce4 , < 5b25035fb888cb2f78bf0b9c9f95b1dc54480d36 (git) Affected: 98e4da8ca301e062d79ae168c67e56f3c3de3ce4 , < d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c (git) |
||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-49738",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-01T17:36:53.560613Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-01T17:36:56.110Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/f2fs/gc.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "e5142a4935c1f15841d06047b8130078fc4d7b8f",
"status": "affected",
"version": "98e4da8ca301e062d79ae168c67e56f3c3de3ce4",
"versionType": "git"
},
{
"lessThan": "914e38f02a490dafd980ff0f39cccedc074deb29",
"status": "affected",
"version": "98e4da8ca301e062d79ae168c67e56f3c3de3ce4",
"versionType": "git"
},
{
"lessThan": "97ccfffcc061e54ce87e4a51a40e2e9cb0b7076a",
"status": "affected",
"version": "98e4da8ca301e062d79ae168c67e56f3c3de3ce4",
"versionType": "git"
},
{
"lessThan": "5b25035fb888cb2f78bf0b9c9f95b1dc54480d36",
"status": "affected",
"version": "98e4da8ca301e062d79ae168c67e56f3c3de3ce4",
"versionType": "git"
},
{
"lessThan": "d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c",
"status": "affected",
"version": "98e4da8ca301e062d79ae168c67e56f3c3de3ce4",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/f2fs/gc.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "3.8"
},
{
"lessThan": "3.8",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.232",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.168",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.93",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.11",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.2",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.232",
"versionStartIncluding": "3.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.168",
"versionStartIncluding": "3.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.93",
"versionStartIncluding": "3.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.11",
"versionStartIncluding": "3.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"versionStartIncluding": "3.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on i_extra_isize in is_alive()\n\nsyzbot found a f2fs bug:\n\nBUG: KASAN: slab-out-of-bounds in data_blkaddr fs/f2fs/f2fs.h:2891 [inline]\nBUG: KASAN: slab-out-of-bounds in is_alive fs/f2fs/gc.c:1117 [inline]\nBUG: KASAN: slab-out-of-bounds in gc_data_segment fs/f2fs/gc.c:1520 [inline]\nBUG: KASAN: slab-out-of-bounds in do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\nRead of size 4 at addr ffff888076557568 by task kworker/u4:3/52\n\nCPU: 1 PID: 52 Comm: kworker/u4:3 Not tainted 6.1.0-rc4-syzkaller-00362-gfef7fd48922d #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\nWorkqueue: writeback wb_workfn (flush-7:0)\nCall Trace:\n\u003cTASK\u003e\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_address_description mm/kasan/report.c:284 [inline]\nprint_report+0x15e/0x45d mm/kasan/report.c:395\nkasan_report+0xbb/0x1f0 mm/kasan/report.c:495\ndata_blkaddr fs/f2fs/f2fs.h:2891 [inline]\nis_alive fs/f2fs/gc.c:1117 [inline]\ngc_data_segment fs/f2fs/gc.c:1520 [inline]\ndo_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\nf2fs_gc+0x88c/0x20a0 fs/f2fs/gc.c:1831\nf2fs_balance_fs+0x544/0x6b0 fs/f2fs/segment.c:410\nf2fs_write_inode+0x57e/0xe20 fs/f2fs/inode.c:753\nwrite_inode fs/fs-writeback.c:1440 [inline]\n__writeback_single_inode+0xcfc/0x1440 fs/fs-writeback.c:1652\nwriteback_sb_inodes+0x54d/0xf90 fs/fs-writeback.c:1870\nwb_writeback+0x2c5/0xd70 fs/fs-writeback.c:2044\nwb_do_writeback fs/fs-writeback.c:2187 [inline]\nwb_workfn+0x2dc/0x12f0 fs/fs-writeback.c:2227\nprocess_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\nworker_thread+0x665/0x1080 kernel/workqueue.c:2436\nkthread+0x2e4/0x3a0 kernel/kthread.c:376\nret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n\nThe root cause is that we forgot to do sanity check on .i_extra_isize\nin below path, result in accessing invalid address later, fix it.\n- gc_data_segment\n - is_alive\n - data_blkaddr\n - offset_in_addr"
}
],
"providerMetadata": {
"dateUpdated": "2025-07-11T17:19:21.410Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/e5142a4935c1f15841d06047b8130078fc4d7b8f"
},
{
"url": "https://git.kernel.org/stable/c/914e38f02a490dafd980ff0f39cccedc074deb29"
},
{
"url": "https://git.kernel.org/stable/c/97ccfffcc061e54ce87e4a51a40e2e9cb0b7076a"
},
{
"url": "https://git.kernel.org/stable/c/5b25035fb888cb2f78bf0b9c9f95b1dc54480d36"
},
{
"url": "https://git.kernel.org/stable/c/d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c"
}
],
"title": "f2fs: fix to do sanity check on i_extra_isize in is_alive()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2022-49738",
"datePublished": "2025-03-27T16:42:50.951Z",
"dateReserved": "2025-03-27T16:39:17.986Z",
"dateUpdated": "2025-10-01T17:36:56.110Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-49738\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-03-27T17:15:38.340\",\"lastModified\":\"2025-10-01T18:15:30.820\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: fix to do sanity check on i_extra_isize in is_alive()\\n\\nsyzbot found a f2fs bug:\\n\\nBUG: KASAN: slab-out-of-bounds in data_blkaddr fs/f2fs/f2fs.h:2891 [inline]\\nBUG: KASAN: slab-out-of-bounds in is_alive fs/f2fs/gc.c:1117 [inline]\\nBUG: KASAN: slab-out-of-bounds in gc_data_segment fs/f2fs/gc.c:1520 [inline]\\nBUG: KASAN: slab-out-of-bounds in do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\\nRead of size 4 at addr ffff888076557568 by task kworker/u4:3/52\\n\\nCPU: 1 PID: 52 Comm: kworker/u4:3 Not tainted 6.1.0-rc4-syzkaller-00362-gfef7fd48922d #0\\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\\nWorkqueue: writeback wb_workfn (flush-7:0)\\nCall Trace:\\n\u003cTASK\u003e\\n__dump_stack lib/dump_stack.c:88 [inline]\\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\\nprint_address_description mm/kasan/report.c:284 [inline]\\nprint_report+0x15e/0x45d mm/kasan/report.c:395\\nkasan_report+0xbb/0x1f0 mm/kasan/report.c:495\\ndata_blkaddr fs/f2fs/f2fs.h:2891 [inline]\\nis_alive fs/f2fs/gc.c:1117 [inline]\\ngc_data_segment fs/f2fs/gc.c:1520 [inline]\\ndo_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\\nf2fs_gc+0x88c/0x20a0 fs/f2fs/gc.c:1831\\nf2fs_balance_fs+0x544/0x6b0 fs/f2fs/segment.c:410\\nf2fs_write_inode+0x57e/0xe20 fs/f2fs/inode.c:753\\nwrite_inode fs/fs-writeback.c:1440 [inline]\\n__writeback_single_inode+0xcfc/0x1440 fs/fs-writeback.c:1652\\nwriteback_sb_inodes+0x54d/0xf90 fs/fs-writeback.c:1870\\nwb_writeback+0x2c5/0xd70 fs/fs-writeback.c:2044\\nwb_do_writeback fs/fs-writeback.c:2187 [inline]\\nwb_workfn+0x2dc/0x12f0 fs/fs-writeback.c:2227\\nprocess_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\\nworker_thread+0x665/0x1080 kernel/workqueue.c:2436\\nkthread+0x2e4/0x3a0 kernel/kthread.c:376\\nret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\\n\\nThe root cause is that we forgot to do sanity check on .i_extra_isize\\nin below path, result in accessing invalid address later, fix it.\\n- gc_data_segment\\n - is_alive\\n - data_blkaddr\\n - offset_in_addr\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para realizar una comprobaci\u00f3n de cordura en i_extra_isize en is_alive() syzbot encontr\u00f3 un error de f2fs: ERROR: KASAN: slab-out-of-bounds en data_blkaddr fs/f2fs/f2fs.h:2891 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en is_alive fs/f2fs/gc.c:1117 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en gc_data_segment fs/f2fs/gc.c:1520 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff888076557568 por la tarea kworker/u4:3/52 CPU: 1 PID: 52 Comm: kworker/u4:3 No contaminado 6.1.0-rc4-syzkaller-00362-gfef7fd48922d #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 Cola de trabajo: escritura diferida wb_workfn (flush-7:0) Rastreo de llamadas: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:284 [inline] print_report+0x15e/0x45d mm/kasan/report.c:395 kasan_report+0xbb/0x1f0 mm/kasan/report.c:495 data_blkaddr fs/f2fs/f2fs.h:2891 [inline] is_alive fs/f2fs/gc.c:1117 [inline] gc_data_segment fs/f2fs/gc.c:1520 [inline] do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734 f2fs_gc+0x88c/0x20a0 fs/f2fs/gc.c:1831 f2fs_balance_fs+0x544/0x6b0 fs/f2fs/segment.c:410 f2fs_write_inode+0x57e/0xe20 fs/f2fs/inode.c:753 write_inode fs/fs-writeback.c:1440 [inline] __writeback_single_inode+0xcfc/0x1440 fs/fs-writeback.c:1652 writeback_sb_inodes+0x54d/0xf90 fs/fs-writeback.c:1870 wb_writeback+0x2c5/0xd70 fs/fs-writeback.c:2044 wb_do_writeback fs/fs-writeback.c:2187 [inline] wb_workfn+0x2dc/0x12f0 fs/fs-writeback.c:2227 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e4/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 La causa ra\u00edz es que olvidamos hacer una comprobaci\u00f3n de cordura en .i_extra_isize en la siguiente ruta, lo que da como resultado el acceso a una direcci\u00f3n no v\u00e1lida m\u00e1s tarde, corr\u00edjalo. - gc_data_segment - is_alive - data_blkaddr - offset_in_addr\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.4.232\",\"matchCriteriaId\":\"B50AC354-4651-4CDE-8EA9-58A9A917F725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.168\",\"matchCriteriaId\":\"12258A3F-04BD-49C9-9C6B-D3C1945E8910\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.93\",\"matchCriteriaId\":\"98FAC10E-42A0-4372-B1A0-A49CF672890E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.11\",\"matchCriteriaId\":\"535D03F4-DA02-49FE-934E-668827E6407B\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/5b25035fb888cb2f78bf0b9c9f95b1dc54480d36\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/914e38f02a490dafd980ff0f39cccedc074deb29\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/97ccfffcc061e54ce87e4a51a40e2e9cb0b7076a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e5142a4935c1f15841d06047b8130078fc4d7b8f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-49738\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-01T17:36:53.560613Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-01T16:58:56.847Z\"}}], \"cna\": {\"title\": \"f2fs: fix to do sanity check on i_extra_isize in is_alive()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"98e4da8ca301e062d79ae168c67e56f3c3de3ce4\", \"lessThan\": \"e5142a4935c1f15841d06047b8130078fc4d7b8f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"98e4da8ca301e062d79ae168c67e56f3c3de3ce4\", \"lessThan\": \"914e38f02a490dafd980ff0f39cccedc074deb29\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"98e4da8ca301e062d79ae168c67e56f3c3de3ce4\", \"lessThan\": \"97ccfffcc061e54ce87e4a51a40e2e9cb0b7076a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"98e4da8ca301e062d79ae168c67e56f3c3de3ce4\", \"lessThan\": \"5b25035fb888cb2f78bf0b9c9f95b1dc54480d36\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"98e4da8ca301e062d79ae168c67e56f3c3de3ce4\", \"lessThan\": \"d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/f2fs/gc.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.8\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.8\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.4.232\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.93\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.11\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.2\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/f2fs/gc.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e5142a4935c1f15841d06047b8130078fc4d7b8f\"}, {\"url\": \"https://git.kernel.org/stable/c/914e38f02a490dafd980ff0f39cccedc074deb29\"}, {\"url\": \"https://git.kernel.org/stable/c/97ccfffcc061e54ce87e4a51a40e2e9cb0b7076a\"}, {\"url\": \"https://git.kernel.org/stable/c/5b25035fb888cb2f78bf0b9c9f95b1dc54480d36\"}, {\"url\": \"https://git.kernel.org/stable/c/d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: fix to do sanity check on i_extra_isize in is_alive()\\n\\nsyzbot found a f2fs bug:\\n\\nBUG: KASAN: slab-out-of-bounds in data_blkaddr fs/f2fs/f2fs.h:2891 [inline]\\nBUG: KASAN: slab-out-of-bounds in is_alive fs/f2fs/gc.c:1117 [inline]\\nBUG: KASAN: slab-out-of-bounds in gc_data_segment fs/f2fs/gc.c:1520 [inline]\\nBUG: KASAN: slab-out-of-bounds in do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\\nRead of size 4 at addr ffff888076557568 by task kworker/u4:3/52\\n\\nCPU: 1 PID: 52 Comm: kworker/u4:3 Not tainted 6.1.0-rc4-syzkaller-00362-gfef7fd48922d #0\\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\\nWorkqueue: writeback wb_workfn (flush-7:0)\\nCall Trace:\\n\u003cTASK\u003e\\n__dump_stack lib/dump_stack.c:88 [inline]\\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\\nprint_address_description mm/kasan/report.c:284 [inline]\\nprint_report+0x15e/0x45d mm/kasan/report.c:395\\nkasan_report+0xbb/0x1f0 mm/kasan/report.c:495\\ndata_blkaddr fs/f2fs/f2fs.h:2891 [inline]\\nis_alive fs/f2fs/gc.c:1117 [inline]\\ngc_data_segment fs/f2fs/gc.c:1520 [inline]\\ndo_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\\nf2fs_gc+0x88c/0x20a0 fs/f2fs/gc.c:1831\\nf2fs_balance_fs+0x544/0x6b0 fs/f2fs/segment.c:410\\nf2fs_write_inode+0x57e/0xe20 fs/f2fs/inode.c:753\\nwrite_inode fs/fs-writeback.c:1440 [inline]\\n__writeback_single_inode+0xcfc/0x1440 fs/fs-writeback.c:1652\\nwriteback_sb_inodes+0x54d/0xf90 fs/fs-writeback.c:1870\\nwb_writeback+0x2c5/0xd70 fs/fs-writeback.c:2044\\nwb_do_writeback fs/fs-writeback.c:2187 [inline]\\nwb_workfn+0x2dc/0x12f0 fs/fs-writeback.c:2227\\nprocess_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\\nworker_thread+0x665/0x1080 kernel/workqueue.c:2436\\nkthread+0x2e4/0x3a0 kernel/kthread.c:376\\nret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\\n\\nThe root cause is that we forgot to do sanity check on .i_extra_isize\\nin below path, result in accessing invalid address later, fix it.\\n- gc_data_segment\\n - is_alive\\n - data_blkaddr\\n - offset_in_addr\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.232\", \"versionStartIncluding\": \"3.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.168\", \"versionStartIncluding\": \"3.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.93\", \"versionStartIncluding\": \"3.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.11\", \"versionStartIncluding\": \"3.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2\", \"versionStartIncluding\": \"3.8\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-07-11T17:19:21.410Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-49738\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-01T17:36:56.110Z\", \"dateReserved\": \"2025-03-27T16:39:17.986Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2025-03-27T16:42:50.951Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2022-49738
Vulnerability from fkie_nvd - Published: 2025-03-27 17:15 - Updated: 2025-10-01 18:157.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B50AC354-4651-4CDE-8EA9-58A9A917F725",
"versionEndExcluding": "5.4.232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12258A3F-04BD-49C9-9C6B-D3C1945E8910",
"versionEndExcluding": "5.10.168",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98FAC10E-42A0-4372-B1A0-A49CF672890E",
"versionEndExcluding": "5.15.93",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "535D03F4-DA02-49FE-934E-668827E6407B",
"versionEndExcluding": "6.1.11",
"versionStartIncluding": "5.16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on i_extra_isize in is_alive()\n\nsyzbot found a f2fs bug:\n\nBUG: KASAN: slab-out-of-bounds in data_blkaddr fs/f2fs/f2fs.h:2891 [inline]\nBUG: KASAN: slab-out-of-bounds in is_alive fs/f2fs/gc.c:1117 [inline]\nBUG: KASAN: slab-out-of-bounds in gc_data_segment fs/f2fs/gc.c:1520 [inline]\nBUG: KASAN: slab-out-of-bounds in do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\nRead of size 4 at addr ffff888076557568 by task kworker/u4:3/52\n\nCPU: 1 PID: 52 Comm: kworker/u4:3 Not tainted 6.1.0-rc4-syzkaller-00362-gfef7fd48922d #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\nWorkqueue: writeback wb_workfn (flush-7:0)\nCall Trace:\n\u003cTASK\u003e\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_address_description mm/kasan/report.c:284 [inline]\nprint_report+0x15e/0x45d mm/kasan/report.c:395\nkasan_report+0xbb/0x1f0 mm/kasan/report.c:495\ndata_blkaddr fs/f2fs/f2fs.h:2891 [inline]\nis_alive fs/f2fs/gc.c:1117 [inline]\ngc_data_segment fs/f2fs/gc.c:1520 [inline]\ndo_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\nf2fs_gc+0x88c/0x20a0 fs/f2fs/gc.c:1831\nf2fs_balance_fs+0x544/0x6b0 fs/f2fs/segment.c:410\nf2fs_write_inode+0x57e/0xe20 fs/f2fs/inode.c:753\nwrite_inode fs/fs-writeback.c:1440 [inline]\n__writeback_single_inode+0xcfc/0x1440 fs/fs-writeback.c:1652\nwriteback_sb_inodes+0x54d/0xf90 fs/fs-writeback.c:1870\nwb_writeback+0x2c5/0xd70 fs/fs-writeback.c:2044\nwb_do_writeback fs/fs-writeback.c:2187 [inline]\nwb_workfn+0x2dc/0x12f0 fs/fs-writeback.c:2227\nprocess_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\nworker_thread+0x665/0x1080 kernel/workqueue.c:2436\nkthread+0x2e4/0x3a0 kernel/kthread.c:376\nret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n\nThe root cause is that we forgot to do sanity check on .i_extra_isize\nin below path, result in accessing invalid address later, fix it.\n- gc_data_segment\n - is_alive\n - data_blkaddr\n - offset_in_addr"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para realizar una comprobaci\u00f3n de cordura en i_extra_isize en is_alive() syzbot encontr\u00f3 un error de f2fs: ERROR: KASAN: slab-out-of-bounds en data_blkaddr fs/f2fs/f2fs.h:2891 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en is_alive fs/f2fs/gc.c:1117 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en gc_data_segment fs/f2fs/gc.c:1520 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff888076557568 por la tarea kworker/u4:3/52 CPU: 1 PID: 52 Comm: kworker/u4:3 No contaminado 6.1.0-rc4-syzkaller-00362-gfef7fd48922d #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 Cola de trabajo: escritura diferida wb_workfn (flush-7:0) Rastreo de llamadas: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:284 [inline] print_report+0x15e/0x45d mm/kasan/report.c:395 kasan_report+0xbb/0x1f0 mm/kasan/report.c:495 data_blkaddr fs/f2fs/f2fs.h:2891 [inline] is_alive fs/f2fs/gc.c:1117 [inline] gc_data_segment fs/f2fs/gc.c:1520 [inline] do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734 f2fs_gc+0x88c/0x20a0 fs/f2fs/gc.c:1831 f2fs_balance_fs+0x544/0x6b0 fs/f2fs/segment.c:410 f2fs_write_inode+0x57e/0xe20 fs/f2fs/inode.c:753 write_inode fs/fs-writeback.c:1440 [inline] __writeback_single_inode+0xcfc/0x1440 fs/fs-writeback.c:1652 writeback_sb_inodes+0x54d/0xf90 fs/fs-writeback.c:1870 wb_writeback+0x2c5/0xd70 fs/fs-writeback.c:2044 wb_do_writeback fs/fs-writeback.c:2187 [inline] wb_workfn+0x2dc/0x12f0 fs/fs-writeback.c:2227 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e4/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 La causa ra\u00edz es que olvidamos hacer una comprobaci\u00f3n de cordura en .i_extra_isize en la siguiente ruta, lo que da como resultado el acceso a una direcci\u00f3n no v\u00e1lida m\u00e1s tarde, corr\u00edjalo. - gc_data_segment - is_alive - data_blkaddr - offset_in_addr"
}
],
"id": "CVE-2022-49738",
"lastModified": "2025-10-01T18:15:30.820",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-27T17:15:38.340",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/5b25035fb888cb2f78bf0b9c9f95b1dc54480d36"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/914e38f02a490dafd980ff0f39cccedc074deb29"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/97ccfffcc061e54ce87e4a51a40e2e9cb0b7076a"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/e5142a4935c1f15841d06047b8130078fc4d7b8f"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-X6CH-FHMP-9745
Vulnerability from github – Published: 2025-03-27 18:31 – Updated: 2025-04-14 21:32In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to do sanity check on i_extra_isize in is_alive()
syzbot found a f2fs bug:
BUG: KASAN: slab-out-of-bounds in data_blkaddr fs/f2fs/f2fs.h:2891 [inline] BUG: KASAN: slab-out-of-bounds in is_alive fs/f2fs/gc.c:1117 [inline] BUG: KASAN: slab-out-of-bounds in gc_data_segment fs/f2fs/gc.c:1520 [inline] BUG: KASAN: slab-out-of-bounds in do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734 Read of size 4 at addr ffff888076557568 by task kworker/u4:3/52
CPU: 1 PID: 52 Comm: kworker/u4:3 Not tainted 6.1.0-rc4-syzkaller-00362-gfef7fd48922d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Workqueue: writeback wb_workfn (flush-7:0) Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:284 [inline] print_report+0x15e/0x45d mm/kasan/report.c:395 kasan_report+0xbb/0x1f0 mm/kasan/report.c:495 data_blkaddr fs/f2fs/f2fs.h:2891 [inline] is_alive fs/f2fs/gc.c:1117 [inline] gc_data_segment fs/f2fs/gc.c:1520 [inline] do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734 f2fs_gc+0x88c/0x20a0 fs/f2fs/gc.c:1831 f2fs_balance_fs+0x544/0x6b0 fs/f2fs/segment.c:410 f2fs_write_inode+0x57e/0xe20 fs/f2fs/inode.c:753 write_inode fs/fs-writeback.c:1440 [inline] __writeback_single_inode+0xcfc/0x1440 fs/fs-writeback.c:1652 writeback_sb_inodes+0x54d/0xf90 fs/fs-writeback.c:1870 wb_writeback+0x2c5/0xd70 fs/fs-writeback.c:2044 wb_do_writeback fs/fs-writeback.c:2187 [inline] wb_workfn+0x2dc/0x12f0 fs/fs-writeback.c:2227 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e4/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
The root cause is that we forgot to do sanity check on .i_extra_isize in below path, result in accessing invalid address later, fix it. - gc_data_segment - is_alive - data_blkaddr - offset_in_addr
{
"affected": [],
"aliases": [
"CVE-2022-49738"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-03-27T17:15:38Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on i_extra_isize in is_alive()\n\nsyzbot found a f2fs bug:\n\nBUG: KASAN: slab-out-of-bounds in data_blkaddr fs/f2fs/f2fs.h:2891 [inline]\nBUG: KASAN: slab-out-of-bounds in is_alive fs/f2fs/gc.c:1117 [inline]\nBUG: KASAN: slab-out-of-bounds in gc_data_segment fs/f2fs/gc.c:1520 [inline]\nBUG: KASAN: slab-out-of-bounds in do_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\nRead of size 4 at addr ffff888076557568 by task kworker/u4:3/52\n\nCPU: 1 PID: 52 Comm: kworker/u4:3 Not tainted 6.1.0-rc4-syzkaller-00362-gfef7fd48922d #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\nWorkqueue: writeback wb_workfn (flush-7:0)\nCall Trace:\n\u003cTASK\u003e\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_address_description mm/kasan/report.c:284 [inline]\nprint_report+0x15e/0x45d mm/kasan/report.c:395\nkasan_report+0xbb/0x1f0 mm/kasan/report.c:495\ndata_blkaddr fs/f2fs/f2fs.h:2891 [inline]\nis_alive fs/f2fs/gc.c:1117 [inline]\ngc_data_segment fs/f2fs/gc.c:1520 [inline]\ndo_garbage_collect+0x386a/0x3df0 fs/f2fs/gc.c:1734\nf2fs_gc+0x88c/0x20a0 fs/f2fs/gc.c:1831\nf2fs_balance_fs+0x544/0x6b0 fs/f2fs/segment.c:410\nf2fs_write_inode+0x57e/0xe20 fs/f2fs/inode.c:753\nwrite_inode fs/fs-writeback.c:1440 [inline]\n__writeback_single_inode+0xcfc/0x1440 fs/fs-writeback.c:1652\nwriteback_sb_inodes+0x54d/0xf90 fs/fs-writeback.c:1870\nwb_writeback+0x2c5/0xd70 fs/fs-writeback.c:2044\nwb_do_writeback fs/fs-writeback.c:2187 [inline]\nwb_workfn+0x2dc/0x12f0 fs/fs-writeback.c:2227\nprocess_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\nworker_thread+0x665/0x1080 kernel/workqueue.c:2436\nkthread+0x2e4/0x3a0 kernel/kthread.c:376\nret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n\nThe root cause is that we forgot to do sanity check on .i_extra_isize\nin below path, result in accessing invalid address later, fix it.\n- gc_data_segment\n - is_alive\n - data_blkaddr\n - offset_in_addr",
"id": "GHSA-x6ch-fhmp-9745",
"modified": "2025-04-14T21:32:23Z",
"published": "2025-03-27T18:31:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49738"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/5b25035fb888cb2f78bf0b9c9f95b1dc54480d36"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/914e38f02a490dafd980ff0f39cccedc074deb29"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/97ccfffcc061e54ce87e4a51a40e2e9cb0b7076a"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/e5142a4935c1f15841d06047b8130078fc4d7b8f"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-0649
Vulnerability from csaf_certbund - Published: 2025-03-27 23:00 - Updated: 2026-03-05 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht spezifizierte Effekte zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0649 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0649.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0649 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0649"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2021-4454",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2021-4454-f4a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49738",
"url": "https://lore.kernel.org/linux-cve-announce/2025032756-CVE-2022-49738-c2ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49739",
"url": "https://lore.kernel.org/linux-cve-announce/2025032756-CVE-2022-49739-a93e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49740",
"url": "https://lore.kernel.org/linux-cve-announce/2025032757-CVE-2022-49740-7f6e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49741",
"url": "https://lore.kernel.org/linux-cve-announce/2025032757-CVE-2022-49741-65a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49742",
"url": "https://lore.kernel.org/linux-cve-announce/2025032757-CVE-2022-49742-e3d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49743",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49743-a049@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49744",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49744-8c5a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49745",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49745-903a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49746",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49746-251b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49747",
"url": "https://lore.kernel.org/linux-cve-announce/2025032759-CVE-2022-49747-f361@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49748",
"url": "https://lore.kernel.org/linux-cve-announce/2025032759-CVE-2022-49748-4658@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49749",
"url": "https://lore.kernel.org/linux-cve-announce/2025032759-CVE-2022-49749-ed85@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49750",
"url": "https://lore.kernel.org/linux-cve-announce/2025032700-CVE-2022-49750-743d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49751",
"url": "https://lore.kernel.org/linux-cve-announce/2025032700-CVE-2022-49751-bf8f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49752",
"url": "https://lore.kernel.org/linux-cve-announce/2025032700-CVE-2022-49752-19a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49753",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49753-d1ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49754",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49754-cc36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49755",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49755-dfb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49756",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49756-7fd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49757",
"url": "https://lore.kernel.org/linux-cve-announce/2025032702-CVE-2022-49757-a990@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49758",
"url": "https://lore.kernel.org/linux-cve-announce/2025032702-CVE-2022-49758-10e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49759",
"url": "https://lore.kernel.org/linux-cve-announce/2025032702-CVE-2022-49759-5392@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49760",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2022-49760-97be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49761",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2022-49761-9b1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52928",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-52928-e380@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52929",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-52929-7900@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52930",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-52930-4bbc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52931",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-52931-593f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52932",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52932-434b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52933",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52933-f292@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52934",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52934-bd3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52935",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52935-1c3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52936",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-52936-d459@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52937",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-52937-605d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52938",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-52938-ee34@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52939",
"url": "https://lore.kernel.org/linux-cve-announce/2025032722-CVE-2023-52939-8bb1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52940",
"url": "https://lore.kernel.org/linux-cve-announce/2025032722-CVE-2023-52940-2e53@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52941",
"url": "https://lore.kernel.org/linux-cve-announce/2025032722-CVE-2023-52941-7c12@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52942",
"url": "https://lore.kernel.org/linux-cve-announce/2025032723-CVE-2023-52942-6a3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52973",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2023-52973-a993@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52974",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52974-0aa2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52975",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52975-155c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52976",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52976-eda3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52977",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52977-f91d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52978",
"url": "https://lore.kernel.org/linux-cve-announce/2025032705-CVE-2023-52978-6a05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52979",
"url": "https://lore.kernel.org/linux-cve-announce/2025032705-CVE-2023-52979-ca3f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52980",
"url": "https://lore.kernel.org/linux-cve-announce/2025032705-CVE-2023-52980-0fea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52981",
"url": "https://lore.kernel.org/linux-cve-announce/2025032706-CVE-2023-52981-070c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52982",
"url": "https://lore.kernel.org/linux-cve-announce/2025032706-CVE-2023-52982-7291@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52983",
"url": "https://lore.kernel.org/linux-cve-announce/2025032706-CVE-2023-52983-4a16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52984",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52984-19ad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52985",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52985-3f52@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52986",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52986-91fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52987",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52987-bcc0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52988",
"url": "https://lore.kernel.org/linux-cve-announce/2025032708-CVE-2023-52988-5520@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52989",
"url": "https://lore.kernel.org/linux-cve-announce/2025032708-CVE-2023-52989-1b68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52990",
"url": "https://lore.kernel.org/linux-cve-announce/2025032708-CVE-2023-52990-befd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52991",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52991-6358@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52992",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52992-bf46@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52993",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52993-3697@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52994",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52994-5336@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52995",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52995-c28f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52996",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52996-7c1f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52997",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52997-dbca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52998",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2023-52998-0671@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52999",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2023-52999-e28e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53000",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2023-53000-fded@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53001",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2023-53001-f28f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53002",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2023-53002-1f76@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53003",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2023-53003-8256@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53004",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53004-e58b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53005",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53005-9bf0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53006",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53006-209f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53007",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53007-6ed4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53008",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2023-53008-415c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53009",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2023-53009-82cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53010",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2023-53010-56af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53011",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2023-53011-6f98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53012",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2023-53012-597c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53013",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2023-53013-58dc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53014",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53014-700f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53015",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53015-f139@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53016",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53016-f30c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53017",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53017-8dd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53018",
"url": "https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53018-c89c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53019",
"url": "https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53019-441a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53020",
"url": "https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53020-1042@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53021",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-53021-def9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53022",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-53022-b539@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53023",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-53023-ef4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53024",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53024-8d19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53025",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53025-5662@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53026",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53026-0e24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53027",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53027-dc56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53028",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53028-8be6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53029",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53029-a670@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53030",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53030-ba50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53031",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-53031-39cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53032",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-53032-70ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53033",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-53033-9089@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-58090",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2024-58090-fddc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-58091",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2024-58091-a2a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21867",
"url": "https://lore.kernel.org/linux-cve-announce/2025032732-CVE-2025-21867-3138@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21868",
"url": "https://lore.kernel.org/linux-cve-announce/2025032734-CVE-2025-21868-ef4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21869",
"url": "https://lore.kernel.org/linux-cve-announce/2025032734-CVE-2025-21869-b4a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21870",
"url": "https://lore.kernel.org/linux-cve-announce/2025032735-CVE-2025-21870-4c78@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21871",
"url": "https://lore.kernel.org/linux-cve-announce/2025032735-CVE-2025-21871-bb8c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21872",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2025-21872-574e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21873",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2025-21873-311e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21874",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2025-21874-d5d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21875",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2025-21875-8eca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21876",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2025-21876-6c2f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21877",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21877-de70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21878",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21878-3c82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21879",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21879-f338@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21880",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21880-f716@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21881",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2025-21881-7a0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21882",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2025-21882-cc4d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21883",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2025-21883-8b73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21884",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2025-21884-b70c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21885",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2025-21885-be9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21886",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2025-21886-9ca3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21887",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21887-48e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21888",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21888-0f83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21889",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21889-0913@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21890",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21890-f286@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21891",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2025-21891-8717@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21892",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2025-21892-12a2@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1195-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020680.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1194-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1263-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q4U3LRNKLFTX56NC6NKHFDU35E5WDD75/"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2025-04-16",
"url": "https://cloud.google.com/container-optimized-os/docs/release-notes#April_14_2025"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1975 vom 2025-04-30",
"url": "https://alas.aws.amazon.com/ALAS-2025-1975.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-100 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-100.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-089 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-089.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2834 vom 2025-04-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2834.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2837 vom 2025-04-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2837.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7514-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7516-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1574-1 vom 2025-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1573-1 vom 2025-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7512-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7517-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7518-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7521-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7522-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7516-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7511-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01627-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020866.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7516-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7517-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01633-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
"url": "https://ubuntu.com/security/notices/USN-7516-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-2 vom 2025-05-22",
"url": "https://ubuntu.com/security/notices/USN-7521-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7517-3"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7516-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
"url": "https://ubuntu.com/security/notices/USN-7510-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7510-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-3 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7521-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7510-8"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-9"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-8"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-7"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01918-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9079 vom 2025-06-16",
"url": "https://access.redhat.com/errata/RHSA-2025:9079"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9302 vom 2025-06-23",
"url": "https://access.redhat.com/errata/RHSA-2025:9302"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-103 vom 2025-06-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-103.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9302 vom 2025-06-24",
"url": "https://linux.oracle.com/errata/ELSA-2025-9302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02099-1 vom 2025-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021644.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9580 vom 2025-06-26",
"url": "https://linux.oracle.com/errata/ELSA-2025-9580.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9880 vom 2025-06-30",
"url": "https://access.redhat.com/errata/RHSA-2025:9880"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9896 vom 2025-06-30",
"url": "https://access.redhat.com/errata/RHSA-2025:9896"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-103 vom 2025-06-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-103.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9880 vom 2025-07-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-9880.html"
},
{
"category": "external",
"summary": "SEM 2025.2.1 release notes vom 2025-07-02",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9896 vom 2025-07-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-9896.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9079 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-9079.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10379 vom 2025-07-07",
"url": "https://access.redhat.com/errata/RHSA-2025:10379"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10527 vom 2025-07-07",
"url": "https://access.redhat.com/errata/RHSA-2025:10527"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-10379 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-10379.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02262-1 vom 2025-07-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B53IHD74IRNJDAOHBW4L7JGWNOM26XE7/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-082 vom 2025-07-10",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-082.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10830 vom 2025-07-14",
"url": "https://access.redhat.com/errata/RHSA-2025:10830"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10829 vom 2025-07-14",
"url": "https://access.redhat.com/errata/RHSA-2025:10829"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11045 vom 2025-07-15",
"url": "https://access.redhat.com/errata/RHSA-2025:11045"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02312-1 vom 2025-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021806.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11245 vom 2025-07-16",
"url": "https://access.redhat.com/errata/RHSA-2025:11245"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7640-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11455 vom 2025-07-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-11455.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-097 vom 2025-07-23",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-097.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11810 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11810"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-2 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-1 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-3 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13",
"url": "https://ubuntu.com/security/notices/USN-7685-5"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13962 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:13962"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14009 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:14009"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-1 vom 2025-08-19",
"url": "https://ubuntu.com/security/notices/USN-7701-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-1 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7703-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-2 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7701-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13962 vom 2025-08-20",
"url": "https://linux.oracle.com/errata/ELSA-2025-13962.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-2 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7703-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-3 vom 2025-08-21",
"url": "https://ubuntu.com/security/notices/USN-7701-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-3 vom 2025-08-21",
"url": "https://ubuntu.com/security/notices/USN-7703-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14009 vom 2025-08-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-14009.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14696 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14696"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14691 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14691"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7719-1 vom 2025-08-26",
"url": "https://ubuntu.com/security/notices/USN-7719-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7725-2 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7725-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7725-1 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7725-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-4 vom 2025-08-28",
"url": "https://ubuntu.com/security/notices/USN-7703-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15016 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:15016"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7725-3 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7725-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03",
"url": "https://ubuntu.com/security/notices/USN-7737-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03204-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022522.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3001 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7764-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7764-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7765-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7765-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7766-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7766-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7767-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7767-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-2 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-3 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7776-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7776-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7775-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7779-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7779-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7764-2 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7764-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7767-2 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7767-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-2 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7775-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-3 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7775-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-4 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7774-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7790-1 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7790-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7802-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7802-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7801-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7800-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7800-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-2 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7801-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-5 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7774-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7809-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7809-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0115-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/LSN-0115-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7819-1 vom 2025-10-13",
"url": "https://ubuntu.com/security/notices/USN-7819-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20662 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20662.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-3 vom 2025-10-15",
"url": "https://ubuntu.com/security/notices/USN-7801-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7832-1 vom 2025-10-21",
"url": "https://ubuntu.com/security/notices/USN-7832-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7819-2 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7819-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-404 vom 2025-10-31",
"url": "https://www.dell.com/support/kbdoc/000385435"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-2 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7910-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7910-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7911-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7911-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-4 vom 2025-12-05",
"url": "https://ubuntu.com/security/notices/USN-7909-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7933-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7933-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-5 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7909-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7938-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7938-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0140-1 vom 2026-01-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-030 vom 2026-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-1 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8031-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0475-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20326-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0495-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20332-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20309-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20328-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20316-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20330-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20327-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20325-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20294-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20300-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-3 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-4 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50113 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-50113.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-2 vom 2026-02-18",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-3 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-1 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-2 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-8 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50133 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-50133.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-2 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20560-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-05T23:00:00.000+00:00",
"generator": {
"date": "2026-03-06T10:29:59.187+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-0649",
"initial_release_date": "2025-03-27T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-14T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu, Debian und SUSE aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE, Ubuntu und Debian aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-17T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-22T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2025-06-24T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Amazon und Oracle Linux aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-07T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-13T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "48",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-20T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-21T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-26T22:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-01T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-24T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-25T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-08T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-14T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von SUSE und Dell aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von Ubuntu und Debian aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "109"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Virtual Edition",
"product": {
"name": "Dell NetWorker Virtual Edition",
"product_id": "T048226",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual_edition"
}
}
},
{
"category": "product_version_range",
"name": "vProxy \u003c19.14",
"product": {
"name": "Dell NetWorker vProxy \u003c19.14",
"product_id": "T050451"
}
},
{
"category": "product_version",
"name": "vProxy 19.14",
"product": {
"name": "Dell NetWorker vProxy 19.14",
"product_id": "T050451-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.14"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T042207",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager \u003c2025.2.1",
"product_id": "T044986"
}
},
{
"category": "product_version",
"name": "2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager 2025.2.1",
"product_id": "T044986-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4454",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2021-4454"
},
{
"cve": "CVE-2022-49738",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49738"
},
{
"cve": "CVE-2022-49739",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49739"
},
{
"cve": "CVE-2022-49740",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49740"
},
{
"cve": "CVE-2022-49741",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49741"
},
{
"cve": "CVE-2022-49742",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49742"
},
{
"cve": "CVE-2022-49743",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49743"
},
{
"cve": "CVE-2022-49744",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49744"
},
{
"cve": "CVE-2022-49745",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49745"
},
{
"cve": "CVE-2022-49746",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49746"
},
{
"cve": "CVE-2022-49747",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49747"
},
{
"cve": "CVE-2022-49748",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49748"
},
{
"cve": "CVE-2022-49749",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49749"
},
{
"cve": "CVE-2022-49750",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49750"
},
{
"cve": "CVE-2022-49751",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49751"
},
{
"cve": "CVE-2022-49752",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49752"
},
{
"cve": "CVE-2022-49753",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49753"
},
{
"cve": "CVE-2022-49754",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49754"
},
{
"cve": "CVE-2022-49755",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49755"
},
{
"cve": "CVE-2022-49756",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49756"
},
{
"cve": "CVE-2022-49757",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49757"
},
{
"cve": "CVE-2022-49758",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49758"
},
{
"cve": "CVE-2022-49759",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49759"
},
{
"cve": "CVE-2022-49760",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49760"
},
{
"cve": "CVE-2022-49761",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49761"
},
{
"cve": "CVE-2023-0179",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-0179"
},
{
"cve": "CVE-2023-52928",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52928"
},
{
"cve": "CVE-2023-52929",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52929"
},
{
"cve": "CVE-2023-52930",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52930"
},
{
"cve": "CVE-2023-52931",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52931"
},
{
"cve": "CVE-2023-52932",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52932"
},
{
"cve": "CVE-2023-52933",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52933"
},
{
"cve": "CVE-2023-52934",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52934"
},
{
"cve": "CVE-2023-52935",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52935"
},
{
"cve": "CVE-2023-52936",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52936"
},
{
"cve": "CVE-2023-52937",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52937"
},
{
"cve": "CVE-2023-52938",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52938"
},
{
"cve": "CVE-2023-52939",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52939"
},
{
"cve": "CVE-2023-52940",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52940"
},
{
"cve": "CVE-2023-52941",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52941"
},
{
"cve": "CVE-2023-52942",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52942"
},
{
"cve": "CVE-2023-52973",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52973"
},
{
"cve": "CVE-2023-52974",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52974"
},
{
"cve": "CVE-2023-52975",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52975"
},
{
"cve": "CVE-2023-52976",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52976"
},
{
"cve": "CVE-2023-52977",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52977"
},
{
"cve": "CVE-2023-52978",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52978"
},
{
"cve": "CVE-2023-52979",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52979"
},
{
"cve": "CVE-2023-52980",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52980"
},
{
"cve": "CVE-2023-52981",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52981"
},
{
"cve": "CVE-2023-52982",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52982"
},
{
"cve": "CVE-2023-52983",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52983"
},
{
"cve": "CVE-2023-52984",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52984"
},
{
"cve": "CVE-2023-52985",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52985"
},
{
"cve": "CVE-2023-52986",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52986"
},
{
"cve": "CVE-2023-52987",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52987"
},
{
"cve": "CVE-2023-52988",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52988"
},
{
"cve": "CVE-2023-52989",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52989"
},
{
"cve": "CVE-2023-52990",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52990"
},
{
"cve": "CVE-2023-52991",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52991"
},
{
"cve": "CVE-2023-52992",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52992"
},
{
"cve": "CVE-2023-52993",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52993"
},
{
"cve": "CVE-2023-52994",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52994"
},
{
"cve": "CVE-2023-52995",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52995"
},
{
"cve": "CVE-2023-52996",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52996"
},
{
"cve": "CVE-2023-52997",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52997"
},
{
"cve": "CVE-2023-52998",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52998"
},
{
"cve": "CVE-2023-52999",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52999"
},
{
"cve": "CVE-2023-53000",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53000"
},
{
"cve": "CVE-2023-53001",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53001"
},
{
"cve": "CVE-2023-53002",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53002"
},
{
"cve": "CVE-2023-53003",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53003"
},
{
"cve": "CVE-2023-53004",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53004"
},
{
"cve": "CVE-2023-53005",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53005"
},
{
"cve": "CVE-2023-53006",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53006"
},
{
"cve": "CVE-2023-53007",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53007"
},
{
"cve": "CVE-2023-53008",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53008"
},
{
"cve": "CVE-2023-53009",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53009"
},
{
"cve": "CVE-2023-53010",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53010"
},
{
"cve": "CVE-2023-53011",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53011"
},
{
"cve": "CVE-2023-53012",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53012"
},
{
"cve": "CVE-2023-53013",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53013"
},
{
"cve": "CVE-2023-53014",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53014"
},
{
"cve": "CVE-2023-53015",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53015"
},
{
"cve": "CVE-2023-53016",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53016"
},
{
"cve": "CVE-2023-53017",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53017"
},
{
"cve": "CVE-2023-53018",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53018"
},
{
"cve": "CVE-2023-53019",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53019"
},
{
"cve": "CVE-2023-53020",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53020"
},
{
"cve": "CVE-2023-53021",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53021"
},
{
"cve": "CVE-2023-53022",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53022"
},
{
"cve": "CVE-2023-53023",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53023"
},
{
"cve": "CVE-2023-53024",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53024"
},
{
"cve": "CVE-2023-53025",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53025"
},
{
"cve": "CVE-2023-53026",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53026"
},
{
"cve": "CVE-2023-53027",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53027"
},
{
"cve": "CVE-2023-53028",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53028"
},
{
"cve": "CVE-2023-53029",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53029"
},
{
"cve": "CVE-2023-53030",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53030"
},
{
"cve": "CVE-2023-53031",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53031"
},
{
"cve": "CVE-2023-53032",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53032"
},
{
"cve": "CVE-2023-53033",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53033"
},
{
"cve": "CVE-2024-58090",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2024-58090"
},
{
"cve": "CVE-2024-58091",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2024-58091"
},
{
"cve": "CVE-2025-21867",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21867"
},
{
"cve": "CVE-2025-21868",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21868"
},
{
"cve": "CVE-2025-21869",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21869"
},
{
"cve": "CVE-2025-21870",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21870"
},
{
"cve": "CVE-2025-21871",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21871"
},
{
"cve": "CVE-2025-21872",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21872"
},
{
"cve": "CVE-2025-21873",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21873"
},
{
"cve": "CVE-2025-21874",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21874"
},
{
"cve": "CVE-2025-21875",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21875"
},
{
"cve": "CVE-2025-21876",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21876"
},
{
"cve": "CVE-2025-21877",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21877"
},
{
"cve": "CVE-2025-21878",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21878"
},
{
"cve": "CVE-2025-21879",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21879"
},
{
"cve": "CVE-2025-21880",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21880"
},
{
"cve": "CVE-2025-21881",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21881"
},
{
"cve": "CVE-2025-21882",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21882"
},
{
"cve": "CVE-2025-21883",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21883"
},
{
"cve": "CVE-2025-21884",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21884"
},
{
"cve": "CVE-2025-21885",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21885"
},
{
"cve": "CVE-2025-21886",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21886"
},
{
"cve": "CVE-2025-21887",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21887"
},
{
"cve": "CVE-2025-21888",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21888"
},
{
"cve": "CVE-2025-21889",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21889"
},
{
"cve": "CVE-2025-21890",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21890"
},
{
"cve": "CVE-2025-21891",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21891"
},
{
"cve": "CVE-2025-21892",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21892"
}
]
}
BDU:2025-06286
Vulnerability from fstec - Published: 27.03.2025{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Novell Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "18.04 LTS (Ubuntu), 20.04 LTS (Ubuntu), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 22.04 LTS (Ubuntu), \u0434\u043e 6.2 (Linux), 15 SP6 (Suse Linux Enterprise Desktop), 15 SP6 (Suse Linux Enterprise Server), 15 SP6 (SUSE Linux Enterprise Server for SAP Applications), 15.6 (OpenSUSE Leap), \u0434\u043e 5.4.232 (Linux), \u043e\u0442 5.16 \u0434\u043e 6.1.11 (Linux), \u043e\u0442 5.11 \u0434\u043e 5.15.93 (Linux), \u043e\u0442 5.5 \u0434\u043e 5.10.168 (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/stable/c/e5142a4935c1f15841d06047b8130078fc4d7b8f\nhttps://git.kernel.org/stable/c/914e38f02a490dafd980ff0f39cccedc074deb29\nhttps://git.kernel.org/stable/c/97ccfffcc061e54ce87e4a51a40e2e9cb0b7076a\nhttps://git.kernel.org/stable/c/5b25035fb888cb2f78bf0b9c9f95b1dc54480d36\nhttps://git.kernel.org/stable/c/d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u043e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2022-49738\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/CVE-2022-49738\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2022-49738.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.03.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "03.06.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "03.06.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-06286",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-49738",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Ubuntu, Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Linux, Suse Linux Enterprise Desktop, Suse Linux Enterprise Server, SUSE Linux Enterprise Server for SAP Applications, OpenSUSE Leap",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Canonical Ltd. Ubuntu 18.04 LTS , Canonical Ltd. Ubuntu 20.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Canonical Ltd. Ubuntu 22.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 6.2 , Novell Inc. Suse Linux Enterprise Desktop 15 SP6 , Novell Inc. Suse Linux Enterprise Server 15 SP6 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP6 , Novell Inc. OpenSUSE Leap 15.6 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 5.4.232 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.16 \u0434\u043e 6.1.11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.11 \u0434\u043e 5.15.93 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.5 \u0434\u043e 5.10.168 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 f2fs \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 f2fs \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0434\u0430\u043d\u043d\u044b\u0445 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.kernel.org/stable/c/5b25035fb888cb2f78bf0b9c9f95b1dc54480d36\nhttps://git.kernel.org/stable/c/914e38f02a490dafd980ff0f39cccedc074deb29\nhttps://git.kernel.org/stable/c/97ccfffcc061e54ce87e4a51a40e2e9cb0b7076a\nhttps://git.kernel.org/stable/c/d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c\nhttps://git.kernel.org/stable/c/e5142a4935c1f15841d06047b8130078fc4d7b8f\nhttps://redos.red-soft.ru/support/secure/\nhttps://security-tracker.debian.org/tracker/CVE-2022-49738\nhttps://ubuntu.com/security/CVE-2022-49738\nhttps://www.suse.com/security/cve/CVE-2022-49738.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-125",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.