Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-49757 (GCVE-0-2022-49757)
Vulnerability from cvelistv5 – Published: 2025-03-27 16:43 – Updated: 2025-10-01 17:22
VLAI?
EPSS
Title
EDAC/highbank: Fix memory leak in highbank_mc_probe()
Summary
In the Linux kernel, the following vulnerability has been resolved:
EDAC/highbank: Fix memory leak in highbank_mc_probe()
When devres_open_group() fails, it returns -ENOMEM without freeing memory
allocated by edac_mc_alloc().
Call edac_mc_free() on the error handling path to avoid a memory leak.
[ bp: Massage commit message. ]
Severity ?
5.5 (Medium)
CWE
- CWE-401 - Missing Release of Memory after Effective Lifetime
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
a1b01edb274518c7da6d69b84e7558c092282aad , < f1b3e23ed8df87d779ee86ac37f379e79a24169a
(git)
Affected: a1b01edb274518c7da6d69b84e7558c092282aad , < 0db40e23b56d217eebd385bebb64057ef764b2c7 (git) Affected: a1b01edb274518c7da6d69b84e7558c092282aad , < 8d23f5d25264beb223ee79cdb530b88c237719fc (git) Affected: a1b01edb274518c7da6d69b84e7558c092282aad , < 329fbd260352a7b9a83781d8b8bd96f95844a51f (git) Affected: a1b01edb274518c7da6d69b84e7558c092282aad , < caffa7fed1397d1395052272c93900176de86557 (git) Affected: a1b01edb274518c7da6d69b84e7558c092282aad , < b7863ef8a8f0fee96b4eb41211f4918c0e047253 (git) Affected: a1b01edb274518c7da6d69b84e7558c092282aad , < e7a293658c20a7945014570e1921bf7d25d68a36 (git) |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-49757",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-01T17:22:50.831634Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-401",
"description": "CWE-401 Missing Release of Memory after Effective Lifetime",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-01T17:22:53.691Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/edac/highbank_mc_edac.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "f1b3e23ed8df87d779ee86ac37f379e79a24169a",
"status": "affected",
"version": "a1b01edb274518c7da6d69b84e7558c092282aad",
"versionType": "git"
},
{
"lessThan": "0db40e23b56d217eebd385bebb64057ef764b2c7",
"status": "affected",
"version": "a1b01edb274518c7da6d69b84e7558c092282aad",
"versionType": "git"
},
{
"lessThan": "8d23f5d25264beb223ee79cdb530b88c237719fc",
"status": "affected",
"version": "a1b01edb274518c7da6d69b84e7558c092282aad",
"versionType": "git"
},
{
"lessThan": "329fbd260352a7b9a83781d8b8bd96f95844a51f",
"status": "affected",
"version": "a1b01edb274518c7da6d69b84e7558c092282aad",
"versionType": "git"
},
{
"lessThan": "caffa7fed1397d1395052272c93900176de86557",
"status": "affected",
"version": "a1b01edb274518c7da6d69b84e7558c092282aad",
"versionType": "git"
},
{
"lessThan": "b7863ef8a8f0fee96b4eb41211f4918c0e047253",
"status": "affected",
"version": "a1b01edb274518c7da6d69b84e7558c092282aad",
"versionType": "git"
},
{
"lessThan": "e7a293658c20a7945014570e1921bf7d25d68a36",
"status": "affected",
"version": "a1b01edb274518c7da6d69b84e7558c092282aad",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/edac/highbank_mc_edac.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "3.6"
},
{
"lessThan": "3.6",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"version": "4.14.305",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"version": "4.19.272",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.231",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.166",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.91",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.9",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.2",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.305",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.272",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.231",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.166",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.91",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.9",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"versionStartIncluding": "3.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/highbank: Fix memory leak in highbank_mc_probe()\n\nWhen devres_open_group() fails, it returns -ENOMEM without freeing memory\nallocated by edac_mc_alloc().\n\nCall edac_mc_free() on the error handling path to avoid a memory leak.\n\n [ bp: Massage commit message. ]"
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T08:44:44.734Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a"
},
{
"url": "https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7"
},
{
"url": "https://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc"
},
{
"url": "https://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f"
},
{
"url": "https://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557"
},
{
"url": "https://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253"
},
{
"url": "https://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36"
}
],
"title": "EDAC/highbank: Fix memory leak in highbank_mc_probe()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2022-49757",
"datePublished": "2025-03-27T16:43:04.787Z",
"dateReserved": "2025-03-27T16:39:17.989Z",
"dateUpdated": "2025-10-01T17:22:53.691Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-49757\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-03-27T17:15:40.910\",\"lastModified\":\"2025-10-01T18:15:32.873\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nEDAC/highbank: Fix memory leak in highbank_mc_probe()\\n\\nWhen devres_open_group() fails, it returns -ENOMEM without freeing memory\\nallocated by edac_mc_alloc().\\n\\nCall edac_mc_free() on the error handling path to avoid a memory leak.\\n\\n [ bp: Massage commit message. ]\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/highbank: Se corrige la p\u00e9rdida de memoria en highbank_mc_probe(). Cuando devres_open_group() falla, devuelve -ENOMEM sin liberar la memoria asignada por edac_mc_alloc(). Se llama a edac_mc_free() en la ruta de gesti\u00f3n de errores para evitar una p\u00e9rdida de memoria. [bp: Mensaje de confirmaci\u00f3n de Modificaci\u00f3n].\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.6\",\"versionEndExcluding\":\"4.14.305\",\"matchCriteriaId\":\"3DC5C536-62C0-420A-B822-C506B8E6DC4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.272\",\"matchCriteriaId\":\"83C4B95C-BD08-4683-A26E-2A65333F2D15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.231\",\"matchCriteriaId\":\"79CA608C-BC5E-4BB5-9250-771AEC44F412\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.166\",\"matchCriteriaId\":\"A44D9D24-661C-40D4-8735-4CEB1C7C02F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.91\",\"matchCriteriaId\":\"91C2E92D-CC25-4FBD-8824-56A148119D7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.9\",\"matchCriteriaId\":\"ED5B6045-B1D2-4E03-B194-9005A351BCAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF501633-2F44-4913-A8EE-B021929F49F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BDA597B-CAC1-4DF0-86F0-42E142C654E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"725C78C9-12CE-406F-ABE8-0813A01D66E8\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-49757\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-01T17:22:50.831634Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-401\", \"description\": \"CWE-401 Missing Release of Memory after Effective Lifetime\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-01T16:59:31.722Z\"}}], \"cna\": {\"title\": \"EDAC/highbank: Fix memory leak in highbank_mc_probe()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"a1b01edb274518c7da6d69b84e7558c092282aad\", \"lessThan\": \"f1b3e23ed8df87d779ee86ac37f379e79a24169a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1b01edb274518c7da6d69b84e7558c092282aad\", \"lessThan\": \"0db40e23b56d217eebd385bebb64057ef764b2c7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1b01edb274518c7da6d69b84e7558c092282aad\", \"lessThan\": \"8d23f5d25264beb223ee79cdb530b88c237719fc\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1b01edb274518c7da6d69b84e7558c092282aad\", \"lessThan\": \"329fbd260352a7b9a83781d8b8bd96f95844a51f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1b01edb274518c7da6d69b84e7558c092282aad\", \"lessThan\": \"caffa7fed1397d1395052272c93900176de86557\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1b01edb274518c7da6d69b84e7558c092282aad\", \"lessThan\": \"b7863ef8a8f0fee96b4eb41211f4918c0e047253\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1b01edb274518c7da6d69b84e7558c092282aad\", \"lessThan\": \"e7a293658c20a7945014570e1921bf7d25d68a36\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/edac/highbank_mc_edac.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.6\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.6\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.14.305\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.272\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.231\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.166\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.91\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.2\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/edac/highbank_mc_edac.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a\"}, {\"url\": \"https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7\"}, {\"url\": \"https://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc\"}, {\"url\": \"https://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f\"}, {\"url\": \"https://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557\"}, {\"url\": \"https://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253\"}, {\"url\": \"https://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nEDAC/highbank: Fix memory leak in highbank_mc_probe()\\n\\nWhen devres_open_group() fails, it returns -ENOMEM without freeing memory\\nallocated by edac_mc_alloc().\\n\\nCall edac_mc_free() on the error handling path to avoid a memory leak.\\n\\n [ bp: Massage commit message. ]\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.305\", \"versionStartIncluding\": \"3.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.272\", \"versionStartIncluding\": \"3.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.231\", \"versionStartIncluding\": \"3.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.166\", \"versionStartIncluding\": \"3.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.91\", \"versionStartIncluding\": \"3.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.9\", \"versionStartIncluding\": \"3.6\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2\", \"versionStartIncluding\": \"3.6\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T08:44:44.734Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-49757\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-01T17:22:53.691Z\", \"dateReserved\": \"2025-03-27T16:39:17.989Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2025-03-27T16:43:04.787Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
BDU:2025-06303
Vulnerability from fstec - Published: 27.03.2025
VLAI Severity ?
Title
Уязвимость компонентов EDAC/highbank ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость компонентов EDAC/highbank ядра операционной системы Linux. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Severity ?
Vendor
Canonical Ltd., Novell Inc., Сообщество свободного программного обеспечения, ООО «Ред Софт»
Software Name
Ubuntu, Suse Linux Enterprise Desktop, SUSE Linux Enterprise Server for SAP Applications, OpenSUSE Leap, Suse Linux Enterprise Server, Debian GNU/Linux, РЕД ОС (запись в едином реестре российских программ №3751), Linux
Software Version
14.04 LTS (Ubuntu), 16.04 LTS (Ubuntu), 18.04 LTS (Ubuntu), 12 SP4 (Suse Linux Enterprise Desktop), 12 SP2 (SUSE Linux Enterprise Server for SAP Applications), 12 SP4 (SUSE Linux Enterprise Server for SAP Applications), 15.5 (OpenSUSE Leap), 12 SP4 (Suse Linux Enterprise Server), 12 SP2-BCL (Suse Linux Enterprise Server), 12 SP2-ESPOS (Suse Linux Enterprise Server), 15 (SUSE Linux Enterprise Server for SAP Applications), 15 SP1 (SUSE Linux Enterprise Server for SAP Applications), 12 SP2-LTSS (Suse Linux Enterprise Server), 12 SP2 (Suse Linux Enterprise Desktop), 12 SP2 (Suse Linux Enterprise Server), 15-LTSS (Suse Linux Enterprise Server), 20.04 LTS (Ubuntu), 12 SP4-ESPOS (Suse Linux Enterprise Server), 12 SP4-LTSS (Suse Linux Enterprise Server), 15 SP1-BCL (Suse Linux Enterprise Server), 15 SP1-LTSS (Suse Linux Enterprise Server), 15.3 (OpenSUSE Leap), 15 SP1 (Suse Linux Enterprise Server), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 15 SP2 LTSS (Suse Linux Enterprise Server), 7.3 (РЕД ОС), 15.4 (OpenSUSE Leap), 15 SP3 (Suse Linux Enterprise Server), 15 SP3 (SUSE Linux Enterprise Server for SAP Applications), 15 SP3 (Suse Linux Enterprise Desktop), 15 SP2 (Suse Linux Enterprise Server), 15 SP2 (SUSE Linux Enterprise Server for SAP Applications), 15 SP4 (Suse Linux Enterprise Server), 15 SP2 (Suse Linux Enterprise Desktop), 15 SP4 (Suse Linux Enterprise Desktop), 15 (Suse Linux Enterprise Server), 15 SP2-BCL (Suse Linux Enterprise Server), 15 SP4 (SUSE Linux Enterprise Server for SAP Applications), 22.04 LTS (Ubuntu), 15 SP1 (Suse Linux Enterprise Desktop), 15 (Suse Linux Enterprise Desktop), 15 SP3-LTSS (Suse Linux Enterprise Server), 15 SP3-BCL (Suse Linux Enterprise Server), до 6.2 (Linux), 15 SP5 (SUSE Linux Enterprise Server for SAP Applications), 15 SP5 (Suse Linux Enterprise Server), 15 SP5 (Suse Linux Enterprise Desktop), 15 SP4-LTSS (Suse Linux Enterprise Server), 15 SP5-LTSS (Suse Linux Enterprise Server), от 5.16 до 6.1.9 (Linux), от 4.20 до 5.4.231 (Linux), от 3.6 до 4.14.305 (Linux), от 4.15 до 4.19.272 (Linux), от 5.11 до 5.15.91 (Linux), от 5.5 до 5.10.166 (Linux)
Possible Mitigations
В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Linux:
https://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a
https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7
https://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc
https://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f
https://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557
https://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253
https://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36
Для РедоС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2022-49757
Для Ubuntu:
https://ubuntu.com/security/CVE-2022-49757
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2022-49757.html
Reference
https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7
https://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f
https://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc
https://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253
https://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557
https://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36
https://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a
https://redos.red-soft.ru/support/secure/
https://security-tracker.debian.org/tracker/CVE-2022-49757
https://ubuntu.com/security/CVE-2022-49757
https://www.suse.com/security/cve/CVE-2022-49757.html
CWE
CWE-401
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Canonical Ltd., Novell Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "14.04 LTS (Ubuntu), 16.04 LTS (Ubuntu), 18.04 LTS (Ubuntu), 12 SP4 (Suse Linux Enterprise Desktop), 12 SP2 (SUSE Linux Enterprise Server for SAP Applications), 12 SP4 (SUSE Linux Enterprise Server for SAP Applications), 15.5 (OpenSUSE Leap), 12 SP4 (Suse Linux Enterprise Server), 12 SP2-BCL (Suse Linux Enterprise Server), 12 SP2-ESPOS (Suse Linux Enterprise Server), 15 (SUSE Linux Enterprise Server for SAP Applications), 15 SP1 (SUSE Linux Enterprise Server for SAP Applications), 12 SP2-LTSS (Suse Linux Enterprise Server), 12 SP2 (Suse Linux Enterprise Desktop), 12 SP2 (Suse Linux Enterprise Server), 15-LTSS (Suse Linux Enterprise Server), 20.04 LTS (Ubuntu), 12 SP4-ESPOS (Suse Linux Enterprise Server), 12 SP4-LTSS (Suse Linux Enterprise Server), 15 SP1-BCL (Suse Linux Enterprise Server), 15 SP1-LTSS (Suse Linux Enterprise Server), 15.3 (OpenSUSE Leap), 15 SP1 (Suse Linux Enterprise Server), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 15 SP2 LTSS (Suse Linux Enterprise Server), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 15.4 (OpenSUSE Leap), 15 SP3 (Suse Linux Enterprise Server), 15 SP3 (SUSE Linux Enterprise Server for SAP Applications), 15 SP3 (Suse Linux Enterprise Desktop), 15 SP2 (Suse Linux Enterprise Server), 15 SP2 (SUSE Linux Enterprise Server for SAP Applications), 15 SP4 (Suse Linux Enterprise Server), 15 SP2 (Suse Linux Enterprise Desktop), 15 SP4 (Suse Linux Enterprise Desktop), 15 (Suse Linux Enterprise Server), 15 SP2-BCL (Suse Linux Enterprise Server), 15 SP4 (SUSE Linux Enterprise Server for SAP Applications), 22.04 LTS (Ubuntu), 15 SP1 (Suse Linux Enterprise Desktop), 15 (Suse Linux Enterprise Desktop), 15 SP3-LTSS (Suse Linux Enterprise Server), 15 SP3-BCL (Suse Linux Enterprise Server), \u0434\u043e 6.2 (Linux), 15 SP5 (SUSE Linux Enterprise Server for SAP Applications), 15 SP5 (Suse Linux Enterprise Server), 15 SP5 (Suse Linux Enterprise Desktop), 15 SP4-LTSS (Suse Linux Enterprise Server), 15 SP5-LTSS (Suse Linux Enterprise Server), \u043e\u0442 5.16 \u0434\u043e 6.1.9 (Linux), \u043e\u0442 4.20 \u0434\u043e 5.4.231 (Linux), \u043e\u0442 3.6 \u0434\u043e 4.14.305 (Linux), \u043e\u0442 4.15 \u0434\u043e 4.19.272 (Linux), \u043e\u0442 5.11 \u0434\u043e 5.15.91 (Linux), \u043e\u0442 5.5 \u0434\u043e 5.10.166 (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a\nhttps://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7\nhttps://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc\nhttps://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f\nhttps://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557\nhttps://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253\nhttps://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u043e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2022-49757\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/CVE-2022-49757\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2022-49757.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.03.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "03.06.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "03.06.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-06303",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-49757",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Ubuntu, Suse Linux Enterprise Desktop, SUSE Linux Enterprise Server for SAP Applications, OpenSUSE Leap, Suse Linux Enterprise Server, Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Canonical Ltd. Ubuntu 14.04 LTS , Canonical Ltd. Ubuntu 16.04 LTS , Canonical Ltd. Ubuntu 18.04 LTS , Novell Inc. Suse Linux Enterprise Desktop 12 SP4 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP4 , Novell Inc. OpenSUSE Leap 15.5 , Novell Inc. Suse Linux Enterprise Server 12 SP4 , Novell Inc. Suse Linux Enterprise Server 12 SP2-BCL , Novell Inc. Suse Linux Enterprise Server 12 SP2-ESPOS , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP1 , Novell Inc. Suse Linux Enterprise Server 12 SP2-LTSS , Novell Inc. Suse Linux Enterprise Desktop 12 SP2 , Novell Inc. Suse Linux Enterprise Server 12 SP2 , Novell Inc. Suse Linux Enterprise Server 15-LTSS , Canonical Ltd. Ubuntu 20.04 LTS , Novell Inc. Suse Linux Enterprise Server 12 SP4-ESPOS , Novell Inc. Suse Linux Enterprise Server 12 SP4-LTSS , Novell Inc. Suse Linux Enterprise Server 15 SP1-BCL , Novell Inc. Suse Linux Enterprise Server 15 SP1-LTSS , Novell Inc. OpenSUSE Leap 15.3 , Novell Inc. Suse Linux Enterprise Server 15 SP1 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , Novell Inc. Suse Linux Enterprise Server 15 SP2 LTSS , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Novell Inc. OpenSUSE Leap 15.4 , Novell Inc. Suse Linux Enterprise Server 15 SP3 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP3 , Novell Inc. Suse Linux Enterprise Desktop 15 SP3 , Novell Inc. Suse Linux Enterprise Server 15 SP2 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP2 , Novell Inc. Suse Linux Enterprise Server 15 SP4 , Novell Inc. Suse Linux Enterprise Desktop 15 SP2 , Novell Inc. Suse Linux Enterprise Desktop 15 SP4 , Novell Inc. Suse Linux Enterprise Server 15 , Novell Inc. Suse Linux Enterprise Server 15 SP2-BCL , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP4 , Canonical Ltd. Ubuntu 22.04 LTS , Novell Inc. Suse Linux Enterprise Desktop 15 SP1 , Novell Inc. Suse Linux Enterprise Desktop 15 , Novell Inc. Suse Linux Enterprise Server 15 SP3-LTSS , Novell Inc. Suse Linux Enterprise Server 15 SP3-BCL , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 6.2 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP5 , Novell Inc. Suse Linux Enterprise Server 15 SP5 , Novell Inc. Suse Linux Enterprise Desktop 15 SP5 , Novell Inc. Suse Linux Enterprise Server 15 SP4-LTSS , Novell Inc. Suse Linux Enterprise Server 15 SP5-LTSS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.16 \u0434\u043e 6.1.9 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 4.20 \u0434\u043e 5.4.231 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 3.6 \u0434\u043e 4.14.305 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 4.15 \u0434\u043e 4.19.272 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.11 \u0434\u043e 5.15.91 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.5 \u0434\u043e 5.10.166 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 EDAC/highbank \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0435\u0440\u0435\u0434 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0441\u0441\u044b\u043b\u043a\u0438 (\u00ab\u0443\u0442\u0435\u0447\u043a\u0430 \u043f\u0430\u043c\u044f\u0442\u0438\u00bb) (CWE-401)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 EDAC/highbank \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7\nhttps://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f\nhttps://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc\nhttps://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253\nhttps://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557\nhttps://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36\nhttps://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a\nhttps://redos.red-soft.ru/support/secure/\nhttps://security-tracker.debian.org/tracker/CVE-2022-49757\nhttps://ubuntu.com/security/CVE-2022-49757\nhttps://www.suse.com/security/cve/CVE-2022-49757.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-401",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
WID-SEC-W-2025-0649
Vulnerability from csaf_certbund - Published: 2025-03-27 23:00 - Updated: 2026-03-05 23:00Summary
Linux Kernel: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen oder nicht spezifizierte Effekte zu erzielen.
Betroffene Betriebssysteme: - Linux
References
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht spezifizierte Effekte zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0649 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0649.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0649 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0649"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2021-4454",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2021-4454-f4a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49738",
"url": "https://lore.kernel.org/linux-cve-announce/2025032756-CVE-2022-49738-c2ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49739",
"url": "https://lore.kernel.org/linux-cve-announce/2025032756-CVE-2022-49739-a93e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49740",
"url": "https://lore.kernel.org/linux-cve-announce/2025032757-CVE-2022-49740-7f6e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49741",
"url": "https://lore.kernel.org/linux-cve-announce/2025032757-CVE-2022-49741-65a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49742",
"url": "https://lore.kernel.org/linux-cve-announce/2025032757-CVE-2022-49742-e3d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49743",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49743-a049@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49744",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49744-8c5a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49745",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49745-903a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49746",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49746-251b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49747",
"url": "https://lore.kernel.org/linux-cve-announce/2025032759-CVE-2022-49747-f361@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49748",
"url": "https://lore.kernel.org/linux-cve-announce/2025032759-CVE-2022-49748-4658@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49749",
"url": "https://lore.kernel.org/linux-cve-announce/2025032759-CVE-2022-49749-ed85@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49750",
"url": "https://lore.kernel.org/linux-cve-announce/2025032700-CVE-2022-49750-743d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49751",
"url": "https://lore.kernel.org/linux-cve-announce/2025032700-CVE-2022-49751-bf8f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49752",
"url": "https://lore.kernel.org/linux-cve-announce/2025032700-CVE-2022-49752-19a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49753",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49753-d1ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49754",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49754-cc36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49755",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49755-dfb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49756",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49756-7fd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49757",
"url": "https://lore.kernel.org/linux-cve-announce/2025032702-CVE-2022-49757-a990@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49758",
"url": "https://lore.kernel.org/linux-cve-announce/2025032702-CVE-2022-49758-10e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49759",
"url": "https://lore.kernel.org/linux-cve-announce/2025032702-CVE-2022-49759-5392@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49760",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2022-49760-97be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49761",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2022-49761-9b1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52928",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-52928-e380@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52929",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-52929-7900@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52930",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-52930-4bbc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52931",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-52931-593f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52932",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52932-434b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52933",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52933-f292@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52934",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52934-bd3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52935",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52935-1c3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52936",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-52936-d459@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52937",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-52937-605d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52938",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-52938-ee34@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52939",
"url": "https://lore.kernel.org/linux-cve-announce/2025032722-CVE-2023-52939-8bb1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52940",
"url": "https://lore.kernel.org/linux-cve-announce/2025032722-CVE-2023-52940-2e53@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52941",
"url": "https://lore.kernel.org/linux-cve-announce/2025032722-CVE-2023-52941-7c12@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52942",
"url": "https://lore.kernel.org/linux-cve-announce/2025032723-CVE-2023-52942-6a3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52973",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2023-52973-a993@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52974",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52974-0aa2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52975",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52975-155c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52976",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52976-eda3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52977",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52977-f91d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52978",
"url": "https://lore.kernel.org/linux-cve-announce/2025032705-CVE-2023-52978-6a05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52979",
"url": "https://lore.kernel.org/linux-cve-announce/2025032705-CVE-2023-52979-ca3f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52980",
"url": "https://lore.kernel.org/linux-cve-announce/2025032705-CVE-2023-52980-0fea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52981",
"url": "https://lore.kernel.org/linux-cve-announce/2025032706-CVE-2023-52981-070c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52982",
"url": "https://lore.kernel.org/linux-cve-announce/2025032706-CVE-2023-52982-7291@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52983",
"url": "https://lore.kernel.org/linux-cve-announce/2025032706-CVE-2023-52983-4a16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52984",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52984-19ad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52985",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52985-3f52@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52986",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52986-91fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52987",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52987-bcc0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52988",
"url": "https://lore.kernel.org/linux-cve-announce/2025032708-CVE-2023-52988-5520@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52989",
"url": "https://lore.kernel.org/linux-cve-announce/2025032708-CVE-2023-52989-1b68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52990",
"url": "https://lore.kernel.org/linux-cve-announce/2025032708-CVE-2023-52990-befd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52991",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52991-6358@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52992",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52992-bf46@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52993",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52993-3697@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52994",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52994-5336@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52995",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52995-c28f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52996",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52996-7c1f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52997",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52997-dbca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52998",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2023-52998-0671@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52999",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2023-52999-e28e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53000",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2023-53000-fded@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53001",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2023-53001-f28f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53002",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2023-53002-1f76@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53003",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2023-53003-8256@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53004",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53004-e58b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53005",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53005-9bf0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53006",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53006-209f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53007",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53007-6ed4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53008",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2023-53008-415c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53009",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2023-53009-82cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53010",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2023-53010-56af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53011",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2023-53011-6f98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53012",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2023-53012-597c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53013",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2023-53013-58dc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53014",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53014-700f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53015",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53015-f139@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53016",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53016-f30c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53017",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53017-8dd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53018",
"url": "https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53018-c89c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53019",
"url": "https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53019-441a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53020",
"url": "https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53020-1042@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53021",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-53021-def9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53022",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-53022-b539@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53023",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-53023-ef4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53024",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53024-8d19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53025",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53025-5662@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53026",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53026-0e24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53027",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53027-dc56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53028",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53028-8be6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53029",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53029-a670@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53030",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53030-ba50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53031",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-53031-39cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53032",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-53032-70ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53033",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-53033-9089@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-58090",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2024-58090-fddc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-58091",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2024-58091-a2a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21867",
"url": "https://lore.kernel.org/linux-cve-announce/2025032732-CVE-2025-21867-3138@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21868",
"url": "https://lore.kernel.org/linux-cve-announce/2025032734-CVE-2025-21868-ef4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21869",
"url": "https://lore.kernel.org/linux-cve-announce/2025032734-CVE-2025-21869-b4a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21870",
"url": "https://lore.kernel.org/linux-cve-announce/2025032735-CVE-2025-21870-4c78@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21871",
"url": "https://lore.kernel.org/linux-cve-announce/2025032735-CVE-2025-21871-bb8c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21872",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2025-21872-574e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21873",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2025-21873-311e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21874",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2025-21874-d5d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21875",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2025-21875-8eca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21876",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2025-21876-6c2f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21877",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21877-de70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21878",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21878-3c82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21879",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21879-f338@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21880",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21880-f716@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21881",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2025-21881-7a0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21882",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2025-21882-cc4d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21883",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2025-21883-8b73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21884",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2025-21884-b70c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21885",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2025-21885-be9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21886",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2025-21886-9ca3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21887",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21887-48e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21888",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21888-0f83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21889",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21889-0913@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21890",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21890-f286@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21891",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2025-21891-8717@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21892",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2025-21892-12a2@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1195-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020680.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1194-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1263-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q4U3LRNKLFTX56NC6NKHFDU35E5WDD75/"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2025-04-16",
"url": "https://cloud.google.com/container-optimized-os/docs/release-notes#April_14_2025"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1975 vom 2025-04-30",
"url": "https://alas.aws.amazon.com/ALAS-2025-1975.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-100 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-100.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-089 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-089.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2834 vom 2025-04-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2834.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2837 vom 2025-04-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2837.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7514-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7516-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1574-1 vom 2025-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1573-1 vom 2025-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7512-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7517-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7518-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7521-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7522-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7516-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7511-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01627-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020866.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7516-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7517-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01633-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
"url": "https://ubuntu.com/security/notices/USN-7516-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-2 vom 2025-05-22",
"url": "https://ubuntu.com/security/notices/USN-7521-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7517-3"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7516-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
"url": "https://ubuntu.com/security/notices/USN-7510-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7510-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-3 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7521-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7510-8"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-9"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-8"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-7"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01918-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9079 vom 2025-06-16",
"url": "https://access.redhat.com/errata/RHSA-2025:9079"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9302 vom 2025-06-23",
"url": "https://access.redhat.com/errata/RHSA-2025:9302"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-103 vom 2025-06-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-103.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9302 vom 2025-06-24",
"url": "https://linux.oracle.com/errata/ELSA-2025-9302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02099-1 vom 2025-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021644.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9580 vom 2025-06-26",
"url": "https://linux.oracle.com/errata/ELSA-2025-9580.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9880 vom 2025-06-30",
"url": "https://access.redhat.com/errata/RHSA-2025:9880"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9896 vom 2025-06-30",
"url": "https://access.redhat.com/errata/RHSA-2025:9896"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-103 vom 2025-06-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-103.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9880 vom 2025-07-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-9880.html"
},
{
"category": "external",
"summary": "SEM 2025.2.1 release notes vom 2025-07-02",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9896 vom 2025-07-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-9896.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9079 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-9079.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10379 vom 2025-07-07",
"url": "https://access.redhat.com/errata/RHSA-2025:10379"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10527 vom 2025-07-07",
"url": "https://access.redhat.com/errata/RHSA-2025:10527"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-10379 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-10379.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02262-1 vom 2025-07-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B53IHD74IRNJDAOHBW4L7JGWNOM26XE7/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-082 vom 2025-07-10",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-082.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10830 vom 2025-07-14",
"url": "https://access.redhat.com/errata/RHSA-2025:10830"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10829 vom 2025-07-14",
"url": "https://access.redhat.com/errata/RHSA-2025:10829"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11045 vom 2025-07-15",
"url": "https://access.redhat.com/errata/RHSA-2025:11045"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02312-1 vom 2025-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021806.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11245 vom 2025-07-16",
"url": "https://access.redhat.com/errata/RHSA-2025:11245"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7640-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11455 vom 2025-07-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-11455.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-097 vom 2025-07-23",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-097.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11810 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11810"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-2 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-1 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-3 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13",
"url": "https://ubuntu.com/security/notices/USN-7685-5"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13962 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:13962"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14009 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:14009"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-1 vom 2025-08-19",
"url": "https://ubuntu.com/security/notices/USN-7701-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-1 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7703-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-2 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7701-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13962 vom 2025-08-20",
"url": "https://linux.oracle.com/errata/ELSA-2025-13962.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-2 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7703-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-3 vom 2025-08-21",
"url": "https://ubuntu.com/security/notices/USN-7701-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-3 vom 2025-08-21",
"url": "https://ubuntu.com/security/notices/USN-7703-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14009 vom 2025-08-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-14009.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14696 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14696"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14691 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14691"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7719-1 vom 2025-08-26",
"url": "https://ubuntu.com/security/notices/USN-7719-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7725-2 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7725-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7725-1 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7725-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-4 vom 2025-08-28",
"url": "https://ubuntu.com/security/notices/USN-7703-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15016 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:15016"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7725-3 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7725-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03",
"url": "https://ubuntu.com/security/notices/USN-7737-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03204-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022522.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3001 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7764-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7764-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7765-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7765-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7766-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7766-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7767-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7767-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-2 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-3 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7776-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7776-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7775-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7779-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7779-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7764-2 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7764-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7767-2 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7767-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-2 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7775-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-3 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7775-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-4 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7774-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7790-1 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7790-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7802-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7802-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7801-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7800-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7800-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-2 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7801-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-5 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7774-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7809-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7809-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0115-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/LSN-0115-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7819-1 vom 2025-10-13",
"url": "https://ubuntu.com/security/notices/USN-7819-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20662 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20662.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-3 vom 2025-10-15",
"url": "https://ubuntu.com/security/notices/USN-7801-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7832-1 vom 2025-10-21",
"url": "https://ubuntu.com/security/notices/USN-7832-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7819-2 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7819-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-404 vom 2025-10-31",
"url": "https://www.dell.com/support/kbdoc/000385435"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-2 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7910-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7910-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7911-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7911-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-4 vom 2025-12-05",
"url": "https://ubuntu.com/security/notices/USN-7909-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7933-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7933-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-5 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7909-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7938-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7938-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0140-1 vom 2026-01-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-030 vom 2026-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-1 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8031-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0475-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20326-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0495-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20332-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20309-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20328-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20316-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20330-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20327-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20325-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20294-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20300-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-3 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-4 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50113 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-50113.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-2 vom 2026-02-18",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-3 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-1 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-2 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-8 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50133 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-50133.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-2 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20560-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-05T23:00:00.000+00:00",
"generator": {
"date": "2026-03-06T10:29:59.187+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-0649",
"initial_release_date": "2025-03-27T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-14T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu, Debian und SUSE aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE, Ubuntu und Debian aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-17T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-22T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2025-06-24T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Amazon und Oracle Linux aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-07T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-13T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "48",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-20T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-21T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-26T22:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-01T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-24T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-25T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-08T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-14T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von SUSE und Dell aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von Ubuntu und Debian aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "109"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Virtual Edition",
"product": {
"name": "Dell NetWorker Virtual Edition",
"product_id": "T048226",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual_edition"
}
}
},
{
"category": "product_version_range",
"name": "vProxy \u003c19.14",
"product": {
"name": "Dell NetWorker vProxy \u003c19.14",
"product_id": "T050451"
}
},
{
"category": "product_version",
"name": "vProxy 19.14",
"product": {
"name": "Dell NetWorker vProxy 19.14",
"product_id": "T050451-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.14"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T042207",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager \u003c2025.2.1",
"product_id": "T044986"
}
},
{
"category": "product_version",
"name": "2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager 2025.2.1",
"product_id": "T044986-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4454",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2021-4454"
},
{
"cve": "CVE-2022-49738",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49738"
},
{
"cve": "CVE-2022-49739",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49739"
},
{
"cve": "CVE-2022-49740",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49740"
},
{
"cve": "CVE-2022-49741",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49741"
},
{
"cve": "CVE-2022-49742",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49742"
},
{
"cve": "CVE-2022-49743",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49743"
},
{
"cve": "CVE-2022-49744",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49744"
},
{
"cve": "CVE-2022-49745",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49745"
},
{
"cve": "CVE-2022-49746",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49746"
},
{
"cve": "CVE-2022-49747",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49747"
},
{
"cve": "CVE-2022-49748",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49748"
},
{
"cve": "CVE-2022-49749",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49749"
},
{
"cve": "CVE-2022-49750",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49750"
},
{
"cve": "CVE-2022-49751",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49751"
},
{
"cve": "CVE-2022-49752",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49752"
},
{
"cve": "CVE-2022-49753",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49753"
},
{
"cve": "CVE-2022-49754",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49754"
},
{
"cve": "CVE-2022-49755",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49755"
},
{
"cve": "CVE-2022-49756",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49756"
},
{
"cve": "CVE-2022-49757",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49757"
},
{
"cve": "CVE-2022-49758",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49758"
},
{
"cve": "CVE-2022-49759",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49759"
},
{
"cve": "CVE-2022-49760",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49760"
},
{
"cve": "CVE-2022-49761",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49761"
},
{
"cve": "CVE-2023-0179",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-0179"
},
{
"cve": "CVE-2023-52928",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52928"
},
{
"cve": "CVE-2023-52929",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52929"
},
{
"cve": "CVE-2023-52930",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52930"
},
{
"cve": "CVE-2023-52931",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52931"
},
{
"cve": "CVE-2023-52932",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52932"
},
{
"cve": "CVE-2023-52933",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52933"
},
{
"cve": "CVE-2023-52934",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52934"
},
{
"cve": "CVE-2023-52935",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52935"
},
{
"cve": "CVE-2023-52936",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52936"
},
{
"cve": "CVE-2023-52937",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52937"
},
{
"cve": "CVE-2023-52938",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52938"
},
{
"cve": "CVE-2023-52939",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52939"
},
{
"cve": "CVE-2023-52940",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52940"
},
{
"cve": "CVE-2023-52941",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52941"
},
{
"cve": "CVE-2023-52942",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52942"
},
{
"cve": "CVE-2023-52973",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52973"
},
{
"cve": "CVE-2023-52974",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52974"
},
{
"cve": "CVE-2023-52975",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52975"
},
{
"cve": "CVE-2023-52976",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52976"
},
{
"cve": "CVE-2023-52977",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52977"
},
{
"cve": "CVE-2023-52978",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52978"
},
{
"cve": "CVE-2023-52979",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52979"
},
{
"cve": "CVE-2023-52980",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52980"
},
{
"cve": "CVE-2023-52981",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52981"
},
{
"cve": "CVE-2023-52982",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52982"
},
{
"cve": "CVE-2023-52983",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52983"
},
{
"cve": "CVE-2023-52984",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52984"
},
{
"cve": "CVE-2023-52985",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52985"
},
{
"cve": "CVE-2023-52986",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52986"
},
{
"cve": "CVE-2023-52987",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52987"
},
{
"cve": "CVE-2023-52988",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52988"
},
{
"cve": "CVE-2023-52989",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52989"
},
{
"cve": "CVE-2023-52990",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52990"
},
{
"cve": "CVE-2023-52991",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52991"
},
{
"cve": "CVE-2023-52992",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52992"
},
{
"cve": "CVE-2023-52993",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52993"
},
{
"cve": "CVE-2023-52994",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52994"
},
{
"cve": "CVE-2023-52995",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52995"
},
{
"cve": "CVE-2023-52996",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52996"
},
{
"cve": "CVE-2023-52997",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52997"
},
{
"cve": "CVE-2023-52998",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52998"
},
{
"cve": "CVE-2023-52999",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52999"
},
{
"cve": "CVE-2023-53000",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53000"
},
{
"cve": "CVE-2023-53001",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53001"
},
{
"cve": "CVE-2023-53002",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53002"
},
{
"cve": "CVE-2023-53003",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53003"
},
{
"cve": "CVE-2023-53004",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53004"
},
{
"cve": "CVE-2023-53005",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53005"
},
{
"cve": "CVE-2023-53006",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53006"
},
{
"cve": "CVE-2023-53007",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53007"
},
{
"cve": "CVE-2023-53008",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53008"
},
{
"cve": "CVE-2023-53009",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53009"
},
{
"cve": "CVE-2023-53010",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53010"
},
{
"cve": "CVE-2023-53011",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53011"
},
{
"cve": "CVE-2023-53012",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53012"
},
{
"cve": "CVE-2023-53013",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53013"
},
{
"cve": "CVE-2023-53014",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53014"
},
{
"cve": "CVE-2023-53015",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53015"
},
{
"cve": "CVE-2023-53016",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53016"
},
{
"cve": "CVE-2023-53017",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53017"
},
{
"cve": "CVE-2023-53018",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53018"
},
{
"cve": "CVE-2023-53019",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53019"
},
{
"cve": "CVE-2023-53020",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53020"
},
{
"cve": "CVE-2023-53021",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53021"
},
{
"cve": "CVE-2023-53022",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53022"
},
{
"cve": "CVE-2023-53023",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53023"
},
{
"cve": "CVE-2023-53024",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53024"
},
{
"cve": "CVE-2023-53025",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53025"
},
{
"cve": "CVE-2023-53026",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53026"
},
{
"cve": "CVE-2023-53027",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53027"
},
{
"cve": "CVE-2023-53028",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53028"
},
{
"cve": "CVE-2023-53029",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53029"
},
{
"cve": "CVE-2023-53030",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53030"
},
{
"cve": "CVE-2023-53031",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53031"
},
{
"cve": "CVE-2023-53032",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53032"
},
{
"cve": "CVE-2023-53033",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53033"
},
{
"cve": "CVE-2024-58090",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2024-58090"
},
{
"cve": "CVE-2024-58091",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2024-58091"
},
{
"cve": "CVE-2025-21867",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21867"
},
{
"cve": "CVE-2025-21868",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21868"
},
{
"cve": "CVE-2025-21869",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21869"
},
{
"cve": "CVE-2025-21870",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21870"
},
{
"cve": "CVE-2025-21871",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21871"
},
{
"cve": "CVE-2025-21872",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21872"
},
{
"cve": "CVE-2025-21873",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21873"
},
{
"cve": "CVE-2025-21874",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21874"
},
{
"cve": "CVE-2025-21875",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21875"
},
{
"cve": "CVE-2025-21876",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21876"
},
{
"cve": "CVE-2025-21877",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21877"
},
{
"cve": "CVE-2025-21878",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21878"
},
{
"cve": "CVE-2025-21879",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21879"
},
{
"cve": "CVE-2025-21880",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21880"
},
{
"cve": "CVE-2025-21881",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21881"
},
{
"cve": "CVE-2025-21882",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21882"
},
{
"cve": "CVE-2025-21883",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21883"
},
{
"cve": "CVE-2025-21884",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21884"
},
{
"cve": "CVE-2025-21885",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21885"
},
{
"cve": "CVE-2025-21886",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21886"
},
{
"cve": "CVE-2025-21887",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21887"
},
{
"cve": "CVE-2025-21888",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21888"
},
{
"cve": "CVE-2025-21889",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21889"
},
{
"cve": "CVE-2025-21890",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21890"
},
{
"cve": "CVE-2025-21891",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21891"
},
{
"cve": "CVE-2025-21892",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21892"
}
]
}
GHSA-XVXR-RRXW-RFP9
Vulnerability from github – Published: 2025-03-27 18:31 – Updated: 2025-04-15 15:30
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
EDAC/highbank: Fix memory leak in highbank_mc_probe()
When devres_open_group() fails, it returns -ENOMEM without freeing memory allocated by edac_mc_alloc().
Call edac_mc_free() on the error handling path to avoid a memory leak.
[ bp: Massage commit message. ]
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2022-49757"
],
"database_specific": {
"cwe_ids": [
"CWE-401"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-03-27T17:15:40Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/highbank: Fix memory leak in highbank_mc_probe()\n\nWhen devres_open_group() fails, it returns -ENOMEM without freeing memory\nallocated by edac_mc_alloc().\n\nCall edac_mc_free() on the error handling path to avoid a memory leak.\n\n [ bp: Massage commit message. ]",
"id": "GHSA-xvxr-rrxw-rfp9",
"modified": "2025-04-15T15:30:46Z",
"published": "2025-03-27T18:31:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49757"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2022-49757
Vulnerability from fkie_nvd - Published: 2025-03-27 17:15 - Updated: 2025-10-01 18:15
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
In the Linux kernel, the following vulnerability has been resolved:
EDAC/highbank: Fix memory leak in highbank_mc_probe()
When devres_open_group() fails, it returns -ENOMEM without freeing memory
allocated by edac_mc_alloc().
Call edac_mc_free() on the error handling path to avoid a memory leak.
[ bp: Massage commit message. ]
References
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a | Patch |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.2 | |
| linux | linux_kernel | 6.2 | |
| linux | linux_kernel | 6.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC5C536-62C0-420A-B822-C506B8E6DC4D",
"versionEndExcluding": "4.14.305",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83C4B95C-BD08-4683-A26E-2A65333F2D15",
"versionEndExcluding": "4.19.272",
"versionStartIncluding": "4.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79CA608C-BC5E-4BB5-9250-771AEC44F412",
"versionEndExcluding": "5.4.231",
"versionStartIncluding": "4.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A44D9D24-661C-40D4-8735-4CEB1C7C02F2",
"versionEndExcluding": "5.10.166",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91C2E92D-CC25-4FBD-8824-56A148119D7E",
"versionEndExcluding": "5.15.91",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED5B6045-B1D2-4E03-B194-9005A351BCAE",
"versionEndExcluding": "6.1.9",
"versionStartIncluding": "5.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/highbank: Fix memory leak in highbank_mc_probe()\n\nWhen devres_open_group() fails, it returns -ENOMEM without freeing memory\nallocated by edac_mc_alloc().\n\nCall edac_mc_free() on the error handling path to avoid a memory leak.\n\n [ bp: Massage commit message. ]"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/highbank: Se corrige la p\u00e9rdida de memoria en highbank_mc_probe(). Cuando devres_open_group() falla, devuelve -ENOMEM sin liberar la memoria asignada por edac_mc_alloc(). Se llama a edac_mc_free() en la ruta de gesti\u00f3n de errores para evitar una p\u00e9rdida de memoria. [bp: Mensaje de confirmaci\u00f3n de Modificaci\u00f3n]."
}
],
"id": "CVE-2022-49757",
"lastModified": "2025-10-01T18:15:32.873",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-27T17:15:40.910",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…