Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-50476 (GCVE-0-2022-50476)
Vulnerability from cvelistv5 – Published: 2025-10-04 15:16 – Updated: 2025-10-04 15:16| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
548c237c0a9972df5d1afaca38aa733ee577128d , < d4460c82177899751975180c268f352893302221
(git)
Affected: 548c237c0a9972df5d1afaca38aa733ee577128d , < dd860b39aa7c7b82e6c99b6fdb99d4610ce49d67 (git) Affected: 548c237c0a9972df5d1afaca38aa733ee577128d , < 8b78493968ed3cef0326183ed059c55e42f24d5b (git) Affected: 548c237c0a9972df5d1afaca38aa733ee577128d , < a6b9e09403102bdf8402dae734800e4916c7ea58 (git) Affected: 548c237c0a9972df5d1afaca38aa733ee577128d , < 13286ad1c7c49c606fdcba4cf66f953a1a16c1ca (git) Affected: 548c237c0a9972df5d1afaca38aa733ee577128d , < 21296a52caa6a6bad6debdfe40ad81d4f1a27e69 (git) Affected: 548c237c0a9972df5d1afaca38aa733ee577128d , < 14d245da57a11e80277ab455aa9b6dcc5ed38a19 (git) Affected: 548c237c0a9972df5d1afaca38aa733ee577128d , < 07e28a8f450217db679802ebd4de0915556ce846 (git) Affected: 548c237c0a9972df5d1afaca38aa733ee577128d , < 5f7d78b2b12a9d561f48fa00bab29b40f4616dad (git) |
|||||||
|
|||||||||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/ntb_netdev.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "d4460c82177899751975180c268f352893302221",
"status": "affected",
"version": "548c237c0a9972df5d1afaca38aa733ee577128d",
"versionType": "git"
},
{
"lessThan": "dd860b39aa7c7b82e6c99b6fdb99d4610ce49d67",
"status": "affected",
"version": "548c237c0a9972df5d1afaca38aa733ee577128d",
"versionType": "git"
},
{
"lessThan": "8b78493968ed3cef0326183ed059c55e42f24d5b",
"status": "affected",
"version": "548c237c0a9972df5d1afaca38aa733ee577128d",
"versionType": "git"
},
{
"lessThan": "a6b9e09403102bdf8402dae734800e4916c7ea58",
"status": "affected",
"version": "548c237c0a9972df5d1afaca38aa733ee577128d",
"versionType": "git"
},
{
"lessThan": "13286ad1c7c49c606fdcba4cf66f953a1a16c1ca",
"status": "affected",
"version": "548c237c0a9972df5d1afaca38aa733ee577128d",
"versionType": "git"
},
{
"lessThan": "21296a52caa6a6bad6debdfe40ad81d4f1a27e69",
"status": "affected",
"version": "548c237c0a9972df5d1afaca38aa733ee577128d",
"versionType": "git"
},
{
"lessThan": "14d245da57a11e80277ab455aa9b6dcc5ed38a19",
"status": "affected",
"version": "548c237c0a9972df5d1afaca38aa733ee577128d",
"versionType": "git"
},
{
"lessThan": "07e28a8f450217db679802ebd4de0915556ce846",
"status": "affected",
"version": "548c237c0a9972df5d1afaca38aa733ee577128d",
"versionType": "git"
},
{
"lessThan": "5f7d78b2b12a9d561f48fa00bab29b40f4616dad",
"status": "affected",
"version": "548c237c0a9972df5d1afaca38aa733ee577128d",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/ntb_netdev.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "3.9"
},
{
"lessThan": "3.9",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"version": "4.9.337",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"version": "4.14.303",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"version": "4.19.270",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.229",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.163",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.86",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.0.*",
"status": "unaffected",
"version": "6.0.16",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.2",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.337",
"versionStartIncluding": "3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.303",
"versionStartIncluding": "3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.270",
"versionStartIncluding": "3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.229",
"versionStartIncluding": "3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.163",
"versionStartIncluding": "3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.86",
"versionStartIncluding": "3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.16",
"versionStartIncluding": "3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.2",
"versionStartIncluding": "3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"versionStartIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nntb_netdev: Use dev_kfree_skb_any() in interrupt context\n\nTX/RX callback handlers (ntb_netdev_tx_handler(),\nntb_netdev_rx_handler()) can be called in interrupt\ncontext via the DMA framework when the respective\nDMA operations have completed. As such, any calls\nby these routines to free skb\u0027s, should use the\ninterrupt context safe dev_kfree_skb_any() function.\n\nPreviously, these callback handlers would call the\ninterrupt unsafe version of dev_kfree_skb(). This has\nnot presented an issue on Intel IOAT DMA engines as\nthat driver utilizes tasklets rather than a hard\ninterrupt handler, like the AMD PTDMA DMA driver.\nOn AMD systems, a kernel WARNING message is\nencountered, which is being issued from\nskb_release_head_state() due to in_hardirq()\nbeing true.\n\nBesides the user visible WARNING from the kernel,\nthe other symptom of this bug was that TCP/IP performance\nacross the ntb_netdev interface was very poor, i.e.\napproximately an order of magnitude below what was\nexpected. With the repair to use dev_kfree_skb_any(),\nkernel WARNINGs from skb_release_head_state() ceased\nand TCP/IP performance, as measured by iperf, was on\npar with expected results, approximately 20 Gb/s on\nAMD Milan based server. Note that this performance\nis comparable with Intel based servers."
}
],
"providerMetadata": {
"dateUpdated": "2025-10-04T15:16:36.895Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/d4460c82177899751975180c268f352893302221"
},
{
"url": "https://git.kernel.org/stable/c/dd860b39aa7c7b82e6c99b6fdb99d4610ce49d67"
},
{
"url": "https://git.kernel.org/stable/c/8b78493968ed3cef0326183ed059c55e42f24d5b"
},
{
"url": "https://git.kernel.org/stable/c/a6b9e09403102bdf8402dae734800e4916c7ea58"
},
{
"url": "https://git.kernel.org/stable/c/13286ad1c7c49c606fdcba4cf66f953a1a16c1ca"
},
{
"url": "https://git.kernel.org/stable/c/21296a52caa6a6bad6debdfe40ad81d4f1a27e69"
},
{
"url": "https://git.kernel.org/stable/c/14d245da57a11e80277ab455aa9b6dcc5ed38a19"
},
{
"url": "https://git.kernel.org/stable/c/07e28a8f450217db679802ebd4de0915556ce846"
},
{
"url": "https://git.kernel.org/stable/c/5f7d78b2b12a9d561f48fa00bab29b40f4616dad"
}
],
"title": "ntb_netdev: Use dev_kfree_skb_any() in interrupt context",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2022-50476",
"datePublished": "2025-10-04T15:16:36.895Z",
"dateReserved": "2025-10-04T15:13:33.467Z",
"dateUpdated": "2025-10-04T15:16:36.895Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-50476\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-04T16:15:44.177\",\"lastModified\":\"2026-01-23T16:35:23.300\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nntb_netdev: Use dev_kfree_skb_any() in interrupt context\\n\\nTX/RX callback handlers (ntb_netdev_tx_handler(),\\nntb_netdev_rx_handler()) can be called in interrupt\\ncontext via the DMA framework when the respective\\nDMA operations have completed. As such, any calls\\nby these routines to free skb\u0027s, should use the\\ninterrupt context safe dev_kfree_skb_any() function.\\n\\nPreviously, these callback handlers would call the\\ninterrupt unsafe version of dev_kfree_skb(). This has\\nnot presented an issue on Intel IOAT DMA engines as\\nthat driver utilizes tasklets rather than a hard\\ninterrupt handler, like the AMD PTDMA DMA driver.\\nOn AMD systems, a kernel WARNING message is\\nencountered, which is being issued from\\nskb_release_head_state() due to in_hardirq()\\nbeing true.\\n\\nBesides the user visible WARNING from the kernel,\\nthe other symptom of this bug was that TCP/IP performance\\nacross the ntb_netdev interface was very poor, i.e.\\napproximately an order of magnitude below what was\\nexpected. With the repair to use dev_kfree_skb_any(),\\nkernel WARNINGs from skb_release_head_state() ceased\\nand TCP/IP performance, as measured by iperf, was on\\npar with expected results, approximately 20 Gb/s on\\nAMD Milan based server. Note that this performance\\nis comparable with Intel based servers.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.9\",\"versionEndExcluding\":\"4.9.337\",\"matchCriteriaId\":\"0E0273F2-224A-448F-92F6-D08F1E18B7CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.303\",\"matchCriteriaId\":\"1E7450AD-4739-46F0-B81B-C02E7B35A97B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.270\",\"matchCriteriaId\":\"AE8904A3-99BE-4E49-9682-1F90A6373F4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.229\",\"matchCriteriaId\":\"A0C0D95E-414A-445E-941B-3EF6A4D3A093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.163\",\"matchCriteriaId\":\"D05D31FC-BD74-4F9E-B1D8-9CED62BE6F65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.86\",\"matchCriteriaId\":\"47237296-55D1-4ED4-8075-D00FC85A61EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.0.16\",\"matchCriteriaId\":\"C720A569-3D93-4D77-95F6-E2B3A3267D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1\",\"versionEndExcluding\":\"6.1.2\",\"matchCriteriaId\":\"77239F4B-6BB2-4B9E-A654-36A52396116C\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/07e28a8f450217db679802ebd4de0915556ce846\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/13286ad1c7c49c606fdcba4cf66f953a1a16c1ca\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/14d245da57a11e80277ab455aa9b6dcc5ed38a19\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/21296a52caa6a6bad6debdfe40ad81d4f1a27e69\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5f7d78b2b12a9d561f48fa00bab29b40f4616dad\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8b78493968ed3cef0326183ed059c55e42f24d5b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a6b9e09403102bdf8402dae734800e4916c7ea58\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d4460c82177899751975180c268f352893302221\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/dd860b39aa7c7b82e6c99b6fdb99d4610ce49d67\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
GHSA-GH9Q-398W-69GX
Vulnerability from github – Published: 2025-10-04 18:31 – Updated: 2026-01-23 18:31In the Linux kernel, the following vulnerability has been resolved:
ntb_netdev: Use dev_kfree_skb_any() in interrupt context
TX/RX callback handlers (ntb_netdev_tx_handler(), ntb_netdev_rx_handler()) can be called in interrupt context via the DMA framework when the respective DMA operations have completed. As such, any calls by these routines to free skb's, should use the interrupt context safe dev_kfree_skb_any() function.
Previously, these callback handlers would call the interrupt unsafe version of dev_kfree_skb(). This has not presented an issue on Intel IOAT DMA engines as that driver utilizes tasklets rather than a hard interrupt handler, like the AMD PTDMA DMA driver. On AMD systems, a kernel WARNING message is encountered, which is being issued from skb_release_head_state() due to in_hardirq() being true.
Besides the user visible WARNING from the kernel, the other symptom of this bug was that TCP/IP performance across the ntb_netdev interface was very poor, i.e. approximately an order of magnitude below what was expected. With the repair to use dev_kfree_skb_any(), kernel WARNINGs from skb_release_head_state() ceased and TCP/IP performance, as measured by iperf, was on par with expected results, approximately 20 Gb/s on AMD Milan based server. Note that this performance is comparable with Intel based servers.
{
"affected": [],
"aliases": [
"CVE-2022-50476"
],
"database_specific": {
"cwe_ids": [
"CWE-401"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-04T16:15:44Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nntb_netdev: Use dev_kfree_skb_any() in interrupt context\n\nTX/RX callback handlers (ntb_netdev_tx_handler(),\nntb_netdev_rx_handler()) can be called in interrupt\ncontext via the DMA framework when the respective\nDMA operations have completed. As such, any calls\nby these routines to free skb\u0027s, should use the\ninterrupt context safe dev_kfree_skb_any() function.\n\nPreviously, these callback handlers would call the\ninterrupt unsafe version of dev_kfree_skb(). This has\nnot presented an issue on Intel IOAT DMA engines as\nthat driver utilizes tasklets rather than a hard\ninterrupt handler, like the AMD PTDMA DMA driver.\nOn AMD systems, a kernel WARNING message is\nencountered, which is being issued from\nskb_release_head_state() due to in_hardirq()\nbeing true.\n\nBesides the user visible WARNING from the kernel,\nthe other symptom of this bug was that TCP/IP performance\nacross the ntb_netdev interface was very poor, i.e.\napproximately an order of magnitude below what was\nexpected. With the repair to use dev_kfree_skb_any(),\nkernel WARNINGs from skb_release_head_state() ceased\nand TCP/IP performance, as measured by iperf, was on\npar with expected results, approximately 20 Gb/s on\nAMD Milan based server. Note that this performance\nis comparable with Intel based servers.",
"id": "GHSA-gh9q-398w-69gx",
"modified": "2026-01-23T18:31:23Z",
"published": "2025-10-04T18:31:13Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50476"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/07e28a8f450217db679802ebd4de0915556ce846"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/13286ad1c7c49c606fdcba4cf66f953a1a16c1ca"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/14d245da57a11e80277ab455aa9b6dcc5ed38a19"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/21296a52caa6a6bad6debdfe40ad81d4f1a27e69"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/5f7d78b2b12a9d561f48fa00bab29b40f4616dad"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/8b78493968ed3cef0326183ed059c55e42f24d5b"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a6b9e09403102bdf8402dae734800e4916c7ea58"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d4460c82177899751975180c268f352893302221"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/dd860b39aa7c7b82e6c99b6fdb99d4610ce49d67"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-2194
Vulnerability from csaf_certbund - Published: 2025-10-05 22:00 - Updated: 2026-03-05 23:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2194 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2194.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2194 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2194"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50470",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2022-50470-e56f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50471",
"url": "https://lore.kernel.org/linux-cve-announce/2025100436-CVE-2022-50471-a799@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50472",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50472-5d91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50473",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50473-a1fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50474",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50474-7639@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50475",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50475-b3ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50476",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50476-f1b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50477",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50477-1815@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50478",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50478-81f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50479",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50479-de1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50480",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50480-f296@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50481",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50481-3d22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50482",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50482-0291@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50483",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50483-b6b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50484",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50484-1a6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50485",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50485-9d4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50486",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50486-da3d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50487",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50487-f5ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50488",
"url": "https://lore.kernel.org/linux-cve-announce/2025100413-CVE-2022-50488-32e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50489",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50489-9d88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50490",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50490-dcd3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50491",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50491-7a8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50492",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50492-19b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50493",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50493-2b70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50494",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50494-00a0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50495",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50495-fdee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50496",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50496-6e44@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50497",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50497-0aee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50498",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50498-c9ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50499",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50499-9f94@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50500",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50500-787b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50501",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50501-1b81@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50502",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2022-50502-c819@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50503",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2022-50503-6c75@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50504",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50504-d655@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50505",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50505-b427@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50506",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50506-1642@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50507",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2022-50507-9739@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50508",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2022-50508-dd1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53533",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2023-53533-7fbb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53534",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53534-9260@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53535",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53535-c515@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53536",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53536-0e4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53537",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53537-7d50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53538",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53538-f39c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53539",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53539-4411@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53540",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53540-8805@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53541",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53541-d961@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53542",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53542-fc74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53543",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53543-227c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53544",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53544-f48f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53545",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53545-8d50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53546",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53546-a432@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53547",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53547-38ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53548",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53548-8719@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53549",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53549-9c74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53550",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53550-bbac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53551",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53551-4afc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53552",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53552-5ba9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53553",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53553-f661@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53554",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53554-3351@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53555",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53555-b949@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53556",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53556-db4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53557",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53557-e7ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53558",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53558-e6f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53559",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53559-c2f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53560",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53560-8248@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53561",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53561-75a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53562",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53562-a73f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53563",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53563-5cbe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53564",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53564-e874@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53565",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53565-a882@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53566",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53566-1c57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53567",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53567-dedf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53568",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53568-0020@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53569",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53569-181e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53570",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53570-3733@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53571",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53571-3269@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53572",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53572-ab85@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53573",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53573-a05d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53574",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53574-f72d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53575",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53575-2079@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53576",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53576-c5dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53577",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53577-96e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53578",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53578-7dbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53579",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53579-e030@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53580",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2023-53580-7d16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53581",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53581-80fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53582",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53582-3ed8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53583",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53583-b831@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53584",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53584-2034@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53585",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53585-b855@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53586",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53586-67e1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53587",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53587-411f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53588",
"url": "https://lore.kernel.org/linux-cve-announce/2025100426-CVE-2023-53588-1220@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53589",
"url": "https://lore.kernel.org/linux-cve-announce/2025100426-CVE-2023-53589-22f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53590",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53590-9f1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53591",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53591-8496@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53592",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53592-3da6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53593",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53593-228d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53594",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53594-563f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53595",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53595-91fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53596",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53596-dbfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53597",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53597-e30c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53598",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53599",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53599-2a93@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53600",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53600-69ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53601",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53601-aabe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53602",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53602-2de6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53603",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53603-df40@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53604",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53604-31fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53605",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53605-a660@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53606",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53606-8c1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53607",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53607-9638@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53608",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53608-ccb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53609",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53609-1c39@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53610",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53610-3f0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53611",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53611-a508@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53612",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53612-b146@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53613",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53613-bba8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53614",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53614-bf24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53615",
"url": "https://lore.kernel.org/linux-cve-announce/2025100435-CVE-2023-53615-843c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53616",
"url": "https://lore.kernel.org/linux-cve-announce/2025100435-CVE-2023-53616-9379@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39929",
"url": "https://lore.kernel.org/linux-cve-announce/2025100414-CVE-2025-39929-4308@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39931",
"url": "https://lore.kernel.org/linux-cve-announce/2025100416-CVE-2025-39931-8ff7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39932",
"url": "https://lore.kernel.org/linux-cve-announce/2025100416-CVE-2025-39932-bdaf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39933",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39933-e224@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39934",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39934-4c48@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39935",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39935-3e6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39936",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39936-840a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39937",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39937-c8f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39938",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39938-6508@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39939",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39939-7ec4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39940",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39940-6097@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39941",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39941-f256@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39942",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39942-0297@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39943",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39943-f5d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39944",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39944-0d67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39945",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39945-84d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39946",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39946-5f17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39947",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39947-6872@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39948",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39948-7074@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39949",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39949-d909@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39950",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39950-e7d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39951",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39951-24b1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39952",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2025-39952-e36c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39953",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2025-39953-4ac6@gregkh/"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2025-056 vom 2025-10-16",
"url": "https://cloud.google.com/support/bulletins#gcp-2025-056"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-277 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-277.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-093 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-093.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-112 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-112.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-279 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-279.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-109 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-109.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-282 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-282.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-113 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-113.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-280 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-280.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3053 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3053.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-281 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-281.html"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2025-10-28",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#October_20_2025"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6053 vom 2025-11-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00219.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21463 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21463"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4111-1 vom 2025-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4135-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4139-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4149-1 vom 2025-11-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4188-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVPUJWNDCBFGM2O2EFX4S5QBPKDARVQ7/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4379 vom 2025-11-25",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20091-1 vom 2025-11-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVNKE6YBHUN7AVUHO7UZCJJGK4HYS62H/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21040-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21064-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21056-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21052-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023389.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21080-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21074-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4301-1 vom 2025-11-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLIMXFMWOGTFRJZEC4XPGIMNBCRKQ7IF/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21118 vom 2025-12-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-21118.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4320-1 vom 2025-12-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21463 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21463.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21931 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21931.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22801 vom 2025-12-08",
"url": "https://access.redhat.com/errata/RHSA-2025:22801"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22800 vom 2025-12-08",
"url": "https://access.redhat.com/errata/RHSA-2025:22800"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22801 vom 2025-12-09",
"url": "http://linux.oracle.com/errata/ELSA-2025-22801.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21180-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21147-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7921-1 vom 2025-12-10",
"url": "https://ubuntu.com/security/notices/USN-7921-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22800 vom 2025-12-13",
"url": "https://errata.build.resf.org/RLSA-2025:22800"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-December/019260.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28048 vom 2025-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-28048.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22801 vom 2025-12-13",
"url": "https://errata.build.resf.org/RLSA-2025:22801"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7934-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7934-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7936-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7936-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4393-1 vom 2025-12-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7255154 vom 2025-12-17",
"url": "https://www.ibm.com/support/pages/node/7255154"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4422-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4505-1 vom 2025-12-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3D5W2444LYTUJVXYGB63LTMU25GRLRJR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4515-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4517-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4516-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4521-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20021-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20012-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20015-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0090-1 vom 2026-01-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023732.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0107-1 vom 2026-01-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJE4AD3YG7YMRUG6STSQJA6AUB5UHH72/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0107-1 vom 2026-01-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023731.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0534 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0534"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0537 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0537"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0535 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0535"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0576 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0576"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20059-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20039-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0760 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0760"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0759 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0759"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0793 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0793"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0163-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0166-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0176-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PSMTB6JYSBEU2CF3OD7SW3ZIJGKEKBZA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0173-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C7EZZMG5MOJB6A2OZ4KLGVN4SVE4LWEL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0168-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUZFNORTIL7FT4JAMWNYAWMBHYUP24BR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0174-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYNRLMEYZG4OCUWVVR7BLL22PT3MTAV7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0180-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0187-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0184-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0188-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023823.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0186-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0185-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023821.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0191-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0759 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0759.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0793 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0793.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0206-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20260121-0010 vom 2026-01-21",
"url": "https://security.netapp.com/advisory/NTAP-20260121-0010"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0246-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0759 vom 2026-01-24",
"url": "https://errata.build.resf.org/RLSA-2026:0759"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0793 vom 2026-01-24",
"url": "https://errata.build.resf.org/RLSA-2026:0793"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0760 vom 2026-01-24",
"url": "https://errata.build.resf.org/RLSA-2026:0760"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50071 vom 2026-01-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-50071.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1445 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1445"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1441 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1441"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1443 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1443"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1494 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1494"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1495 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1495"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-030 vom 2026-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1727 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1727"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50100 vom 2026-02-10",
"url": "http://linux.oracle.com/errata/ELSA-2026-50100.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2282 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2282"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2282 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2282.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2490 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2490"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-1 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-3 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2664 vom 2026-02-12",
"url": "https://access.redhat.com/errata/RHSA-2026:2664"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0475-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-4 vom 2026-02-13",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20334-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0495-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20333-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20317-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2282 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2282"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2759 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2759"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2766 vom 2026-02-17",
"url": "https://access.redhat.com/errata/RHSA-2026:2766"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8034-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-6 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-3 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-4 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-2 vom 2026-02-18",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-6 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-1 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-3 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-8 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-2 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-8 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3268 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3268"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3277 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3277"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3267 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3267"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3293 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3293"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3360 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3360"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3375 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3375"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3358 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3358"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20473-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024411.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20478-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20496-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20519-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-2 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20561-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20560-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20562-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-05T23:00:00.000+00:00",
"generator": {
"date": "2026-03-06T10:24:01.606+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2194",
"initial_release_date": "2025-10-05T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Google aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von openSUSE und Debian aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, Oracle Linux und Debian aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von IBM und SUSE aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE, Oracle Linux und NetApp aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "57"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vProxy \u003c19.14",
"product": {
"name": "Dell NetWorker vProxy \u003c19.14",
"product_id": "T050451"
}
},
{
"category": "product_version",
"name": "vProxy 19.14",
"product": {
"name": "Dell NetWorker vProxy 19.14",
"product_id": "T050451-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.14"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Cloud Platform",
"product": {
"name": "Google Cloud Platform",
"product_id": "393401",
"product_identification_helper": {
"cpe": "cpe:/a:google:cloud_platform:-"
}
}
},
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF03",
"product_id": "T049499"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF03",
"product_id": "T049499-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if03"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T043317",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:vsphere"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "5.10.0-60.18.0.50.h602",
"product": {
"name": "Open Source Linux Kernel 5.10.0-60.18.0.50.h602",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50470",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50470"
},
{
"cve": "CVE-2022-50471",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50471"
},
{
"cve": "CVE-2022-50472",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50472"
},
{
"cve": "CVE-2022-50473",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50473"
},
{
"cve": "CVE-2022-50474",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50474"
},
{
"cve": "CVE-2022-50475",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50475"
},
{
"cve": "CVE-2022-50476",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50476"
},
{
"cve": "CVE-2022-50477",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50477"
},
{
"cve": "CVE-2022-50478",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50478"
},
{
"cve": "CVE-2022-50479",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50479"
},
{
"cve": "CVE-2022-50480",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50480"
},
{
"cve": "CVE-2022-50481",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50481"
},
{
"cve": "CVE-2022-50482",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50482"
},
{
"cve": "CVE-2022-50483",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50483"
},
{
"cve": "CVE-2022-50484",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50484"
},
{
"cve": "CVE-2022-50485",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50485"
},
{
"cve": "CVE-2022-50486",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50486"
},
{
"cve": "CVE-2022-50487",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50487"
},
{
"cve": "CVE-2022-50488",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50488"
},
{
"cve": "CVE-2022-50489",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50489"
},
{
"cve": "CVE-2022-50490",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50490"
},
{
"cve": "CVE-2022-50491",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50491"
},
{
"cve": "CVE-2022-50492",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50492"
},
{
"cve": "CVE-2022-50493",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50493"
},
{
"cve": "CVE-2022-50494",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50494"
},
{
"cve": "CVE-2022-50495",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50495"
},
{
"cve": "CVE-2022-50496",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50496"
},
{
"cve": "CVE-2022-50497",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50497"
},
{
"cve": "CVE-2022-50498",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50498"
},
{
"cve": "CVE-2022-50499",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50499"
},
{
"cve": "CVE-2022-50500",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50500"
},
{
"cve": "CVE-2022-50501",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50501"
},
{
"cve": "CVE-2022-50502",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50502"
},
{
"cve": "CVE-2022-50503",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50503"
},
{
"cve": "CVE-2022-50504",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50504"
},
{
"cve": "CVE-2022-50505",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50505"
},
{
"cve": "CVE-2022-50506",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50506"
},
{
"cve": "CVE-2022-50507",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50507"
},
{
"cve": "CVE-2022-50508",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50508"
},
{
"cve": "CVE-2023-3773",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-3773"
},
{
"cve": "CVE-2023-53533",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53533"
},
{
"cve": "CVE-2023-53534",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53534"
},
{
"cve": "CVE-2023-53535",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53535"
},
{
"cve": "CVE-2023-53536",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53536"
},
{
"cve": "CVE-2023-53537",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53537"
},
{
"cve": "CVE-2023-53538",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53538"
},
{
"cve": "CVE-2023-53539",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53539"
},
{
"cve": "CVE-2023-53540",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53540"
},
{
"cve": "CVE-2023-53541",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53541"
},
{
"cve": "CVE-2023-53542",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53542"
},
{
"cve": "CVE-2023-53543",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53543"
},
{
"cve": "CVE-2023-53544",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53544"
},
{
"cve": "CVE-2023-53545",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53545"
},
{
"cve": "CVE-2023-53546",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53546"
},
{
"cve": "CVE-2023-53547",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53547"
},
{
"cve": "CVE-2023-53548",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53548"
},
{
"cve": "CVE-2023-53549",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53549"
},
{
"cve": "CVE-2023-53550",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53550"
},
{
"cve": "CVE-2023-53551",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53551"
},
{
"cve": "CVE-2023-53552",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53552"
},
{
"cve": "CVE-2023-53553",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53553"
},
{
"cve": "CVE-2023-53554",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53554"
},
{
"cve": "CVE-2023-53555",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53555"
},
{
"cve": "CVE-2023-53556",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53556"
},
{
"cve": "CVE-2023-53557",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53557"
},
{
"cve": "CVE-2023-53558",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53558"
},
{
"cve": "CVE-2023-53559",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53559"
},
{
"cve": "CVE-2023-53560",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53560"
},
{
"cve": "CVE-2023-53561",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53561"
},
{
"cve": "CVE-2023-53562",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53562"
},
{
"cve": "CVE-2023-53563",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53563"
},
{
"cve": "CVE-2023-53564",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53564"
},
{
"cve": "CVE-2023-53565",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53565"
},
{
"cve": "CVE-2023-53566",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53566"
},
{
"cve": "CVE-2023-53567",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53567"
},
{
"cve": "CVE-2023-53568",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53568"
},
{
"cve": "CVE-2023-53569",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53569"
},
{
"cve": "CVE-2023-53570",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53570"
},
{
"cve": "CVE-2023-53571",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53571"
},
{
"cve": "CVE-2023-53572",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53572"
},
{
"cve": "CVE-2023-53573",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53573"
},
{
"cve": "CVE-2023-53574",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53574"
},
{
"cve": "CVE-2023-53575",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53575"
},
{
"cve": "CVE-2023-53576",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53576"
},
{
"cve": "CVE-2023-53577",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53577"
},
{
"cve": "CVE-2023-53578",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53578"
},
{
"cve": "CVE-2023-53579",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53579"
},
{
"cve": "CVE-2023-53580",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53580"
},
{
"cve": "CVE-2023-53581",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53581"
},
{
"cve": "CVE-2023-53582",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53582"
},
{
"cve": "CVE-2023-53583",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53583"
},
{
"cve": "CVE-2023-53584",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53584"
},
{
"cve": "CVE-2023-53585",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53585"
},
{
"cve": "CVE-2023-53586",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53586"
},
{
"cve": "CVE-2023-53587",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53587"
},
{
"cve": "CVE-2023-53588",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53588"
},
{
"cve": "CVE-2023-53589",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53589"
},
{
"cve": "CVE-2023-53590",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53590"
},
{
"cve": "CVE-2023-53591",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53591"
},
{
"cve": "CVE-2023-53592",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53592"
},
{
"cve": "CVE-2023-53593",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53593"
},
{
"cve": "CVE-2023-53594",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53594"
},
{
"cve": "CVE-2023-53595",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53595"
},
{
"cve": "CVE-2023-53596",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53596"
},
{
"cve": "CVE-2023-53597",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53597"
},
{
"cve": "CVE-2023-53598",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53598"
},
{
"cve": "CVE-2023-53599",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53599"
},
{
"cve": "CVE-2023-53600",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53600"
},
{
"cve": "CVE-2023-53601",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53601"
},
{
"cve": "CVE-2023-53602",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53602"
},
{
"cve": "CVE-2023-53603",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53603"
},
{
"cve": "CVE-2023-53604",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53604"
},
{
"cve": "CVE-2023-53605",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53605"
},
{
"cve": "CVE-2023-53606",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53606"
},
{
"cve": "CVE-2023-53607",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53607"
},
{
"cve": "CVE-2023-53608",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53608"
},
{
"cve": "CVE-2023-53609",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53609"
},
{
"cve": "CVE-2023-53610",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53610"
},
{
"cve": "CVE-2023-53611",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53611"
},
{
"cve": "CVE-2023-53612",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53612"
},
{
"cve": "CVE-2023-53613",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53613"
},
{
"cve": "CVE-2023-53614",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53614"
},
{
"cve": "CVE-2023-53615",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53615"
},
{
"cve": "CVE-2023-53616",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53616"
},
{
"cve": "CVE-2025-39929",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39929"
},
{
"cve": "CVE-2025-39931",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39931"
},
{
"cve": "CVE-2025-39932",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39932"
},
{
"cve": "CVE-2025-39933",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39933"
},
{
"cve": "CVE-2025-39934",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39934"
},
{
"cve": "CVE-2025-39935",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39935"
},
{
"cve": "CVE-2025-39936",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39936"
},
{
"cve": "CVE-2025-39937",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39937"
},
{
"cve": "CVE-2025-39938",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39938"
},
{
"cve": "CVE-2025-39939",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39939"
},
{
"cve": "CVE-2025-39940",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39940"
},
{
"cve": "CVE-2025-39941",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39941"
},
{
"cve": "CVE-2025-39942",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39942"
},
{
"cve": "CVE-2025-39943",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39943"
},
{
"cve": "CVE-2025-39944",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39945",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39945"
},
{
"cve": "CVE-2025-39946",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39946"
},
{
"cve": "CVE-2025-39947",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39947"
},
{
"cve": "CVE-2025-39948",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39948"
},
{
"cve": "CVE-2025-39949",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39949"
},
{
"cve": "CVE-2025-39950",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39950"
},
{
"cve": "CVE-2025-39951",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39951"
},
{
"cve": "CVE-2025-39952",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39952"
},
{
"cve": "CVE-2025-39953",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39953"
}
]
}
FKIE_CVE-2022-50476
Vulnerability from fkie_nvd - Published: 2025-10-04 16:15 - Updated: 2026-01-23 16:35| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/07e28a8f450217db679802ebd4de0915556ce846 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/13286ad1c7c49c606fdcba4cf66f953a1a16c1ca | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/14d245da57a11e80277ab455aa9b6dcc5ed38a19 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/21296a52caa6a6bad6debdfe40ad81d4f1a27e69 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/5f7d78b2b12a9d561f48fa00bab29b40f4616dad | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/8b78493968ed3cef0326183ed059c55e42f24d5b | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/a6b9e09403102bdf8402dae734800e4916c7ea58 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d4460c82177899751975180c268f352893302221 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/dd860b39aa7c7b82e6c99b6fdb99d4610ce49d67 | Patch |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E0273F2-224A-448F-92F6-D08F1E18B7CD",
"versionEndExcluding": "4.9.337",
"versionStartIncluding": "3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E7450AD-4739-46F0-B81B-C02E7B35A97B",
"versionEndExcluding": "4.14.303",
"versionStartIncluding": "4.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F",
"versionEndExcluding": "4.19.270",
"versionStartIncluding": "4.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C0D95E-414A-445E-941B-3EF6A4D3A093",
"versionEndExcluding": "5.4.229",
"versionStartIncluding": "4.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D05D31FC-BD74-4F9E-B1D8-9CED62BE6F65",
"versionEndExcluding": "5.10.163",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47237296-55D1-4ED4-8075-D00FC85A61EE",
"versionEndExcluding": "5.15.86",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C720A569-3D93-4D77-95F6-E2B3A3267D9F",
"versionEndExcluding": "6.0.16",
"versionStartIncluding": "5.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77239F4B-6BB2-4B9E-A654-36A52396116C",
"versionEndExcluding": "6.1.2",
"versionStartIncluding": "6.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nntb_netdev: Use dev_kfree_skb_any() in interrupt context\n\nTX/RX callback handlers (ntb_netdev_tx_handler(),\nntb_netdev_rx_handler()) can be called in interrupt\ncontext via the DMA framework when the respective\nDMA operations have completed. As such, any calls\nby these routines to free skb\u0027s, should use the\ninterrupt context safe dev_kfree_skb_any() function.\n\nPreviously, these callback handlers would call the\ninterrupt unsafe version of dev_kfree_skb(). This has\nnot presented an issue on Intel IOAT DMA engines as\nthat driver utilizes tasklets rather than a hard\ninterrupt handler, like the AMD PTDMA DMA driver.\nOn AMD systems, a kernel WARNING message is\nencountered, which is being issued from\nskb_release_head_state() due to in_hardirq()\nbeing true.\n\nBesides the user visible WARNING from the kernel,\nthe other symptom of this bug was that TCP/IP performance\nacross the ntb_netdev interface was very poor, i.e.\napproximately an order of magnitude below what was\nexpected. With the repair to use dev_kfree_skb_any(),\nkernel WARNINGs from skb_release_head_state() ceased\nand TCP/IP performance, as measured by iperf, was on\npar with expected results, approximately 20 Gb/s on\nAMD Milan based server. Note that this performance\nis comparable with Intel based servers."
}
],
"id": "CVE-2022-50476",
"lastModified": "2026-01-23T16:35:23.300",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-10-04T16:15:44.177",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/07e28a8f450217db679802ebd4de0915556ce846"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/13286ad1c7c49c606fdcba4cf66f953a1a16c1ca"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/14d245da57a11e80277ab455aa9b6dcc5ed38a19"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/21296a52caa6a6bad6debdfe40ad81d4f1a27e69"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/5f7d78b2b12a9d561f48fa00bab29b40f4616dad"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/8b78493968ed3cef0326183ed059c55e42f24d5b"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/a6b9e09403102bdf8402dae734800e4916c7ea58"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d4460c82177899751975180c268f352893302221"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/dd860b39aa7c7b82e6c99b6fdb99d4610ce49d67"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.