Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53022 (GCVE-0-2023-53022)
Vulnerability from cvelistv5 – Published: 2025-03-27 16:43 – Updated: 2025-10-01 17:19- CWE-667 - Improper Locking
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
7294380c5211687aa4d66166984b152ee84caf5f , < 8232e5a84d25a84a5cbda0f241a00793fb6eb608
(git)
Affected: 7294380c5211687aa4d66166984b152ee84caf5f , < e893dced1a18e77b1262f5c10169413f0ece0da7 (git) Affected: 7294380c5211687aa4d66166984b152ee84caf5f , < 3c463721a73bdb57a913e0d3124677a3758886fc (git) |
||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-53022",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-01T17:19:04.279885Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-667",
"description": "CWE-667 Improper Locking",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-01T17:19:07.564Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/freescale/enetc/enetc.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "8232e5a84d25a84a5cbda0f241a00793fb6eb608",
"status": "affected",
"version": "7294380c5211687aa4d66166984b152ee84caf5f",
"versionType": "git"
},
{
"lessThan": "e893dced1a18e77b1262f5c10169413f0ece0da7",
"status": "affected",
"version": "7294380c5211687aa4d66166984b152ee84caf5f",
"versionType": "git"
},
{
"lessThan": "3c463721a73bdb57a913e0d3124677a3758886fc",
"status": "affected",
"version": "7294380c5211687aa4d66166984b152ee84caf5f",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/freescale/enetc/enetc.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.13"
},
{
"lessThan": "5.13",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.91",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.9",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.2",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.91",
"versionStartIncluding": "5.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.9",
"versionStartIncluding": "5.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"versionStartIncluding": "5.13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: enetc: avoid deadlock in enetc_tx_onestep_tstamp()\n\nThis lockdep splat says it better than I could:\n\n================================\nWARNING: inconsistent lock state\n6.2.0-rc2-07010-ga9b9500ffaac-dirty #967 Not tainted\n--------------------------------\ninconsistent {IN-SOFTIRQ-W} -\u003e {SOFTIRQ-ON-W} usage.\nkworker/1:3/179 [HC0[0]:SC0[0]:HE1:SE1] takes:\nffff3ec4036ce098 (_xmit_ETHER#2){+.?.}-{3:3}, at: netif_freeze_queues+0x5c/0xc0\n{IN-SOFTIRQ-W} state was registered at:\n _raw_spin_lock+0x5c/0xc0\n sch_direct_xmit+0x148/0x37c\n __dev_queue_xmit+0x528/0x111c\n ip6_finish_output2+0x5ec/0xb7c\n ip6_finish_output+0x240/0x3f0\n ip6_output+0x78/0x360\n ndisc_send_skb+0x33c/0x85c\n ndisc_send_rs+0x54/0x12c\n addrconf_rs_timer+0x154/0x260\n call_timer_fn+0xb8/0x3a0\n __run_timers.part.0+0x214/0x26c\n run_timer_softirq+0x3c/0x74\n __do_softirq+0x14c/0x5d8\n ____do_softirq+0x10/0x20\n call_on_irq_stack+0x2c/0x5c\n do_softirq_own_stack+0x1c/0x30\n __irq_exit_rcu+0x168/0x1a0\n irq_exit_rcu+0x10/0x40\n el1_interrupt+0x38/0x64\nirq event stamp: 7825\nhardirqs last enabled at (7825): [\u003cffffdf1f7200cae4\u003e] exit_to_kernel_mode+0x34/0x130\nhardirqs last disabled at (7823): [\u003cffffdf1f708105f0\u003e] __do_softirq+0x550/0x5d8\nsoftirqs last enabled at (7824): [\u003cffffdf1f7081050c\u003e] __do_softirq+0x46c/0x5d8\nsoftirqs last disabled at (7811): [\u003cffffdf1f708166e0\u003e] ____do_softirq+0x10/0x20\n\nother info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(_xmit_ETHER#2);\n \u003cInterrupt\u003e\n lock(_xmit_ETHER#2);\n\n *** DEADLOCK ***\n\n3 locks held by kworker/1:3/179:\n #0: ffff3ec400004748 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\n #1: ffff80000a0bbdc8 ((work_completion)(\u0026priv-\u003etx_onestep_tstamp)){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\n #2: ffff3ec4036cd438 (\u0026dev-\u003etx_global_lock){+.+.}-{3:3}, at: netif_tx_lock+0x1c/0x34\n\nWorkqueue: events enetc_tx_onestep_tstamp\nCall trace:\n print_usage_bug.part.0+0x208/0x22c\n mark_lock+0x7f0/0x8b0\n __lock_acquire+0x7c4/0x1ce0\n lock_acquire.part.0+0xe0/0x220\n lock_acquire+0x68/0x84\n _raw_spin_lock+0x5c/0xc0\n netif_freeze_queues+0x5c/0xc0\n netif_tx_lock+0x24/0x34\n enetc_tx_onestep_tstamp+0x20/0x100\n process_one_work+0x28c/0x6c0\n worker_thread+0x74/0x450\n kthread+0x118/0x11c\n\nbut I\u0027ll say it anyway: the enetc_tx_onestep_tstamp() work item runs in\nprocess context, therefore with softirqs enabled (i.o.w., it can be\ninterrupted by a softirq). If we hold the netif_tx_lock() when there is\nan interrupt, and the NET_TX softirq then gets scheduled, this will take\nthe netif_tx_lock() a second time and deadlock the kernel.\n\nTo solve this, use netif_tx_lock_bh(), which blocks softirqs from\nrunning."
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T07:47:52.526Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/8232e5a84d25a84a5cbda0f241a00793fb6eb608"
},
{
"url": "https://git.kernel.org/stable/c/e893dced1a18e77b1262f5c10169413f0ece0da7"
},
{
"url": "https://git.kernel.org/stable/c/3c463721a73bdb57a913e0d3124677a3758886fc"
}
],
"title": "net: enetc: avoid deadlock in enetc_tx_onestep_tstamp()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-53022",
"datePublished": "2025-03-27T16:43:48.513Z",
"dateReserved": "2025-03-27T16:40:15.752Z",
"dateUpdated": "2025-10-01T17:19:07.564Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-53022\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-03-27T17:15:51.710\",\"lastModified\":\"2025-10-01T18:15:36.293\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: enetc: avoid deadlock in enetc_tx_onestep_tstamp()\\n\\nThis lockdep splat says it better than I could:\\n\\n================================\\nWARNING: inconsistent lock state\\n6.2.0-rc2-07010-ga9b9500ffaac-dirty #967 Not tainted\\n--------------------------------\\ninconsistent {IN-SOFTIRQ-W} -\u003e {SOFTIRQ-ON-W} usage.\\nkworker/1:3/179 [HC0[0]:SC0[0]:HE1:SE1] takes:\\nffff3ec4036ce098 (_xmit_ETHER#2){+.?.}-{3:3}, at: netif_freeze_queues+0x5c/0xc0\\n{IN-SOFTIRQ-W} state was registered at:\\n _raw_spin_lock+0x5c/0xc0\\n sch_direct_xmit+0x148/0x37c\\n __dev_queue_xmit+0x528/0x111c\\n ip6_finish_output2+0x5ec/0xb7c\\n ip6_finish_output+0x240/0x3f0\\n ip6_output+0x78/0x360\\n ndisc_send_skb+0x33c/0x85c\\n ndisc_send_rs+0x54/0x12c\\n addrconf_rs_timer+0x154/0x260\\n call_timer_fn+0xb8/0x3a0\\n __run_timers.part.0+0x214/0x26c\\n run_timer_softirq+0x3c/0x74\\n __do_softirq+0x14c/0x5d8\\n ____do_softirq+0x10/0x20\\n call_on_irq_stack+0x2c/0x5c\\n do_softirq_own_stack+0x1c/0x30\\n __irq_exit_rcu+0x168/0x1a0\\n irq_exit_rcu+0x10/0x40\\n el1_interrupt+0x38/0x64\\nirq event stamp: 7825\\nhardirqs last enabled at (7825): [\u003cffffdf1f7200cae4\u003e] exit_to_kernel_mode+0x34/0x130\\nhardirqs last disabled at (7823): [\u003cffffdf1f708105f0\u003e] __do_softirq+0x550/0x5d8\\nsoftirqs last enabled at (7824): [\u003cffffdf1f7081050c\u003e] __do_softirq+0x46c/0x5d8\\nsoftirqs last disabled at (7811): [\u003cffffdf1f708166e0\u003e] ____do_softirq+0x10/0x20\\n\\nother info that might help us debug this:\\n Possible unsafe locking scenario:\\n\\n CPU0\\n ----\\n lock(_xmit_ETHER#2);\\n \u003cInterrupt\u003e\\n lock(_xmit_ETHER#2);\\n\\n *** DEADLOCK ***\\n\\n3 locks held by kworker/1:3/179:\\n #0: ffff3ec400004748 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\\n #1: ffff80000a0bbdc8 ((work_completion)(\u0026priv-\u003etx_onestep_tstamp)){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\\n #2: ffff3ec4036cd438 (\u0026dev-\u003etx_global_lock){+.+.}-{3:3}, at: netif_tx_lock+0x1c/0x34\\n\\nWorkqueue: events enetc_tx_onestep_tstamp\\nCall trace:\\n print_usage_bug.part.0+0x208/0x22c\\n mark_lock+0x7f0/0x8b0\\n __lock_acquire+0x7c4/0x1ce0\\n lock_acquire.part.0+0xe0/0x220\\n lock_acquire+0x68/0x84\\n _raw_spin_lock+0x5c/0xc0\\n netif_freeze_queues+0x5c/0xc0\\n netif_tx_lock+0x24/0x34\\n enetc_tx_onestep_tstamp+0x20/0x100\\n process_one_work+0x28c/0x6c0\\n worker_thread+0x74/0x450\\n kthread+0x118/0x11c\\n\\nbut I\u0027ll say it anyway: the enetc_tx_onestep_tstamp() work item runs in\\nprocess context, therefore with softirqs enabled (i.o.w., it can be\\ninterrupted by a softirq). If we hold the netif_tx_lock() when there is\\nan interrupt, and the NET_TX softirq then gets scheduled, this will take\\nthe netif_tx_lock() a second time and deadlock the kernel.\\n\\nTo solve this, use netif_tx_lock_bh(), which blocks softirqs from\\nrunning.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: enetc: evitar bloqueo en enetc_tx_onestep_tstamp() Este splat de lockdep lo dice mejor de lo que yo podr\u00eda: ================================ ADVERTENCIA: estado de bloqueo inconsistente 6.2.0-rc2-07010-ga9b9500ffaac-dirty #967 No contaminado -------------------------------- uso inconsistente de {IN-SOFTIRQ-W} -\u0026gt; {SOFTIRQ-ON-W}. kworker/1:3/179 [HC0[0]:SC0[0]:HE1:SE1] toma: ffff3ec4036ce098 (_xmit_ETHER#2){+.?.}-{3:3}, en: netif_freeze_queues+0x5c/0xc0 {IN-SOFTIRQ-W} estado se registr\u00f3 en: _raw_spin_lock+0x5c/0xc0 sch_direct_xmit+0x148/0x37c __dev_queue_xmit+0x528/0x111c ip6_finish_output2+0x5ec/0xb7c ip6_finish_output+0x240/0x3f0 ip6_output+0x78/0x360 ndisc_send_skb+0x33c/0x85c ndisc_send_rs+0x54/0x12c addrconf_rs_timer+0x154/0x260 call_timer_fn+0xb8/0x3a0 __run_timers.part.0+0x214/0x26c run_timer_softirq+0x3c/0x74 __do_softirq+0x14c/0x5d8 ____do_softirq+0x10/0x20 call_on_irq_stack+0x2c/0x5c do_softirq_own_stack+0x1c/0x30 __irq_exit_rcu+0x168/0x1a0 irq_exit_rcu+0x10/0x40 el1_interrupt+0x38/0x64 marca de evento de irq: 7825 hardirqs habilitados por \u00faltima vez en (7825): [] exit_to_kernel_mode+0x34/0x130 hardirqs deshabilitados por \u00faltima vez en (7823): [] __do_softirq+0x550/0x5d8 softirqs habilitados por \u00faltima vez en (7824): [] __do_softirq+0x46c/0x5d8 softirqs deshabilitados por \u00faltima vez en (7811): [] ____do_softirq+0x10/0x20 otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: Posible escenario de bloqueo inseguro: CPU0 ---- lock(_xmit_ETHER#2); lock(_xmit_ETHER#2); *** BLOQUEO INTERMEDIO *** 3 bloqueos mantenidos por kworker/1:3/179: #0: ffff3ec400004748 ((wq_completion)eventos){+.+.}-{0:0}, en: process_one_work+0x1f4/0x6c0 #1: ffff80000a0bbdc8 ((work_completion)(\u0026amp;priv-\u0026gt;tx_onestep_tstamp)){+.+.}-{0:0}, en: process_one_work+0x1f4/0x6c0 #2: ffff3ec4036cd438 (\u0026amp;dev-\u0026gt;tx_global_lock){+.+.}-{3:3}, en: netif_tx_lock+0x1c/0x34 Cola de trabajo: eventos enetc_tx_onestep_tstamp Rastreo de llamadas: print_usage_bug.part.0+0x208/0x22c mark_lock+0x7f0/0x8b0 __lock_acquire+0x7c4/0x1ce0 lock_acquire.part.0+0xe0/0x220 lock_acquire+0x68/0x84 _raw_spin_lock+0x5c/0xc0 netif_freeze_queues+0x5c/0xc0 netif_tx_lock+0x24/0x34 enetc_tx_onestep_tstamp+0x20/0x100 process_one_work+0x28c/0x6c0worker_thread+0x74/0x450 kthread+0x118/0x11c pero lo dir\u00e9 de todos modos: el elemento de trabajo enetc_tx_onestep_tstamp() se ejecuta en el contexto del proceso, por lo tanto, con softirqs habilitado (Es decir, puede ser interrumpido por un softirq). Si mantenemos la ejecuci\u00f3n de netif_tx_lock() cuando hay una interrupci\u00f3n, y luego se programa el softirq NET_TX, se ejecutar\u00e1 netif_tx_lock() por segunda vez y se bloquear\u00e1 el kernel. Para solucionar esto, use netif_tx_lock_bh(), que impide la ejecuci\u00f3n de los softirq.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.13\",\"versionEndExcluding\":\"5.15.91\",\"matchCriteriaId\":\"450804D3-1879-4858-A68D-9C0BCBF13142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.9\",\"matchCriteriaId\":\"ED5B6045-B1D2-4E03-B194-9005A351BCAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF501633-2F44-4913-A8EE-B021929F49F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BDA597B-CAC1-4DF0-86F0-42E142C654E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"725C78C9-12CE-406F-ABE8-0813A01D66E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A127C155-689C-4F67-B146-44A57F4BFD85\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3c463721a73bdb57a913e0d3124677a3758886fc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8232e5a84d25a84a5cbda0f241a00793fb6eb608\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e893dced1a18e77b1262f5c10169413f0ece0da7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-53022\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-01T17:19:04.279885Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-667\", \"description\": \"CWE-667 Improper Locking\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-01T14:37:09.070Z\"}}], \"cna\": {\"title\": \"net: enetc: avoid deadlock in enetc_tx_onestep_tstamp()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"7294380c5211687aa4d66166984b152ee84caf5f\", \"lessThan\": \"8232e5a84d25a84a5cbda0f241a00793fb6eb608\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"7294380c5211687aa4d66166984b152ee84caf5f\", \"lessThan\": \"e893dced1a18e77b1262f5c10169413f0ece0da7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"7294380c5211687aa4d66166984b152ee84caf5f\", \"lessThan\": \"3c463721a73bdb57a913e0d3124677a3758886fc\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/net/ethernet/freescale/enetc/enetc.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.13\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.13\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.15.91\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.2\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/net/ethernet/freescale/enetc/enetc.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/8232e5a84d25a84a5cbda0f241a00793fb6eb608\"}, {\"url\": \"https://git.kernel.org/stable/c/e893dced1a18e77b1262f5c10169413f0ece0da7\"}, {\"url\": \"https://git.kernel.org/stable/c/3c463721a73bdb57a913e0d3124677a3758886fc\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: enetc: avoid deadlock in enetc_tx_onestep_tstamp()\\n\\nThis lockdep splat says it better than I could:\\n\\n================================\\nWARNING: inconsistent lock state\\n6.2.0-rc2-07010-ga9b9500ffaac-dirty #967 Not tainted\\n--------------------------------\\ninconsistent {IN-SOFTIRQ-W} -\u003e {SOFTIRQ-ON-W} usage.\\nkworker/1:3/179 [HC0[0]:SC0[0]:HE1:SE1] takes:\\nffff3ec4036ce098 (_xmit_ETHER#2){+.?.}-{3:3}, at: netif_freeze_queues+0x5c/0xc0\\n{IN-SOFTIRQ-W} state was registered at:\\n _raw_spin_lock+0x5c/0xc0\\n sch_direct_xmit+0x148/0x37c\\n __dev_queue_xmit+0x528/0x111c\\n ip6_finish_output2+0x5ec/0xb7c\\n ip6_finish_output+0x240/0x3f0\\n ip6_output+0x78/0x360\\n ndisc_send_skb+0x33c/0x85c\\n ndisc_send_rs+0x54/0x12c\\n addrconf_rs_timer+0x154/0x260\\n call_timer_fn+0xb8/0x3a0\\n __run_timers.part.0+0x214/0x26c\\n run_timer_softirq+0x3c/0x74\\n __do_softirq+0x14c/0x5d8\\n ____do_softirq+0x10/0x20\\n call_on_irq_stack+0x2c/0x5c\\n do_softirq_own_stack+0x1c/0x30\\n __irq_exit_rcu+0x168/0x1a0\\n irq_exit_rcu+0x10/0x40\\n el1_interrupt+0x38/0x64\\nirq event stamp: 7825\\nhardirqs last enabled at (7825): [\u003cffffdf1f7200cae4\u003e] exit_to_kernel_mode+0x34/0x130\\nhardirqs last disabled at (7823): [\u003cffffdf1f708105f0\u003e] __do_softirq+0x550/0x5d8\\nsoftirqs last enabled at (7824): [\u003cffffdf1f7081050c\u003e] __do_softirq+0x46c/0x5d8\\nsoftirqs last disabled at (7811): [\u003cffffdf1f708166e0\u003e] ____do_softirq+0x10/0x20\\n\\nother info that might help us debug this:\\n Possible unsafe locking scenario:\\n\\n CPU0\\n ----\\n lock(_xmit_ETHER#2);\\n \u003cInterrupt\u003e\\n lock(_xmit_ETHER#2);\\n\\n *** DEADLOCK ***\\n\\n3 locks held by kworker/1:3/179:\\n #0: ffff3ec400004748 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\\n #1: ffff80000a0bbdc8 ((work_completion)(\u0026priv-\u003etx_onestep_tstamp)){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\\n #2: ffff3ec4036cd438 (\u0026dev-\u003etx_global_lock){+.+.}-{3:3}, at: netif_tx_lock+0x1c/0x34\\n\\nWorkqueue: events enetc_tx_onestep_tstamp\\nCall trace:\\n print_usage_bug.part.0+0x208/0x22c\\n mark_lock+0x7f0/0x8b0\\n __lock_acquire+0x7c4/0x1ce0\\n lock_acquire.part.0+0xe0/0x220\\n lock_acquire+0x68/0x84\\n _raw_spin_lock+0x5c/0xc0\\n netif_freeze_queues+0x5c/0xc0\\n netif_tx_lock+0x24/0x34\\n enetc_tx_onestep_tstamp+0x20/0x100\\n process_one_work+0x28c/0x6c0\\n worker_thread+0x74/0x450\\n kthread+0x118/0x11c\\n\\nbut I\u0027ll say it anyway: the enetc_tx_onestep_tstamp() work item runs in\\nprocess context, therefore with softirqs enabled (i.o.w., it can be\\ninterrupted by a softirq). If we hold the netif_tx_lock() when there is\\nan interrupt, and the NET_TX softirq then gets scheduled, this will take\\nthe netif_tx_lock() a second time and deadlock the kernel.\\n\\nTo solve this, use netif_tx_lock_bh(), which blocks softirqs from\\nrunning.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.91\", \"versionStartIncluding\": \"5.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.9\", \"versionStartIncluding\": \"5.13\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2\", \"versionStartIncluding\": \"5.13\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T07:47:52.526Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-53022\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-01T17:19:07.564Z\", \"dateReserved\": \"2025-03-27T16:40:15.752Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2025-03-27T16:43:48.513Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2023-53022
Vulnerability from fkie_nvd - Published: 2025-03-27 17:15 - Updated: 2025-10-01 18:155.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.2 | |
| linux | linux_kernel | 6.2 | |
| linux | linux_kernel | 6.2 | |
| linux | linux_kernel | 6.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "450804D3-1879-4858-A68D-9C0BCBF13142",
"versionEndExcluding": "5.15.91",
"versionStartIncluding": "5.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED5B6045-B1D2-4E03-B194-9005A351BCAE",
"versionEndExcluding": "6.1.9",
"versionStartIncluding": "5.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: enetc: avoid deadlock in enetc_tx_onestep_tstamp()\n\nThis lockdep splat says it better than I could:\n\n================================\nWARNING: inconsistent lock state\n6.2.0-rc2-07010-ga9b9500ffaac-dirty #967 Not tainted\n--------------------------------\ninconsistent {IN-SOFTIRQ-W} -\u003e {SOFTIRQ-ON-W} usage.\nkworker/1:3/179 [HC0[0]:SC0[0]:HE1:SE1] takes:\nffff3ec4036ce098 (_xmit_ETHER#2){+.?.}-{3:3}, at: netif_freeze_queues+0x5c/0xc0\n{IN-SOFTIRQ-W} state was registered at:\n _raw_spin_lock+0x5c/0xc0\n sch_direct_xmit+0x148/0x37c\n __dev_queue_xmit+0x528/0x111c\n ip6_finish_output2+0x5ec/0xb7c\n ip6_finish_output+0x240/0x3f0\n ip6_output+0x78/0x360\n ndisc_send_skb+0x33c/0x85c\n ndisc_send_rs+0x54/0x12c\n addrconf_rs_timer+0x154/0x260\n call_timer_fn+0xb8/0x3a0\n __run_timers.part.0+0x214/0x26c\n run_timer_softirq+0x3c/0x74\n __do_softirq+0x14c/0x5d8\n ____do_softirq+0x10/0x20\n call_on_irq_stack+0x2c/0x5c\n do_softirq_own_stack+0x1c/0x30\n __irq_exit_rcu+0x168/0x1a0\n irq_exit_rcu+0x10/0x40\n el1_interrupt+0x38/0x64\nirq event stamp: 7825\nhardirqs last enabled at (7825): [\u003cffffdf1f7200cae4\u003e] exit_to_kernel_mode+0x34/0x130\nhardirqs last disabled at (7823): [\u003cffffdf1f708105f0\u003e] __do_softirq+0x550/0x5d8\nsoftirqs last enabled at (7824): [\u003cffffdf1f7081050c\u003e] __do_softirq+0x46c/0x5d8\nsoftirqs last disabled at (7811): [\u003cffffdf1f708166e0\u003e] ____do_softirq+0x10/0x20\n\nother info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(_xmit_ETHER#2);\n \u003cInterrupt\u003e\n lock(_xmit_ETHER#2);\n\n *** DEADLOCK ***\n\n3 locks held by kworker/1:3/179:\n #0: ffff3ec400004748 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\n #1: ffff80000a0bbdc8 ((work_completion)(\u0026priv-\u003etx_onestep_tstamp)){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\n #2: ffff3ec4036cd438 (\u0026dev-\u003etx_global_lock){+.+.}-{3:3}, at: netif_tx_lock+0x1c/0x34\n\nWorkqueue: events enetc_tx_onestep_tstamp\nCall trace:\n print_usage_bug.part.0+0x208/0x22c\n mark_lock+0x7f0/0x8b0\n __lock_acquire+0x7c4/0x1ce0\n lock_acquire.part.0+0xe0/0x220\n lock_acquire+0x68/0x84\n _raw_spin_lock+0x5c/0xc0\n netif_freeze_queues+0x5c/0xc0\n netif_tx_lock+0x24/0x34\n enetc_tx_onestep_tstamp+0x20/0x100\n process_one_work+0x28c/0x6c0\n worker_thread+0x74/0x450\n kthread+0x118/0x11c\n\nbut I\u0027ll say it anyway: the enetc_tx_onestep_tstamp() work item runs in\nprocess context, therefore with softirqs enabled (i.o.w., it can be\ninterrupted by a softirq). If we hold the netif_tx_lock() when there is\nan interrupt, and the NET_TX softirq then gets scheduled, this will take\nthe netif_tx_lock() a second time and deadlock the kernel.\n\nTo solve this, use netif_tx_lock_bh(), which blocks softirqs from\nrunning."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: enetc: evitar bloqueo en enetc_tx_onestep_tstamp() Este splat de lockdep lo dice mejor de lo que yo podr\u00eda: ================================ ADVERTENCIA: estado de bloqueo inconsistente 6.2.0-rc2-07010-ga9b9500ffaac-dirty #967 No contaminado -------------------------------- uso inconsistente de {IN-SOFTIRQ-W} -\u0026gt; {SOFTIRQ-ON-W}. kworker/1:3/179 [HC0[0]:SC0[0]:HE1:SE1] toma: ffff3ec4036ce098 (_xmit_ETHER#2){+.?.}-{3:3}, en: netif_freeze_queues+0x5c/0xc0 {IN-SOFTIRQ-W} estado se registr\u00f3 en: _raw_spin_lock+0x5c/0xc0 sch_direct_xmit+0x148/0x37c __dev_queue_xmit+0x528/0x111c ip6_finish_output2+0x5ec/0xb7c ip6_finish_output+0x240/0x3f0 ip6_output+0x78/0x360 ndisc_send_skb+0x33c/0x85c ndisc_send_rs+0x54/0x12c addrconf_rs_timer+0x154/0x260 call_timer_fn+0xb8/0x3a0 __run_timers.part.0+0x214/0x26c run_timer_softirq+0x3c/0x74 __do_softirq+0x14c/0x5d8 ____do_softirq+0x10/0x20 call_on_irq_stack+0x2c/0x5c do_softirq_own_stack+0x1c/0x30 __irq_exit_rcu+0x168/0x1a0 irq_exit_rcu+0x10/0x40 el1_interrupt+0x38/0x64 marca de evento de irq: 7825 hardirqs habilitados por \u00faltima vez en (7825): [] exit_to_kernel_mode+0x34/0x130 hardirqs deshabilitados por \u00faltima vez en (7823): [] __do_softirq+0x550/0x5d8 softirqs habilitados por \u00faltima vez en (7824): [] __do_softirq+0x46c/0x5d8 softirqs deshabilitados por \u00faltima vez en (7811): [] ____do_softirq+0x10/0x20 otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: Posible escenario de bloqueo inseguro: CPU0 ---- lock(_xmit_ETHER#2); lock(_xmit_ETHER#2); *** BLOQUEO INTERMEDIO *** 3 bloqueos mantenidos por kworker/1:3/179: #0: ffff3ec400004748 ((wq_completion)eventos){+.+.}-{0:0}, en: process_one_work+0x1f4/0x6c0 #1: ffff80000a0bbdc8 ((work_completion)(\u0026amp;priv-\u0026gt;tx_onestep_tstamp)){+.+.}-{0:0}, en: process_one_work+0x1f4/0x6c0 #2: ffff3ec4036cd438 (\u0026amp;dev-\u0026gt;tx_global_lock){+.+.}-{3:3}, en: netif_tx_lock+0x1c/0x34 Cola de trabajo: eventos enetc_tx_onestep_tstamp Rastreo de llamadas: print_usage_bug.part.0+0x208/0x22c mark_lock+0x7f0/0x8b0 __lock_acquire+0x7c4/0x1ce0 lock_acquire.part.0+0xe0/0x220 lock_acquire+0x68/0x84 _raw_spin_lock+0x5c/0xc0 netif_freeze_queues+0x5c/0xc0 netif_tx_lock+0x24/0x34 enetc_tx_onestep_tstamp+0x20/0x100 process_one_work+0x28c/0x6c0worker_thread+0x74/0x450 kthread+0x118/0x11c pero lo dir\u00e9 de todos modos: el elemento de trabajo enetc_tx_onestep_tstamp() se ejecuta en el contexto del proceso, por lo tanto, con softirqs habilitado (Es decir, puede ser interrumpido por un softirq). Si mantenemos la ejecuci\u00f3n de netif_tx_lock() cuando hay una interrupci\u00f3n, y luego se programa el softirq NET_TX, se ejecutar\u00e1 netif_tx_lock() por segunda vez y se bloquear\u00e1 el kernel. Para solucionar esto, use netif_tx_lock_bh(), que impide la ejecuci\u00f3n de los softirq."
}
],
"id": "CVE-2023-53022",
"lastModified": "2025-10-01T18:15:36.293",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-27T17:15:51.710",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/3c463721a73bdb57a913e0d3124677a3758886fc"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/8232e5a84d25a84a5cbda0f241a00793fb6eb608"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/e893dced1a18e77b1262f5c10169413f0ece0da7"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-667"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-667"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
WID-SEC-W-2025-0649
Vulnerability from csaf_certbund - Published: 2025-03-27 23:00 - Updated: 2026-03-05 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht spezifizierte Effekte zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0649 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0649.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0649 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0649"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2021-4454",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2021-4454-f4a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49738",
"url": "https://lore.kernel.org/linux-cve-announce/2025032756-CVE-2022-49738-c2ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49739",
"url": "https://lore.kernel.org/linux-cve-announce/2025032756-CVE-2022-49739-a93e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49740",
"url": "https://lore.kernel.org/linux-cve-announce/2025032757-CVE-2022-49740-7f6e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49741",
"url": "https://lore.kernel.org/linux-cve-announce/2025032757-CVE-2022-49741-65a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49742",
"url": "https://lore.kernel.org/linux-cve-announce/2025032757-CVE-2022-49742-e3d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49743",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49743-a049@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49744",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49744-8c5a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49745",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49745-903a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49746",
"url": "https://lore.kernel.org/linux-cve-announce/2025032758-CVE-2022-49746-251b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49747",
"url": "https://lore.kernel.org/linux-cve-announce/2025032759-CVE-2022-49747-f361@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49748",
"url": "https://lore.kernel.org/linux-cve-announce/2025032759-CVE-2022-49748-4658@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49749",
"url": "https://lore.kernel.org/linux-cve-announce/2025032759-CVE-2022-49749-ed85@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49750",
"url": "https://lore.kernel.org/linux-cve-announce/2025032700-CVE-2022-49750-743d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49751",
"url": "https://lore.kernel.org/linux-cve-announce/2025032700-CVE-2022-49751-bf8f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49752",
"url": "https://lore.kernel.org/linux-cve-announce/2025032700-CVE-2022-49752-19a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49753",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49753-d1ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49754",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49754-cc36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49755",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49755-dfb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49756",
"url": "https://lore.kernel.org/linux-cve-announce/2025032701-CVE-2022-49756-7fd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49757",
"url": "https://lore.kernel.org/linux-cve-announce/2025032702-CVE-2022-49757-a990@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49758",
"url": "https://lore.kernel.org/linux-cve-announce/2025032702-CVE-2022-49758-10e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49759",
"url": "https://lore.kernel.org/linux-cve-announce/2025032702-CVE-2022-49759-5392@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49760",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2022-49760-97be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49761",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2022-49761-9b1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52928",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-52928-e380@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52929",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-52929-7900@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52930",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-52930-4bbc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52931",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-52931-593f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52932",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52932-434b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52933",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52933-f292@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52934",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52934-bd3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52935",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-52935-1c3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52936",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-52936-d459@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52937",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-52937-605d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52938",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-52938-ee34@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52939",
"url": "https://lore.kernel.org/linux-cve-announce/2025032722-CVE-2023-52939-8bb1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52940",
"url": "https://lore.kernel.org/linux-cve-announce/2025032722-CVE-2023-52940-2e53@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52941",
"url": "https://lore.kernel.org/linux-cve-announce/2025032722-CVE-2023-52941-7c12@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52942",
"url": "https://lore.kernel.org/linux-cve-announce/2025032723-CVE-2023-52942-6a3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52973",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2023-52973-a993@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52974",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52974-0aa2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52975",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52975-155c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52976",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52976-eda3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52977",
"url": "https://lore.kernel.org/linux-cve-announce/2025032704-CVE-2023-52977-f91d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52978",
"url": "https://lore.kernel.org/linux-cve-announce/2025032705-CVE-2023-52978-6a05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52979",
"url": "https://lore.kernel.org/linux-cve-announce/2025032705-CVE-2023-52979-ca3f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52980",
"url": "https://lore.kernel.org/linux-cve-announce/2025032705-CVE-2023-52980-0fea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52981",
"url": "https://lore.kernel.org/linux-cve-announce/2025032706-CVE-2023-52981-070c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52982",
"url": "https://lore.kernel.org/linux-cve-announce/2025032706-CVE-2023-52982-7291@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52983",
"url": "https://lore.kernel.org/linux-cve-announce/2025032706-CVE-2023-52983-4a16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52984",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52984-19ad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52985",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52985-3f52@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52986",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52986-91fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52987",
"url": "https://lore.kernel.org/linux-cve-announce/2025032707-CVE-2023-52987-bcc0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52988",
"url": "https://lore.kernel.org/linux-cve-announce/2025032708-CVE-2023-52988-5520@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52989",
"url": "https://lore.kernel.org/linux-cve-announce/2025032708-CVE-2023-52989-1b68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52990",
"url": "https://lore.kernel.org/linux-cve-announce/2025032708-CVE-2023-52990-befd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52991",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52991-6358@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52992",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52992-bf46@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52993",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2023-52993-3697@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52994",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52994-5336@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52995",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52995-c28f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52996",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52996-7c1f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52997",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2023-52997-dbca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52998",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2023-52998-0671@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52999",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2023-52999-e28e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53000",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2023-53000-fded@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53001",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2023-53001-f28f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53002",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2023-53002-1f76@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53003",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2023-53003-8256@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53004",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53004-e58b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53005",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53005-9bf0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53006",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53006-209f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53007",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2023-53007-6ed4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53008",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2023-53008-415c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53009",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2023-53009-82cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53010",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2023-53010-56af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53011",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2023-53011-6f98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53012",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2023-53012-597c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53013",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2023-53013-58dc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53014",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53014-700f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53015",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53015-f139@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53016",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53016-f30c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53017",
"url": "https://lore.kernel.org/linux-cve-announce/2025032716-CVE-2023-53017-8dd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53018",
"url": "https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53018-c89c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53019",
"url": "https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53019-441a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53020",
"url": "https://lore.kernel.org/linux-cve-announce/2025032717-CVE-2023-53020-1042@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53021",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-53021-def9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53022",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-53022-b539@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53023",
"url": "https://lore.kernel.org/linux-cve-announce/2025032718-CVE-2023-53023-ef4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53024",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53024-8d19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53025",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53025-5662@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53026",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53026-0e24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53027",
"url": "https://lore.kernel.org/linux-cve-announce/2025032719-CVE-2023-53027-dc56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53028",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53028-8be6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53029",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53029-a670@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53030",
"url": "https://lore.kernel.org/linux-cve-announce/2025032720-CVE-2023-53030-ba50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53031",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-53031-39cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53032",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-53032-70ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53033",
"url": "https://lore.kernel.org/linux-cve-announce/2025032721-CVE-2023-53033-9089@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-58090",
"url": "https://lore.kernel.org/linux-cve-announce/2025032703-CVE-2024-58090-fddc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-58091",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2024-58091-a2a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21867",
"url": "https://lore.kernel.org/linux-cve-announce/2025032732-CVE-2025-21867-3138@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21868",
"url": "https://lore.kernel.org/linux-cve-announce/2025032734-CVE-2025-21868-ef4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21869",
"url": "https://lore.kernel.org/linux-cve-announce/2025032734-CVE-2025-21869-b4a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21870",
"url": "https://lore.kernel.org/linux-cve-announce/2025032735-CVE-2025-21870-4c78@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21871",
"url": "https://lore.kernel.org/linux-cve-announce/2025032735-CVE-2025-21871-bb8c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21872",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2025-21872-574e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21873",
"url": "https://lore.kernel.org/linux-cve-announce/2025032709-CVE-2025-21873-311e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21874",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2025-21874-d5d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21875",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2025-21875-8eca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21876",
"url": "https://lore.kernel.org/linux-cve-announce/2025032710-CVE-2025-21876-6c2f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21877",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21877-de70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21878",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21878-3c82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21879",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21879-f338@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21880",
"url": "https://lore.kernel.org/linux-cve-announce/2025032711-CVE-2025-21880-f716@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21881",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2025-21881-7a0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21882",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2025-21882-cc4d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21883",
"url": "https://lore.kernel.org/linux-cve-announce/2025032712-CVE-2025-21883-8b73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21884",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2025-21884-b70c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21885",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2025-21885-be9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21886",
"url": "https://lore.kernel.org/linux-cve-announce/2025032713-CVE-2025-21886-9ca3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21887",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21887-48e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21888",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21888-0f83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21889",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21889-0913@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21890",
"url": "https://lore.kernel.org/linux-cve-announce/2025032714-CVE-2025-21890-f286@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21891",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2025-21891-8717@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21892",
"url": "https://lore.kernel.org/linux-cve-announce/2025032715-CVE-2025-21892-12a2@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1195-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020680.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1194-1 vom 2025-04-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1263-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q4U3LRNKLFTX56NC6NKHFDU35E5WDD75/"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2025-04-16",
"url": "https://cloud.google.com/container-optimized-os/docs/release-notes#April_14_2025"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1975 vom 2025-04-30",
"url": "https://alas.aws.amazon.com/ALAS-2025-1975.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-100 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-100.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-089 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-089.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2834 vom 2025-04-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2834.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2837 vom 2025-04-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2837.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7514-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7516-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1574-1 vom 2025-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1573-1 vom 2025-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7512-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7517-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7518-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7521-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7522-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7516-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7511-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01627-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020866.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7516-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7517-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01633-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
"url": "https://ubuntu.com/security/notices/USN-7516-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-2 vom 2025-05-22",
"url": "https://ubuntu.com/security/notices/USN-7521-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7517-3"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7516-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
"url": "https://ubuntu.com/security/notices/USN-7510-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7510-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-3 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7521-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7510-8"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-9"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-8"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-7"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01918-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9079 vom 2025-06-16",
"url": "https://access.redhat.com/errata/RHSA-2025:9079"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9302 vom 2025-06-23",
"url": "https://access.redhat.com/errata/RHSA-2025:9302"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-103 vom 2025-06-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-103.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9302 vom 2025-06-24",
"url": "https://linux.oracle.com/errata/ELSA-2025-9302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02099-1 vom 2025-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021644.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9580 vom 2025-06-26",
"url": "https://linux.oracle.com/errata/ELSA-2025-9580.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9880 vom 2025-06-30",
"url": "https://access.redhat.com/errata/RHSA-2025:9880"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9896 vom 2025-06-30",
"url": "https://access.redhat.com/errata/RHSA-2025:9896"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-103 vom 2025-06-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-103.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9880 vom 2025-07-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-9880.html"
},
{
"category": "external",
"summary": "SEM 2025.2.1 release notes vom 2025-07-02",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9896 vom 2025-07-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-9896.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9079 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-9079.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10379 vom 2025-07-07",
"url": "https://access.redhat.com/errata/RHSA-2025:10379"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10527 vom 2025-07-07",
"url": "https://access.redhat.com/errata/RHSA-2025:10527"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-10379 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-10379.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02262-1 vom 2025-07-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B53IHD74IRNJDAOHBW4L7JGWNOM26XE7/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-082 vom 2025-07-10",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-082.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10830 vom 2025-07-14",
"url": "https://access.redhat.com/errata/RHSA-2025:10830"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10829 vom 2025-07-14",
"url": "https://access.redhat.com/errata/RHSA-2025:10829"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11045 vom 2025-07-15",
"url": "https://access.redhat.com/errata/RHSA-2025:11045"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02312-1 vom 2025-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021806.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11245 vom 2025-07-16",
"url": "https://access.redhat.com/errata/RHSA-2025:11245"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7640-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11455 vom 2025-07-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-11455.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-097 vom 2025-07-23",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-097.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11810 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11810"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-2 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-1 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-3 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13",
"url": "https://ubuntu.com/security/notices/USN-7685-5"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13962 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:13962"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14009 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:14009"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-1 vom 2025-08-19",
"url": "https://ubuntu.com/security/notices/USN-7701-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-1 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7703-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-2 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7701-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13962 vom 2025-08-20",
"url": "https://linux.oracle.com/errata/ELSA-2025-13962.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-2 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7703-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-3 vom 2025-08-21",
"url": "https://ubuntu.com/security/notices/USN-7701-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-3 vom 2025-08-21",
"url": "https://ubuntu.com/security/notices/USN-7703-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14009 vom 2025-08-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-14009.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14696 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14696"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14691 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14691"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7719-1 vom 2025-08-26",
"url": "https://ubuntu.com/security/notices/USN-7719-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7725-2 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7725-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7725-1 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7725-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7703-4 vom 2025-08-28",
"url": "https://ubuntu.com/security/notices/USN-7703-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15016 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:15016"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7725-3 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7725-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03",
"url": "https://ubuntu.com/security/notices/USN-7737-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03204-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022522.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3001 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7764-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7764-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7765-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7765-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7766-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7766-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7767-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7767-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-2 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-3 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7776-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7776-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7775-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7779-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7779-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7764-2 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7764-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7767-2 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7767-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-2 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7775-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-3 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7775-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-4 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7774-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7790-1 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7790-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7802-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7802-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7801-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7800-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7800-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-2 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7801-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-5 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7774-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7809-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7809-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0115-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/LSN-0115-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7819-1 vom 2025-10-13",
"url": "https://ubuntu.com/security/notices/USN-7819-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20662 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20662.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-3 vom 2025-10-15",
"url": "https://ubuntu.com/security/notices/USN-7801-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7832-1 vom 2025-10-21",
"url": "https://ubuntu.com/security/notices/USN-7832-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7819-2 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7819-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-404 vom 2025-10-31",
"url": "https://www.dell.com/support/kbdoc/000385435"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-2 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7910-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7910-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7911-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7911-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-4 vom 2025-12-05",
"url": "https://ubuntu.com/security/notices/USN-7909-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7933-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7933-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-5 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7909-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7938-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7938-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0140-1 vom 2026-01-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-030 vom 2026-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-1 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8031-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0475-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20326-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0495-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20332-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20309-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20328-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20316-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20330-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20327-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20325-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20294-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20300-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-3 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-4 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50113 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-50113.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-2 vom 2026-02-18",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-3 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-1 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-2 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-8 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50133 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-50133.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-2 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20560-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-05T23:00:00.000+00:00",
"generator": {
"date": "2026-03-06T10:29:59.187+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-0649",
"initial_release_date": "2025-03-27T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-14T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu, Debian und SUSE aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE, Ubuntu und Debian aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-17T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-22T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2025-06-24T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Amazon und Oracle Linux aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-07T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-13T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "48",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-20T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-21T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-26T22:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-01T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-24T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-25T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-08T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-14T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von SUSE und Dell aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von Ubuntu und Debian aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "109"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Virtual Edition",
"product": {
"name": "Dell NetWorker Virtual Edition",
"product_id": "T048226",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual_edition"
}
}
},
{
"category": "product_version_range",
"name": "vProxy \u003c19.14",
"product": {
"name": "Dell NetWorker vProxy \u003c19.14",
"product_id": "T050451"
}
},
{
"category": "product_version",
"name": "vProxy 19.14",
"product": {
"name": "Dell NetWorker vProxy 19.14",
"product_id": "T050451-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.14"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T042207",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager \u003c2025.2.1",
"product_id": "T044986"
}
},
{
"category": "product_version",
"name": "2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager 2025.2.1",
"product_id": "T044986-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4454",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2021-4454"
},
{
"cve": "CVE-2022-49738",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49738"
},
{
"cve": "CVE-2022-49739",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49739"
},
{
"cve": "CVE-2022-49740",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49740"
},
{
"cve": "CVE-2022-49741",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49741"
},
{
"cve": "CVE-2022-49742",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49742"
},
{
"cve": "CVE-2022-49743",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49743"
},
{
"cve": "CVE-2022-49744",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49744"
},
{
"cve": "CVE-2022-49745",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49745"
},
{
"cve": "CVE-2022-49746",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49746"
},
{
"cve": "CVE-2022-49747",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49747"
},
{
"cve": "CVE-2022-49748",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49748"
},
{
"cve": "CVE-2022-49749",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49749"
},
{
"cve": "CVE-2022-49750",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49750"
},
{
"cve": "CVE-2022-49751",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49751"
},
{
"cve": "CVE-2022-49752",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49752"
},
{
"cve": "CVE-2022-49753",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49753"
},
{
"cve": "CVE-2022-49754",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49754"
},
{
"cve": "CVE-2022-49755",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49755"
},
{
"cve": "CVE-2022-49756",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49756"
},
{
"cve": "CVE-2022-49757",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49757"
},
{
"cve": "CVE-2022-49758",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49758"
},
{
"cve": "CVE-2022-49759",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49759"
},
{
"cve": "CVE-2022-49760",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49760"
},
{
"cve": "CVE-2022-49761",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2022-49761"
},
{
"cve": "CVE-2023-0179",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-0179"
},
{
"cve": "CVE-2023-52928",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52928"
},
{
"cve": "CVE-2023-52929",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52929"
},
{
"cve": "CVE-2023-52930",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52930"
},
{
"cve": "CVE-2023-52931",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52931"
},
{
"cve": "CVE-2023-52932",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52932"
},
{
"cve": "CVE-2023-52933",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52933"
},
{
"cve": "CVE-2023-52934",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52934"
},
{
"cve": "CVE-2023-52935",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52935"
},
{
"cve": "CVE-2023-52936",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52936"
},
{
"cve": "CVE-2023-52937",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52937"
},
{
"cve": "CVE-2023-52938",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52938"
},
{
"cve": "CVE-2023-52939",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52939"
},
{
"cve": "CVE-2023-52940",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52940"
},
{
"cve": "CVE-2023-52941",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52941"
},
{
"cve": "CVE-2023-52942",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52942"
},
{
"cve": "CVE-2023-52973",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52973"
},
{
"cve": "CVE-2023-52974",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52974"
},
{
"cve": "CVE-2023-52975",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52975"
},
{
"cve": "CVE-2023-52976",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52976"
},
{
"cve": "CVE-2023-52977",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52977"
},
{
"cve": "CVE-2023-52978",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52978"
},
{
"cve": "CVE-2023-52979",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52979"
},
{
"cve": "CVE-2023-52980",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52980"
},
{
"cve": "CVE-2023-52981",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52981"
},
{
"cve": "CVE-2023-52982",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52982"
},
{
"cve": "CVE-2023-52983",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52983"
},
{
"cve": "CVE-2023-52984",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52984"
},
{
"cve": "CVE-2023-52985",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52985"
},
{
"cve": "CVE-2023-52986",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52986"
},
{
"cve": "CVE-2023-52987",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52987"
},
{
"cve": "CVE-2023-52988",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52988"
},
{
"cve": "CVE-2023-52989",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52989"
},
{
"cve": "CVE-2023-52990",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52990"
},
{
"cve": "CVE-2023-52991",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52991"
},
{
"cve": "CVE-2023-52992",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52992"
},
{
"cve": "CVE-2023-52993",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52993"
},
{
"cve": "CVE-2023-52994",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52994"
},
{
"cve": "CVE-2023-52995",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52995"
},
{
"cve": "CVE-2023-52996",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52996"
},
{
"cve": "CVE-2023-52997",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52997"
},
{
"cve": "CVE-2023-52998",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52998"
},
{
"cve": "CVE-2023-52999",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-52999"
},
{
"cve": "CVE-2023-53000",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53000"
},
{
"cve": "CVE-2023-53001",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53001"
},
{
"cve": "CVE-2023-53002",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53002"
},
{
"cve": "CVE-2023-53003",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53003"
},
{
"cve": "CVE-2023-53004",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53004"
},
{
"cve": "CVE-2023-53005",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53005"
},
{
"cve": "CVE-2023-53006",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53006"
},
{
"cve": "CVE-2023-53007",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53007"
},
{
"cve": "CVE-2023-53008",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53008"
},
{
"cve": "CVE-2023-53009",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53009"
},
{
"cve": "CVE-2023-53010",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53010"
},
{
"cve": "CVE-2023-53011",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53011"
},
{
"cve": "CVE-2023-53012",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53012"
},
{
"cve": "CVE-2023-53013",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53013"
},
{
"cve": "CVE-2023-53014",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53014"
},
{
"cve": "CVE-2023-53015",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53015"
},
{
"cve": "CVE-2023-53016",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53016"
},
{
"cve": "CVE-2023-53017",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53017"
},
{
"cve": "CVE-2023-53018",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53018"
},
{
"cve": "CVE-2023-53019",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53019"
},
{
"cve": "CVE-2023-53020",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53020"
},
{
"cve": "CVE-2023-53021",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53021"
},
{
"cve": "CVE-2023-53022",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53022"
},
{
"cve": "CVE-2023-53023",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53023"
},
{
"cve": "CVE-2023-53024",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53024"
},
{
"cve": "CVE-2023-53025",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53025"
},
{
"cve": "CVE-2023-53026",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53026"
},
{
"cve": "CVE-2023-53027",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53027"
},
{
"cve": "CVE-2023-53028",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53028"
},
{
"cve": "CVE-2023-53029",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53029"
},
{
"cve": "CVE-2023-53030",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53030"
},
{
"cve": "CVE-2023-53031",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53031"
},
{
"cve": "CVE-2023-53032",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53032"
},
{
"cve": "CVE-2023-53033",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2023-53033"
},
{
"cve": "CVE-2024-58090",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2024-58090"
},
{
"cve": "CVE-2024-58091",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2024-58091"
},
{
"cve": "CVE-2025-21867",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21867"
},
{
"cve": "CVE-2025-21868",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21868"
},
{
"cve": "CVE-2025-21869",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21869"
},
{
"cve": "CVE-2025-21870",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21870"
},
{
"cve": "CVE-2025-21871",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21871"
},
{
"cve": "CVE-2025-21872",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21872"
},
{
"cve": "CVE-2025-21873",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21873"
},
{
"cve": "CVE-2025-21874",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21874"
},
{
"cve": "CVE-2025-21875",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21875"
},
{
"cve": "CVE-2025-21876",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21876"
},
{
"cve": "CVE-2025-21877",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21877"
},
{
"cve": "CVE-2025-21878",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21878"
},
{
"cve": "CVE-2025-21879",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21879"
},
{
"cve": "CVE-2025-21880",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21880"
},
{
"cve": "CVE-2025-21881",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21881"
},
{
"cve": "CVE-2025-21882",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21882"
},
{
"cve": "CVE-2025-21883",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21883"
},
{
"cve": "CVE-2025-21884",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21884"
},
{
"cve": "CVE-2025-21885",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21885"
},
{
"cve": "CVE-2025-21886",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21886"
},
{
"cve": "CVE-2025-21887",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21887"
},
{
"cve": "CVE-2025-21888",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21888"
},
{
"cve": "CVE-2025-21889",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21889"
},
{
"cve": "CVE-2025-21890",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21890"
},
{
"cve": "CVE-2025-21891",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21891"
},
{
"cve": "CVE-2025-21892",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T050451",
"T039664",
"T044986",
"2951",
"T002207",
"T000126",
"T042207",
"T027843",
"398363",
"1607324",
"T048226",
"T048301"
]
},
"release_date": "2025-03-27T23:00:00.000+00:00",
"title": "CVE-2025-21892"
}
]
}
GHSA-9933-F4M5-7V96
Vulnerability from github – Published: 2025-03-27 18:31 – Updated: 2025-04-15 21:31In the Linux kernel, the following vulnerability has been resolved:
net: enetc: avoid deadlock in enetc_tx_onestep_tstamp()
This lockdep splat says it better than I could:
================================ WARNING: inconsistent lock state 6.2.0-rc2-07010-ga9b9500ffaac-dirty #967 Not tainted
inconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W} usage. kworker/1:3/179 [HC0[0]:SC0[0]:HE1:SE1] takes: ffff3ec4036ce098 (_xmit_ETHER#2){+.?.}-{3:3}, at: netif_freeze_queues+0x5c/0xc0 {IN-SOFTIRQ-W} state was registered at: _raw_spin_lock+0x5c/0xc0 sch_direct_xmit+0x148/0x37c __dev_queue_xmit+0x528/0x111c ip6_finish_output2+0x5ec/0xb7c ip6_finish_output+0x240/0x3f0 ip6_output+0x78/0x360 ndisc_send_skb+0x33c/0x85c ndisc_send_rs+0x54/0x12c addrconf_rs_timer+0x154/0x260 call_timer_fn+0xb8/0x3a0 __run_timers.part.0+0x214/0x26c run_timer_softirq+0x3c/0x74 __do_softirq+0x14c/0x5d8 _dosoftirq+0x10/0x20 call_on_irq_stack+0x2c/0x5c do_softirq_own_stack+0x1c/0x30 irq_exit_rcu+0x168/0x1a0 irq_exit_rcu+0x10/0x40 el1_interrupt+0x38/0x64 irq event stamp: 7825 hardirqs last enabled at (7825): [] exit_to_kernel_mode+0x34/0x130 hardirqs last disabled at (7823): [] __do_softirq+0x550/0x5d8 softirqs last enabled at (7824): [] __do_softirq+0x46c/0x5d8 softirqs last disabled at (7811): [] ____do_softirq+0x10/0x20
other info that might help us debug this: Possible unsafe locking scenario:
CPU0
----
lock(_xmit_ETHER#2); lock(_xmit_ETHER#2);
*** DEADLOCK ***
3 locks held by kworker/1:3/179: #0: ffff3ec400004748 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0 #1: ffff80000a0bbdc8 ((work_completion)(&priv->tx_onestep_tstamp)){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0 #2: ffff3ec4036cd438 (&dev->tx_global_lock){+.+.}-{3:3}, at: netif_tx_lock+0x1c/0x34
Workqueue: events enetc_tx_onestep_tstamp Call trace: print_usage_bug.part.0+0x208/0x22c mark_lock+0x7f0/0x8b0 __lock_acquire+0x7c4/0x1ce0 lock_acquire.part.0+0xe0/0x220 lock_acquire+0x68/0x84 _raw_spin_lock+0x5c/0xc0 netif_freeze_queues+0x5c/0xc0 netif_tx_lock+0x24/0x34 enetc_tx_onestep_tstamp+0x20/0x100 process_one_work+0x28c/0x6c0 worker_thread+0x74/0x450 kthread+0x118/0x11c
but I'll say it anyway: the enetc_tx_onestep_tstamp() work item runs in process context, therefore with softirqs enabled (i.o.w., it can be interrupted by a softirq). If we hold the netif_tx_lock() when there is an interrupt, and the NET_TX softirq then gets scheduled, this will take the netif_tx_lock() a second time and deadlock the kernel.
To solve this, use netif_tx_lock_bh(), which blocks softirqs from running.
{
"affected": [],
"aliases": [
"CVE-2023-53022"
],
"database_specific": {
"cwe_ids": [
"CWE-667"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-03-27T17:15:51Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: enetc: avoid deadlock in enetc_tx_onestep_tstamp()\n\nThis lockdep splat says it better than I could:\n\n================================\nWARNING: inconsistent lock state\n6.2.0-rc2-07010-ga9b9500ffaac-dirty #967 Not tainted\n--------------------------------\ninconsistent {IN-SOFTIRQ-W} -\u003e {SOFTIRQ-ON-W} usage.\nkworker/1:3/179 [HC0[0]:SC0[0]:HE1:SE1] takes:\nffff3ec4036ce098 (_xmit_ETHER#2){+.?.}-{3:3}, at: netif_freeze_queues+0x5c/0xc0\n{IN-SOFTIRQ-W} state was registered at:\n _raw_spin_lock+0x5c/0xc0\n sch_direct_xmit+0x148/0x37c\n __dev_queue_xmit+0x528/0x111c\n ip6_finish_output2+0x5ec/0xb7c\n ip6_finish_output+0x240/0x3f0\n ip6_output+0x78/0x360\n ndisc_send_skb+0x33c/0x85c\n ndisc_send_rs+0x54/0x12c\n addrconf_rs_timer+0x154/0x260\n call_timer_fn+0xb8/0x3a0\n __run_timers.part.0+0x214/0x26c\n run_timer_softirq+0x3c/0x74\n __do_softirq+0x14c/0x5d8\n ____do_softirq+0x10/0x20\n call_on_irq_stack+0x2c/0x5c\n do_softirq_own_stack+0x1c/0x30\n __irq_exit_rcu+0x168/0x1a0\n irq_exit_rcu+0x10/0x40\n el1_interrupt+0x38/0x64\nirq event stamp: 7825\nhardirqs last enabled at (7825): [\u003cffffdf1f7200cae4\u003e] exit_to_kernel_mode+0x34/0x130\nhardirqs last disabled at (7823): [\u003cffffdf1f708105f0\u003e] __do_softirq+0x550/0x5d8\nsoftirqs last enabled at (7824): [\u003cffffdf1f7081050c\u003e] __do_softirq+0x46c/0x5d8\nsoftirqs last disabled at (7811): [\u003cffffdf1f708166e0\u003e] ____do_softirq+0x10/0x20\n\nother info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(_xmit_ETHER#2);\n \u003cInterrupt\u003e\n lock(_xmit_ETHER#2);\n\n *** DEADLOCK ***\n\n3 locks held by kworker/1:3/179:\n #0: ffff3ec400004748 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\n #1: ffff80000a0bbdc8 ((work_completion)(\u0026priv-\u003etx_onestep_tstamp)){+.+.}-{0:0}, at: process_one_work+0x1f4/0x6c0\n #2: ffff3ec4036cd438 (\u0026dev-\u003etx_global_lock){+.+.}-{3:3}, at: netif_tx_lock+0x1c/0x34\n\nWorkqueue: events enetc_tx_onestep_tstamp\nCall trace:\n print_usage_bug.part.0+0x208/0x22c\n mark_lock+0x7f0/0x8b0\n __lock_acquire+0x7c4/0x1ce0\n lock_acquire.part.0+0xe0/0x220\n lock_acquire+0x68/0x84\n _raw_spin_lock+0x5c/0xc0\n netif_freeze_queues+0x5c/0xc0\n netif_tx_lock+0x24/0x34\n enetc_tx_onestep_tstamp+0x20/0x100\n process_one_work+0x28c/0x6c0\n worker_thread+0x74/0x450\n kthread+0x118/0x11c\n\nbut I\u0027ll say it anyway: the enetc_tx_onestep_tstamp() work item runs in\nprocess context, therefore with softirqs enabled (i.o.w., it can be\ninterrupted by a softirq). If we hold the netif_tx_lock() when there is\nan interrupt, and the NET_TX softirq then gets scheduled, this will take\nthe netif_tx_lock() a second time and deadlock the kernel.\n\nTo solve this, use netif_tx_lock_bh(), which blocks softirqs from\nrunning.",
"id": "GHSA-9933-f4m5-7v96",
"modified": "2025-04-15T21:31:30Z",
"published": "2025-03-27T18:31:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53022"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/3c463721a73bdb57a913e0d3124677a3758886fc"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/8232e5a84d25a84a5cbda0f241a00793fb6eb608"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/e893dced1a18e77b1262f5c10169413f0ece0da7"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.