Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53763 (GCVE-0-2023-53763)
Vulnerability from cvelistv5 – Published: 2025-12-08 01:19 – Updated: 2025-12-08 01:19| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
85eb8b61dd4cfc7a839a0e86287b92ca6193444e , < 0d545a8e77cbd1fbad311b18952e38e0f7672ab4
(git)
Affected: d48a7b3a72f121655d95b5157c32c7d555e44c05 , < ea35767edc78327c686e21fe1231b668f11be0db (git) Affected: d48a7b3a72f121655d95b5157c32c7d555e44c05 , < bbb3cd66301ef752fae2922452660f228d69bcaf (git) Affected: d48a7b3a72f121655d95b5157c32c7d555e44c05 , < 958ccbbf1ce716d77c7cfa79ace50a421c1eed73 (git) Affected: a3d1fd01250ffca88c11e9bd8d19be779acc7557 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/f2fs/inode.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "0d545a8e77cbd1fbad311b18952e38e0f7672ab4",
"status": "affected",
"version": "85eb8b61dd4cfc7a839a0e86287b92ca6193444e",
"versionType": "git"
},
{
"lessThan": "ea35767edc78327c686e21fe1231b668f11be0db",
"status": "affected",
"version": "d48a7b3a72f121655d95b5157c32c7d555e44c05",
"versionType": "git"
},
{
"lessThan": "bbb3cd66301ef752fae2922452660f228d69bcaf",
"status": "affected",
"version": "d48a7b3a72f121655d95b5157c32c7d555e44c05",
"versionType": "git"
},
{
"lessThan": "958ccbbf1ce716d77c7cfa79ace50a421c1eed73",
"status": "affected",
"version": "d48a7b3a72f121655d95b5157c32c7d555e44c05",
"versionType": "git"
},
{
"status": "affected",
"version": "a3d1fd01250ffca88c11e9bd8d19be779acc7557",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/f2fs/inode.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.3"
},
{
"lessThan": "6.3",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.53",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.4.*",
"status": "unaffected",
"version": "6.4.16",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.5.*",
"status": "unaffected",
"version": "6.5.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.6",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.53",
"versionStartIncluding": "6.1.29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4.16",
"versionStartIncluding": "6.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.3",
"versionStartIncluding": "6.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6",
"versionStartIncluding": "6.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"f2fs: fix to do sanity check on extent cache correctly\"\n\nsyzbot reports a f2fs bug as below:\n\nUBSAN: array-index-out-of-bounds in fs/f2fs/f2fs.h:3275:19\nindex 1409 is out of range for type \u0027__le32[923]\u0027 (aka \u0027unsigned int[923]\u0027)\nCall Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106\n ubsan_epilogue lib/ubsan.c:217 [inline]\n __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348\n inline_data_addr fs/f2fs/f2fs.h:3275 [inline]\n __recover_inline_status fs/f2fs/inode.c:113 [inline]\n do_read_inode fs/f2fs/inode.c:480 [inline]\n f2fs_iget+0x4730/0x48b0 fs/f2fs/inode.c:604\n f2fs_fill_super+0x640e/0x80c0 fs/f2fs/super.c:4601\n mount_bdev+0x276/0x3b0 fs/super.c:1391\n legacy_get_tree+0xef/0x190 fs/fs_context.c:611\n vfs_get_tree+0x8c/0x270 fs/super.c:1519\n do_new_mount+0x28f/0xae0 fs/namespace.c:3335\n do_mount fs/namespace.c:3675 [inline]\n __do_sys_mount fs/namespace.c:3884 [inline]\n __se_sys_mount+0x2d9/0x3c0 fs/namespace.c:3861\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe issue was bisected to:\n\ncommit d48a7b3a72f121655d95b5157c32c7d555e44c05\nAuthor: Chao Yu \u003cchao@kernel.org\u003e\nDate: Mon Jan 9 03:49:20 2023 +0000\n\n f2fs: fix to do sanity check on extent cache correctly\n\nThe root cause is we applied both v1 and v2 of the patch, v2 is the right\nfix, so it needs to revert v1 in order to fix reported issue.\n\nv1:\ncommit d48a7b3a72f1 (\"f2fs: fix to do sanity check on extent cache correctly\")\nhttps://lore.kernel.org/lkml/20230109034920.492914-1-chao@kernel.org/\n\nv2:\ncommit 269d11948100 (\"f2fs: fix to do sanity check on extent cache correctly\")\nhttps://lore.kernel.org/lkml/20230207134808.1827869-1-chao@kernel.org/"
}
],
"providerMetadata": {
"dateUpdated": "2025-12-08T01:19:25.250Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/0d545a8e77cbd1fbad311b18952e38e0f7672ab4"
},
{
"url": "https://git.kernel.org/stable/c/ea35767edc78327c686e21fe1231b668f11be0db"
},
{
"url": "https://git.kernel.org/stable/c/bbb3cd66301ef752fae2922452660f228d69bcaf"
},
{
"url": "https://git.kernel.org/stable/c/958ccbbf1ce716d77c7cfa79ace50a421c1eed73"
}
],
"title": "Revert \"f2fs: fix to do sanity check on extent cache correctly\"",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-53763",
"datePublished": "2025-12-08T01:19:25.250Z",
"dateReserved": "2025-12-08T01:18:04.281Z",
"dateUpdated": "2025-12-08T01:19:25.250Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-53763\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-08T02:15:52.173\",\"lastModified\":\"2025-12-08T18:26:19.900\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nRevert \\\"f2fs: fix to do sanity check on extent cache correctly\\\"\\n\\nsyzbot reports a f2fs bug as below:\\n\\nUBSAN: array-index-out-of-bounds in fs/f2fs/f2fs.h:3275:19\\nindex 1409 is out of range for type \u0027__le32[923]\u0027 (aka \u0027unsigned int[923]\u0027)\\nCall Trace:\\n __dump_stack lib/dump_stack.c:88 [inline]\\n dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106\\n ubsan_epilogue lib/ubsan.c:217 [inline]\\n __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348\\n inline_data_addr fs/f2fs/f2fs.h:3275 [inline]\\n __recover_inline_status fs/f2fs/inode.c:113 [inline]\\n do_read_inode fs/f2fs/inode.c:480 [inline]\\n f2fs_iget+0x4730/0x48b0 fs/f2fs/inode.c:604\\n f2fs_fill_super+0x640e/0x80c0 fs/f2fs/super.c:4601\\n mount_bdev+0x276/0x3b0 fs/super.c:1391\\n legacy_get_tree+0xef/0x190 fs/fs_context.c:611\\n vfs_get_tree+0x8c/0x270 fs/super.c:1519\\n do_new_mount+0x28f/0xae0 fs/namespace.c:3335\\n do_mount fs/namespace.c:3675 [inline]\\n __do_sys_mount fs/namespace.c:3884 [inline]\\n __se_sys_mount+0x2d9/0x3c0 fs/namespace.c:3861\\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n\\nThe issue was bisected to:\\n\\ncommit d48a7b3a72f121655d95b5157c32c7d555e44c05\\nAuthor: Chao Yu \u003cchao@kernel.org\u003e\\nDate: Mon Jan 9 03:49:20 2023 +0000\\n\\n f2fs: fix to do sanity check on extent cache correctly\\n\\nThe root cause is we applied both v1 and v2 of the patch, v2 is the right\\nfix, so it needs to revert v1 in order to fix reported issue.\\n\\nv1:\\ncommit d48a7b3a72f1 (\\\"f2fs: fix to do sanity check on extent cache correctly\\\")\\nhttps://lore.kernel.org/lkml/20230109034920.492914-1-chao@kernel.org/\\n\\nv2:\\ncommit 269d11948100 (\\\"f2fs: fix to do sanity check on extent cache correctly\\\")\\nhttps://lore.kernel.org/lkml/20230207134808.1827869-1-chao@kernel.org/\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0d545a8e77cbd1fbad311b18952e38e0f7672ab4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/958ccbbf1ce716d77c7cfa79ace50a421c1eed73\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bbb3cd66301ef752fae2922452660f228d69bcaf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ea35767edc78327c686e21fe1231b668f11be0db\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
WID-SEC-W-2025-2756
Vulnerability from csaf_certbund - Published: 2025-12-07 23:00 - Updated: 2026-03-05 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder weitere, nicht spezifizierte Auswirkungen zu erlangen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2756 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2756.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2756 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2756"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50583",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2022-50583-a25a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50614",
"url": "https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50614-cc88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50615",
"url": "https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50615-5c90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50616",
"url": "https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50616-bef8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50617",
"url": "https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50617-84c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50618",
"url": "https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50618-6be5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50619",
"url": "https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50619-9b47@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50620",
"url": "https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50620-bf1f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50621",
"url": "https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50621-be59@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50622",
"url": "https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50622-9f34@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50623",
"url": "https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50623-03df@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50624",
"url": "https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50624-0011@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50625",
"url": "https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50625-a1e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50626",
"url": "https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50626-a97f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50627",
"url": "https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50627-a907@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50628",
"url": "https://lore.kernel.org/linux-cve-announce/2025120854-CVE-2022-50628-69d3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50629",
"url": "https://lore.kernel.org/linux-cve-announce/2025120854-CVE-2022-50629-52d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50630",
"url": "https://lore.kernel.org/linux-cve-announce/2025120854-CVE-2022-50630-3891@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53742",
"url": "https://lore.kernel.org/linux-cve-announce/2025120840-CVE-2023-53742-3a0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53743",
"url": "https://lore.kernel.org/linux-cve-announce/2025120840-CVE-2023-53743-5da6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53744",
"url": "https://lore.kernel.org/linux-cve-announce/2025120841-CVE-2023-53744-c66e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53745",
"url": "https://lore.kernel.org/linux-cve-announce/2025120841-CVE-2023-53745-2ae7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53746",
"url": "https://lore.kernel.org/linux-cve-announce/2025120841-CVE-2023-53746-cbfd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53747",
"url": "https://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53747-ae4a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53748",
"url": "https://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53748-4905@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53749",
"url": "https://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53749-b458@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53750",
"url": "https://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53750-c3be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53751",
"url": "https://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53751-2ff2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53752",
"url": "https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53752-339f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53753",
"url": "https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53753-1a11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53754",
"url": "https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53754-c601@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53755",
"url": "https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53755-1c4b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53756",
"url": "https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53756-f234@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53757",
"url": "https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53757-8c1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53758",
"url": "https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53758-93a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53759",
"url": "https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53759-c444@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53760",
"url": "https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53760-8e04@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53761",
"url": "https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53761-ea1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53762",
"url": "https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53762-01bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53763",
"url": "https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53763-3a65@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53764",
"url": "https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53764-c257@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53765",
"url": "https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53765-0317@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53766",
"url": "https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53766-9bc9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53767",
"url": "https://lore.kernel.org/linux-cve-announce/2025120846-CVE-2023-53767-02ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53768",
"url": "https://lore.kernel.org/linux-cve-announce/2025120846-CVE-2023-53768-2b71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53769",
"url": "https://lore.kernel.org/linux-cve-announce/2025120846-CVE-2023-53769-1a8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40267",
"url": "https://lore.kernel.org/linux-cve-announce/2025120714-CVE-2025-40267-4904@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40268",
"url": "https://lore.kernel.org/linux-cve-announce/2025120715-CVE-2025-40268-390a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40269",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40269-9769@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40270",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40270-78dc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40271",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40271-7612@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40272",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40272-507b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40273",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40273-3765@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40274",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40274-53be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40275",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40275-021a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40276",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40276-6558@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40277",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40277-d511@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40278",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40278-dae4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40279",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40279-81d3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40280",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40280-4612@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40281",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40281-557d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40282",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40282-cdda@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40283",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40283-0706@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40284",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40284-9c41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40285",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40285-9158@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40286",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40286-1b9c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40287",
"url": "https://lore.kernel.org/linux-cve-announce/2025120719-CVE-2025-40287-a68f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40288",
"url": "https://lore.kernel.org/linux-cve-announce/2025120719-CVE-2025-40288-7d9f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40289",
"url": "https://lore.kernel.org/linux-cve-announce/2025120719-CVE-2025-40289-6833@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40290",
"url": "https://lore.kernel.org/linux-cve-announce/2025120811-CVE-2025-40290-852d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40291",
"url": "https://lore.kernel.org/linux-cve-announce/2025120815-CVE-2025-40291-8752@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40292",
"url": "https://lore.kernel.org/linux-cve-announce/2025120818-CVE-2025-40292-e613@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40293",
"url": "https://lore.kernel.org/linux-cve-announce/2025120818-CVE-2025-40293-cfe7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40294",
"url": "https://lore.kernel.org/linux-cve-announce/2025120818-CVE-2025-40294-b8e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40295",
"url": "https://lore.kernel.org/linux-cve-announce/2025120818-CVE-2025-40295-e4f2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40296",
"url": "https://lore.kernel.org/linux-cve-announce/2025120818-CVE-2025-40296-0769@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40297",
"url": "https://lore.kernel.org/linux-cve-announce/2025120819-CVE-2025-40297-8d83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40298",
"url": "https://lore.kernel.org/linux-cve-announce/2025120819-CVE-2025-40298-af76@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40299",
"url": "https://lore.kernel.org/linux-cve-announce/2025120819-CVE-2025-40299-fd5b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40301",
"url": "https://lore.kernel.org/linux-cve-announce/2025120819-CVE-2025-40301-4d3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40302",
"url": "https://lore.kernel.org/linux-cve-announce/2025120819-CVE-2025-40302-84e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40303",
"url": "https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40303-8209@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40304",
"url": "https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40304-47b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40305",
"url": "https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40305-d66a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40306",
"url": "https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40306-3e2f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40307",
"url": "https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40307-40f1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40308",
"url": "https://lore.kernel.org/linux-cve-announce/2025120821-CVE-2025-40308-0613@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40309",
"url": "https://lore.kernel.org/linux-cve-announce/2025120821-CVE-2025-40309-8e98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40310",
"url": "https://lore.kernel.org/linux-cve-announce/2025120821-CVE-2025-40310-23c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40311",
"url": "https://lore.kernel.org/linux-cve-announce/2025120821-CVE-2025-40311-34ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40312",
"url": "https://lore.kernel.org/linux-cve-announce/2025120821-CVE-2025-40312-2743@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40313",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2025-40313-d68b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40314",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2025-40314-1dcb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40315",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2025-40315-38da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40316",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2025-40316-eeed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40317",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2025-40317-5237@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40318",
"url": "https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40318-0f27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40319",
"url": "https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40319-9a46@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40320",
"url": "https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40320-8b44@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40321",
"url": "https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40321-83bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40322",
"url": "https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40322-6355@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40323",
"url": "https://lore.kernel.org/linux-cve-announce/2025120824-CVE-2025-40323-047f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40324",
"url": "https://lore.kernel.org/linux-cve-announce/2025120824-CVE-2025-40324-a4cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40326",
"url": "https://lore.kernel.org/linux-cve-announce/2025120824-CVE-2025-40326-4c06@gregkh/"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2025-12-09",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28067 vom 2025-12-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-28067.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28068 vom 2025-12-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-28068.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20251224-0011 vom 2025-12-24",
"url": "https://security.netapp.com/advisory/NTAP-20251224-0011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0453 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0453"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0453 vom 2026-01-13",
"url": "https://linux.oracle.com/errata/ELSA-2026-0453.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50005 vom 2026-01-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50005.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50007 vom 2026-01-14",
"url": "https://linux.oracle.com/errata/ELSA-2026-50007.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4436 vom 2026-01-14",
"url": "https://lists.debian.org/debian-lts-announce/2026/01/msg00007.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50006 vom 2026-01-15",
"url": "http://linux.oracle.com/errata/ELSA-2026-50006.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0453 vom 2026-01-17",
"url": "https://errata.build.resf.org/RLSA-2026:0453"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0793 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0793"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50061 vom 2026-01-20",
"url": "http://linux.oracle.com/errata/ELSA-2026-50061.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0917 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0917"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0793 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0793.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0263-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1148 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1148"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0793 vom 2026-01-24",
"url": "https://errata.build.resf.org/RLSA-2026:0793"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1236 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1236"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1194 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1194"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50071 vom 2026-01-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-50071.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1143 vom 2026-01-27",
"url": "https://linux.oracle.com/errata/ELSA-2026-1143.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1441 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1441"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1445 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1445"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1443 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1443"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1442 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1442"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1512 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1512"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1495 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1495"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1494 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1494"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0317-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0350-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1661 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1661"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1662 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1662"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1727 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1727"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1690 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1690"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0369-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1142 vom 2026-02-03",
"url": "https://errata.build.resf.org/RLSA-2026:1142"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1886 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1886"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1148 vom 2026-02-03",
"url": "https://errata.build.resf.org/RLSA-2026:1148"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1690 vom 2026-02-03",
"url": "http://linux.oracle.com/errata/ELSA-2026-1690.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1662 vom 2026-02-03",
"url": "http://linux.oracle.com/errata/ELSA-2026-1662.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1946 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1946"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1909 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1909"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1143 vom 2026-02-05",
"url": "https://errata.build.resf.org/RLSA-2026:1143"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20228-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20220-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2264 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2264"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1690 vom 2026-02-08",
"url": "https://errata.build.resf.org/RLSA-2026:1690"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2212 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2212"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2282 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2282"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2026-007 vom 2026-02-09",
"url": "https://docs.cloud.google.com/support/bulletins#gcp-2026-007"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6126 vom 2026-02-09",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2352 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2352"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50100 vom 2026-02-10",
"url": "http://linux.oracle.com/errata/ELSA-2026-50100.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2378 vom 2026-02-10",
"url": "https://access.redhat.com/errata/RHSA-2026:2378"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0411-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2212 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2212.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2282 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2282.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2490 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2490"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2264 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2264.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1662 vom 2026-02-11",
"url": "https://errata.build.resf.org/RLSA-2026:1662"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1661 vom 2026-02-11",
"url": "https://errata.build.resf.org/RLSA-2026:1661"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2535 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2535"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2583 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2583"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2577 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2577"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2573 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2573"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2560 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2560"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-1 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8030-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2594 vom 2026-02-12",
"url": "https://access.redhat.com/errata/RHSA-2026:2594"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2664 vom 2026-02-12",
"url": "https://access.redhat.com/errata/RHSA-2026:2664"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2282 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2282"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2212 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2212"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2264 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2264"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2722 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2722"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2721 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2721"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2721 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-2721.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2761 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2761"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2720 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2720"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2766 vom 2026-02-17",
"url": "https://access.redhat.com/errata/RHSA-2026:2766"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2759 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2759"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2722 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-2722.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50113 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-50113.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8048-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8048-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2720 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-2720.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-3 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2821 vom 2026-02-17",
"url": "https://access.redhat.com/errata/RHSA-2026:2821"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-4 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-2 vom 2026-02-18",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-3 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2026-118 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2026-118.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-6 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-6"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-112 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-1 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-3 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8029-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3268 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3268"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-2 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-8 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2722 vom 2026-02-24",
"url": "https://errata.build.resf.org/RLSA-2026:2722"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2721 vom 2026-02-24",
"url": "https://errata.build.resf.org/RLSA-2026:2721"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3277 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3277"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3267 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3267"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3293 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3293"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3360 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3360"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3358 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3358"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3375 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3375"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3388 vom 2026-02-26",
"url": "https://access.redhat.com/errata/RHSA-2026:3388"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2720 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:2720"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2821 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:2821"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50134 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-50134.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50133 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-50133.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3634 vom 2026-03-03",
"url": "https://access.redhat.com/errata/RHSA-2026:3634"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3685 vom 2026-03-03",
"url": "https://access.redhat.com/errata/RHSA-2026:3685"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-2 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20564-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2026-03-05T23:00:00.000+00:00",
"generator": {
"date": "2026-03-06T10:24:28.014+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2756",
"initial_release_date": "2025-12-07T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-12-09T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Debian und Oracle Linux aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE, Red Hat und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE, Rocky Enterprise Software Foundation, Red Hat, Oracle Linux und openSUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat, Rocky Enterprise Software Foundation und SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-08T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat, Google, Debian und Oracle Linux aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat, Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Oracle Linux, Ubuntu und Red Hat aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat, SUSE, Ubuntu und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-03T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "42"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "azl3",
"product": {
"name": "Microsoft Azure Linux azl3",
"product_id": "T049210",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_linux:azl3"
}
}
}
],
"category": "product_name",
"name": "Azure Linux"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp AFF",
"product": {
"name": "NetApp AFF",
"product_id": "T020536",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:aff:-"
}
}
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T049184",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50583",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50583"
},
{
"cve": "CVE-2022-50614",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50614"
},
{
"cve": "CVE-2022-50615",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50615"
},
{
"cve": "CVE-2022-50616",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50616"
},
{
"cve": "CVE-2022-50617",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50617"
},
{
"cve": "CVE-2022-50618",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50618"
},
{
"cve": "CVE-2022-50619",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50619"
},
{
"cve": "CVE-2022-50620",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50620"
},
{
"cve": "CVE-2022-50621",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50621"
},
{
"cve": "CVE-2022-50622",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50622"
},
{
"cve": "CVE-2022-50623",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50623"
},
{
"cve": "CVE-2022-50624",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50624"
},
{
"cve": "CVE-2022-50625",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50625"
},
{
"cve": "CVE-2022-50626",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50626"
},
{
"cve": "CVE-2022-50627",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50627"
},
{
"cve": "CVE-2022-50628",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50628"
},
{
"cve": "CVE-2022-50629",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50629"
},
{
"cve": "CVE-2022-50630",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50630"
},
{
"cve": "CVE-2023-53742",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53742"
},
{
"cve": "CVE-2023-53743",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53743"
},
{
"cve": "CVE-2023-53744",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53744"
},
{
"cve": "CVE-2023-53745",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53745"
},
{
"cve": "CVE-2023-53746",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53746"
},
{
"cve": "CVE-2023-53747",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53747"
},
{
"cve": "CVE-2023-53748",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53748"
},
{
"cve": "CVE-2023-53749",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53749"
},
{
"cve": "CVE-2023-53750",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53750"
},
{
"cve": "CVE-2023-53751",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53751"
},
{
"cve": "CVE-2023-53752",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53752"
},
{
"cve": "CVE-2023-53753",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53753"
},
{
"cve": "CVE-2023-53754",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53754"
},
{
"cve": "CVE-2023-53755",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53755"
},
{
"cve": "CVE-2023-53756",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53756"
},
{
"cve": "CVE-2023-53757",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53757"
},
{
"cve": "CVE-2023-53758",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53758"
},
{
"cve": "CVE-2023-53759",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53759"
},
{
"cve": "CVE-2023-53760",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53760"
},
{
"cve": "CVE-2023-53761",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53761"
},
{
"cve": "CVE-2023-53762",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53762"
},
{
"cve": "CVE-2023-53763",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53763"
},
{
"cve": "CVE-2023-53764",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53764"
},
{
"cve": "CVE-2023-53765",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53765"
},
{
"cve": "CVE-2023-53766",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53766"
},
{
"cve": "CVE-2023-53767",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53767"
},
{
"cve": "CVE-2023-53768",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53768"
},
{
"cve": "CVE-2023-53769",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53769"
},
{
"cve": "CVE-2025-40267",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40267"
},
{
"cve": "CVE-2025-40268",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40268"
},
{
"cve": "CVE-2025-40269",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40269"
},
{
"cve": "CVE-2025-40270",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40270"
},
{
"cve": "CVE-2025-40271",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40271"
},
{
"cve": "CVE-2025-40272",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40272"
},
{
"cve": "CVE-2025-40273",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40273"
},
{
"cve": "CVE-2025-40274",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40274"
},
{
"cve": "CVE-2025-40275",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40275"
},
{
"cve": "CVE-2025-40276",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40276"
},
{
"cve": "CVE-2025-40277",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40277"
},
{
"cve": "CVE-2025-40278",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40278"
},
{
"cve": "CVE-2025-40279",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40279"
},
{
"cve": "CVE-2025-40280",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40280"
},
{
"cve": "CVE-2025-40281",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40281"
},
{
"cve": "CVE-2025-40282",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40282"
},
{
"cve": "CVE-2025-40283",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40283"
},
{
"cve": "CVE-2025-40284",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40284"
},
{
"cve": "CVE-2025-40285",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40285"
},
{
"cve": "CVE-2025-40286",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40286"
},
{
"cve": "CVE-2025-40287",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40287"
},
{
"cve": "CVE-2025-40288",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40288"
},
{
"cve": "CVE-2025-40289",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40289"
},
{
"cve": "CVE-2025-40290",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40290"
},
{
"cve": "CVE-2025-40291",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40291"
},
{
"cve": "CVE-2025-40292",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40292"
},
{
"cve": "CVE-2025-40293",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40293"
},
{
"cve": "CVE-2025-40294",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40294"
},
{
"cve": "CVE-2025-40295",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40295"
},
{
"cve": "CVE-2025-40296",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40296"
},
{
"cve": "CVE-2025-40297",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40297"
},
{
"cve": "CVE-2025-40298",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40298"
},
{
"cve": "CVE-2025-40299",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40299"
},
{
"cve": "CVE-2025-40301",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40301"
},
{
"cve": "CVE-2025-40302",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40302"
},
{
"cve": "CVE-2025-40303",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40303"
},
{
"cve": "CVE-2025-40304",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40304"
},
{
"cve": "CVE-2025-40305",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40305"
},
{
"cve": "CVE-2025-40306",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40306"
},
{
"cve": "CVE-2025-40307",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40307"
},
{
"cve": "CVE-2025-40308",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40308"
},
{
"cve": "CVE-2025-40309",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40309"
},
{
"cve": "CVE-2025-40310",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40310"
},
{
"cve": "CVE-2025-40311",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40311"
},
{
"cve": "CVE-2025-40312",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40312"
},
{
"cve": "CVE-2025-40313",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40313"
},
{
"cve": "CVE-2025-40314",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40314"
},
{
"cve": "CVE-2025-40315",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40315"
},
{
"cve": "CVE-2025-40316",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40316"
},
{
"cve": "CVE-2025-40317",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40317"
},
{
"cve": "CVE-2025-40318",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40318"
},
{
"cve": "CVE-2025-40319",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40319"
},
{
"cve": "CVE-2025-40320",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40320"
},
{
"cve": "CVE-2025-40321",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40321"
},
{
"cve": "CVE-2025-40322",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40322"
},
{
"cve": "CVE-2025-40323",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40323"
},
{
"cve": "CVE-2025-40324",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40324"
},
{
"cve": "CVE-2025-40326",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40326"
}
]
}
FKIE_CVE-2023-53763
Vulnerability from fkie_nvd - Published: 2025-12-08 02:15 - Updated: 2025-12-08 18:26| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/0d545a8e77cbd1fbad311b18952e38e0f7672ab4 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/958ccbbf1ce716d77c7cfa79ace50a421c1eed73 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/bbb3cd66301ef752fae2922452660f228d69bcaf | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/ea35767edc78327c686e21fe1231b668f11be0db |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"f2fs: fix to do sanity check on extent cache correctly\"\n\nsyzbot reports a f2fs bug as below:\n\nUBSAN: array-index-out-of-bounds in fs/f2fs/f2fs.h:3275:19\nindex 1409 is out of range for type \u0027__le32[923]\u0027 (aka \u0027unsigned int[923]\u0027)\nCall Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106\n ubsan_epilogue lib/ubsan.c:217 [inline]\n __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348\n inline_data_addr fs/f2fs/f2fs.h:3275 [inline]\n __recover_inline_status fs/f2fs/inode.c:113 [inline]\n do_read_inode fs/f2fs/inode.c:480 [inline]\n f2fs_iget+0x4730/0x48b0 fs/f2fs/inode.c:604\n f2fs_fill_super+0x640e/0x80c0 fs/f2fs/super.c:4601\n mount_bdev+0x276/0x3b0 fs/super.c:1391\n legacy_get_tree+0xef/0x190 fs/fs_context.c:611\n vfs_get_tree+0x8c/0x270 fs/super.c:1519\n do_new_mount+0x28f/0xae0 fs/namespace.c:3335\n do_mount fs/namespace.c:3675 [inline]\n __do_sys_mount fs/namespace.c:3884 [inline]\n __se_sys_mount+0x2d9/0x3c0 fs/namespace.c:3861\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe issue was bisected to:\n\ncommit d48a7b3a72f121655d95b5157c32c7d555e44c05\nAuthor: Chao Yu \u003cchao@kernel.org\u003e\nDate: Mon Jan 9 03:49:20 2023 +0000\n\n f2fs: fix to do sanity check on extent cache correctly\n\nThe root cause is we applied both v1 and v2 of the patch, v2 is the right\nfix, so it needs to revert v1 in order to fix reported issue.\n\nv1:\ncommit d48a7b3a72f1 (\"f2fs: fix to do sanity check on extent cache correctly\")\nhttps://lore.kernel.org/lkml/20230109034920.492914-1-chao@kernel.org/\n\nv2:\ncommit 269d11948100 (\"f2fs: fix to do sanity check on extent cache correctly\")\nhttps://lore.kernel.org/lkml/20230207134808.1827869-1-chao@kernel.org/"
}
],
"id": "CVE-2023-53763",
"lastModified": "2025-12-08T18:26:19.900",
"metrics": {},
"published": "2025-12-08T02:15:52.173",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/0d545a8e77cbd1fbad311b18952e38e0f7672ab4"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/958ccbbf1ce716d77c7cfa79ace50a421c1eed73"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/bbb3cd66301ef752fae2922452660f228d69bcaf"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/ea35767edc78327c686e21fe1231b668f11be0db"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
GHSA-5FW5-8689-Q6MQ
Vulnerability from github – Published: 2025-12-08 03:31 – Updated: 2025-12-08 03:31In the Linux kernel, the following vulnerability has been resolved:
Revert "f2fs: fix to do sanity check on extent cache correctly"
syzbot reports a f2fs bug as below:
UBSAN: array-index-out-of-bounds in fs/f2fs/f2fs.h:3275:19 index 1409 is out of range for type '__le32[923]' (aka 'unsigned int[923]') Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348 inline_data_addr fs/f2fs/f2fs.h:3275 [inline] __recover_inline_status fs/f2fs/inode.c:113 [inline] do_read_inode fs/f2fs/inode.c:480 [inline] f2fs_iget+0x4730/0x48b0 fs/f2fs/inode.c:604 f2fs_fill_super+0x640e/0x80c0 fs/f2fs/super.c:4601 mount_bdev+0x276/0x3b0 fs/super.c:1391 legacy_get_tree+0xef/0x190 fs/fs_context.c:611 vfs_get_tree+0x8c/0x270 fs/super.c:1519 do_new_mount+0x28f/0xae0 fs/namespace.c:3335 do_mount fs/namespace.c:3675 [inline] __do_sys_mount fs/namespace.c:3884 [inline] __se_sys_mount+0x2d9/0x3c0 fs/namespace.c:3861 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd
The issue was bisected to:
commit d48a7b3a72f121655d95b5157c32c7d555e44c05 Author: Chao Yu chao@kernel.org Date: Mon Jan 9 03:49:20 2023 +0000
f2fs: fix to do sanity check on extent cache correctly
The root cause is we applied both v1 and v2 of the patch, v2 is the right fix, so it needs to revert v1 in order to fix reported issue.
v1: commit d48a7b3a72f1 ("f2fs: fix to do sanity check on extent cache correctly") https://lore.kernel.org/lkml/20230109034920.492914-1-chao@kernel.org/
v2: commit 269d11948100 ("f2fs: fix to do sanity check on extent cache correctly") https://lore.kernel.org/lkml/20230207134808.1827869-1-chao@kernel.org/
{
"affected": [],
"aliases": [
"CVE-2023-53763"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-08T02:15:52Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"f2fs: fix to do sanity check on extent cache correctly\"\n\nsyzbot reports a f2fs bug as below:\n\nUBSAN: array-index-out-of-bounds in fs/f2fs/f2fs.h:3275:19\nindex 1409 is out of range for type \u0027__le32[923]\u0027 (aka \u0027unsigned int[923]\u0027)\nCall Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106\n ubsan_epilogue lib/ubsan.c:217 [inline]\n __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348\n inline_data_addr fs/f2fs/f2fs.h:3275 [inline]\n __recover_inline_status fs/f2fs/inode.c:113 [inline]\n do_read_inode fs/f2fs/inode.c:480 [inline]\n f2fs_iget+0x4730/0x48b0 fs/f2fs/inode.c:604\n f2fs_fill_super+0x640e/0x80c0 fs/f2fs/super.c:4601\n mount_bdev+0x276/0x3b0 fs/super.c:1391\n legacy_get_tree+0xef/0x190 fs/fs_context.c:611\n vfs_get_tree+0x8c/0x270 fs/super.c:1519\n do_new_mount+0x28f/0xae0 fs/namespace.c:3335\n do_mount fs/namespace.c:3675 [inline]\n __do_sys_mount fs/namespace.c:3884 [inline]\n __se_sys_mount+0x2d9/0x3c0 fs/namespace.c:3861\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe issue was bisected to:\n\ncommit d48a7b3a72f121655d95b5157c32c7d555e44c05\nAuthor: Chao Yu \u003cchao@kernel.org\u003e\nDate: Mon Jan 9 03:49:20 2023 +0000\n\n f2fs: fix to do sanity check on extent cache correctly\n\nThe root cause is we applied both v1 and v2 of the patch, v2 is the right\nfix, so it needs to revert v1 in order to fix reported issue.\n\nv1:\ncommit d48a7b3a72f1 (\"f2fs: fix to do sanity check on extent cache correctly\")\nhttps://lore.kernel.org/lkml/20230109034920.492914-1-chao@kernel.org/\n\nv2:\ncommit 269d11948100 (\"f2fs: fix to do sanity check on extent cache correctly\")\nhttps://lore.kernel.org/lkml/20230207134808.1827869-1-chao@kernel.org/",
"id": "GHSA-5fw5-8689-q6mq",
"modified": "2025-12-08T03:31:03Z",
"published": "2025-12-08T03:31:03Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53763"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/0d545a8e77cbd1fbad311b18952e38e0f7672ab4"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/958ccbbf1ce716d77c7cfa79ace50a421c1eed73"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/bbb3cd66301ef752fae2922452660f228d69bcaf"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ea35767edc78327c686e21fe1231b668f11be0db"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.