Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53986 (GCVE-0-2023-53986)
Vulnerability from cvelistv5 – Published: 2025-12-24 10:55 – Updated: 2025-12-24 10:55| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
d59098a0e9cb3c7767090e935c909b37a30629ab , < d65de5ee8b72868fbbbd39ca73017d0e526fa13a
(git)
Affected: d59098a0e9cb3c7767090e935c909b37a30629ab , < 47a449ec09b4479b89dcc6b27ec3829fc82ffafb (git) Affected: d59098a0e9cb3c7767090e935c909b37a30629ab , < 65b723644294f1d79770704162c0e8d1f700b6f1 (git) Affected: d59098a0e9cb3c7767090e935c909b37a30629ab , < 2cdbcff99f15db86a10672fb220379a1ae46ccae (git) Affected: d59098a0e9cb3c7767090e935c909b37a30629ab , < 288c96aa5b5526cd4a946e84ef85e165857693b5 (git) Affected: d59098a0e9cb3c7767090e935c909b37a30629ab , < ab327f8acdf8d06601fbf058859a539a9422afff (git) |
|||||||
|
|||||||||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"arch/mips/bmips/dma.c",
"arch/mips/bmips/setup.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "d65de5ee8b72868fbbbd39ca73017d0e526fa13a",
"status": "affected",
"version": "d59098a0e9cb3c7767090e935c909b37a30629ab",
"versionType": "git"
},
{
"lessThan": "47a449ec09b4479b89dcc6b27ec3829fc82ffafb",
"status": "affected",
"version": "d59098a0e9cb3c7767090e935c909b37a30629ab",
"versionType": "git"
},
{
"lessThan": "65b723644294f1d79770704162c0e8d1f700b6f1",
"status": "affected",
"version": "d59098a0e9cb3c7767090e935c909b37a30629ab",
"versionType": "git"
},
{
"lessThan": "2cdbcff99f15db86a10672fb220379a1ae46ccae",
"status": "affected",
"version": "d59098a0e9cb3c7767090e935c909b37a30629ab",
"versionType": "git"
},
{
"lessThan": "288c96aa5b5526cd4a946e84ef85e165857693b5",
"status": "affected",
"version": "d59098a0e9cb3c7767090e935c909b37a30629ab",
"versionType": "git"
},
{
"lessThan": "ab327f8acdf8d06601fbf058859a539a9422afff",
"status": "affected",
"version": "d59098a0e9cb3c7767090e935c909b37a30629ab",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"arch/mips/bmips/dma.c",
"arch/mips/bmips/setup.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "4.19"
},
{
"lessThan": "4.19",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.240",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.177",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.106",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.23",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.2.*",
"status": "unaffected",
"version": "6.2.10",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.3",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.240",
"versionStartIncluding": "4.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.177",
"versionStartIncluding": "4.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.106",
"versionStartIncluding": "4.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.23",
"versionStartIncluding": "4.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.10",
"versionStartIncluding": "4.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3",
"versionStartIncluding": "4.19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmips: bmips: BCM6358: disable RAC flush for TP1\n\nRAC flush causes kernel panics on BCM6358 with EHCI/OHCI when booting from TP1:\n[ 3.881739] usb 1-1: new high-speed USB device number 2 using ehci-platform\n[ 3.895011] Reserved instruction in kernel code[#1]:\n[ 3.900113] CPU: 0 PID: 1 Comm: init Not tainted 5.10.16 #0\n[ 3.905829] $ 0 : 00000000 10008700 00000000 77d94060\n[ 3.911238] $ 4 : 7fd1f088 00000000 81431cac 81431ca0\n[ 3.916641] $ 8 : 00000000 ffffefff 8075cd34 00000000\n[ 3.922043] $12 : 806f8d40 f3e812b7 00000000 000d9aaa\n[ 3.927446] $16 : 7fd1f068 7fd1f080 7ff559b8 81428470\n[ 3.932848] $20 : 00000000 00000000 55590000 77d70000\n[ 3.938251] $24 : 00000018 00000010\n[ 3.943655] $28 : 81430000 81431e60 81431f28 800157fc\n[ 3.949058] Hi : 00000000\n[ 3.952013] Lo : 00000000\n[ 3.955019] epc : 80015808 setup_sigcontext+0x54/0x24c\n[ 3.960464] ra : 800157fc setup_sigcontext+0x48/0x24c\n[ 3.965913] Status: 10008703\tKERNEL EXL IE\n[ 3.970216] Cause : 00800028 (ExcCode 0a)\n[ 3.974340] PrId : 0002a010 (Broadcom BMIPS4350)\n[ 3.979170] Modules linked in: ohci_platform ohci_hcd fsl_mph_dr_of ehci_platform ehci_fsl ehci_hcd gpio_button_hotplug usbcore nls_base usb_common\n[ 3.992907] Process init (pid: 1, threadinfo=(ptrval), task=(ptrval), tls=77e22ec8)\n[ 4.000776] Stack : 81431ef4 7fd1f080 81431f28 81428470 7fd1f068 81431edc 7ff559b8 81428470\n[ 4.009467] 81431f28 7fd1f080 55590000 77d70000 77d5498c 80015c70 806f0000 8063ae74\n[ 4.018149] 08100002 81431f28 0000000a 08100002 81431f28 0000000a 77d6b418 00000003\n[ 4.026831] ffffffff 80016414 80080734 81431ecc 81431ecc 00000001 00000000 04000000\n[ 4.035512] 77d54874 00000000 00000000 00000000 00000000 00000012 00000002 00000000\n[ 4.044196] ...\n[ 4.046706] Call Trace:\n[ 4.049238] [\u003c80015808\u003e] setup_sigcontext+0x54/0x24c\n[ 4.054356] [\u003c80015c70\u003e] setup_frame+0xdc/0x124\n[ 4.059015] [\u003c80016414\u003e] do_notify_resume+0x1dc/0x288\n[ 4.064207] [\u003c80011b50\u003e] work_notifysig+0x10/0x18\n[ 4.069036]\n[ 4.070538] Code: 8fc300b4 00001025 26240008 \u003cac820000\u003e ac830004 3c048063 0c0228aa 24846a00 26240010\n[ 4.080686]\n[ 4.082517] ---[ end trace 22a8edb41f5f983b ]---\n[ 4.087374] Kernel panic - not syncing: Fatal exception\n[ 4.092753] Rebooting in 1 seconds..\n\nBecause the bootloader (CFE) is not initializing the Read-ahead cache properly\non the second thread (TP1). Since the RAC was not initialized properly, we\nshould avoid flushing it at the risk of corrupting the instruction stream as\nseen in the trace above."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-24T10:55:26.282Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/d65de5ee8b72868fbbbd39ca73017d0e526fa13a"
},
{
"url": "https://git.kernel.org/stable/c/47a449ec09b4479b89dcc6b27ec3829fc82ffafb"
},
{
"url": "https://git.kernel.org/stable/c/65b723644294f1d79770704162c0e8d1f700b6f1"
},
{
"url": "https://git.kernel.org/stable/c/2cdbcff99f15db86a10672fb220379a1ae46ccae"
},
{
"url": "https://git.kernel.org/stable/c/288c96aa5b5526cd4a946e84ef85e165857693b5"
},
{
"url": "https://git.kernel.org/stable/c/ab327f8acdf8d06601fbf058859a539a9422afff"
}
],
"title": "mips: bmips: BCM6358: disable RAC flush for TP1",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-53986",
"datePublished": "2025-12-24T10:55:26.282Z",
"dateReserved": "2025-12-24T10:53:46.175Z",
"dateUpdated": "2025-12-24T10:55:26.282Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-53986\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-24T11:15:51.490\",\"lastModified\":\"2025-12-29T15:58:56.260\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmips: bmips: BCM6358: disable RAC flush for TP1\\n\\nRAC flush causes kernel panics on BCM6358 with EHCI/OHCI when booting from TP1:\\n[ 3.881739] usb 1-1: new high-speed USB device number 2 using ehci-platform\\n[ 3.895011] Reserved instruction in kernel code[#1]:\\n[ 3.900113] CPU: 0 PID: 1 Comm: init Not tainted 5.10.16 #0\\n[ 3.905829] $ 0 : 00000000 10008700 00000000 77d94060\\n[ 3.911238] $ 4 : 7fd1f088 00000000 81431cac 81431ca0\\n[ 3.916641] $ 8 : 00000000 ffffefff 8075cd34 00000000\\n[ 3.922043] $12 : 806f8d40 f3e812b7 00000000 000d9aaa\\n[ 3.927446] $16 : 7fd1f068 7fd1f080 7ff559b8 81428470\\n[ 3.932848] $20 : 00000000 00000000 55590000 77d70000\\n[ 3.938251] $24 : 00000018 00000010\\n[ 3.943655] $28 : 81430000 81431e60 81431f28 800157fc\\n[ 3.949058] Hi : 00000000\\n[ 3.952013] Lo : 00000000\\n[ 3.955019] epc : 80015808 setup_sigcontext+0x54/0x24c\\n[ 3.960464] ra : 800157fc setup_sigcontext+0x48/0x24c\\n[ 3.965913] Status: 10008703\\tKERNEL EXL IE\\n[ 3.970216] Cause : 00800028 (ExcCode 0a)\\n[ 3.974340] PrId : 0002a010 (Broadcom BMIPS4350)\\n[ 3.979170] Modules linked in: ohci_platform ohci_hcd fsl_mph_dr_of ehci_platform ehci_fsl ehci_hcd gpio_button_hotplug usbcore nls_base usb_common\\n[ 3.992907] Process init (pid: 1, threadinfo=(ptrval), task=(ptrval), tls=77e22ec8)\\n[ 4.000776] Stack : 81431ef4 7fd1f080 81431f28 81428470 7fd1f068 81431edc 7ff559b8 81428470\\n[ 4.009467] 81431f28 7fd1f080 55590000 77d70000 77d5498c 80015c70 806f0000 8063ae74\\n[ 4.018149] 08100002 81431f28 0000000a 08100002 81431f28 0000000a 77d6b418 00000003\\n[ 4.026831] ffffffff 80016414 80080734 81431ecc 81431ecc 00000001 00000000 04000000\\n[ 4.035512] 77d54874 00000000 00000000 00000000 00000000 00000012 00000002 00000000\\n[ 4.044196] ...\\n[ 4.046706] Call Trace:\\n[ 4.049238] [\u003c80015808\u003e] setup_sigcontext+0x54/0x24c\\n[ 4.054356] [\u003c80015c70\u003e] setup_frame+0xdc/0x124\\n[ 4.059015] [\u003c80016414\u003e] do_notify_resume+0x1dc/0x288\\n[ 4.064207] [\u003c80011b50\u003e] work_notifysig+0x10/0x18\\n[ 4.069036]\\n[ 4.070538] Code: 8fc300b4 00001025 26240008 \u003cac820000\u003e ac830004 3c048063 0c0228aa 24846a00 26240010\\n[ 4.080686]\\n[ 4.082517] ---[ end trace 22a8edb41f5f983b ]---\\n[ 4.087374] Kernel panic - not syncing: Fatal exception\\n[ 4.092753] Rebooting in 1 seconds..\\n\\nBecause the bootloader (CFE) is not initializing the Read-ahead cache properly\\non the second thread (TP1). Since the RAC was not initialized properly, we\\nshould avoid flushing it at the risk of corrupting the instruction stream as\\nseen in the trace above.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/288c96aa5b5526cd4a946e84ef85e165857693b5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2cdbcff99f15db86a10672fb220379a1ae46ccae\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/47a449ec09b4479b89dcc6b27ec3829fc82ffafb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/65b723644294f1d79770704162c0e8d1f700b6f1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ab327f8acdf8d06601fbf058859a539a9422afff\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d65de5ee8b72868fbbbd39ca73017d0e526fa13a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
FKIE_CVE-2023-53986
Vulnerability from fkie_nvd - Published: 2025-12-24 11:15 - Updated: 2025-12-29 15:58| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/288c96aa5b5526cd4a946e84ef85e165857693b5 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/2cdbcff99f15db86a10672fb220379a1ae46ccae | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/47a449ec09b4479b89dcc6b27ec3829fc82ffafb | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/65b723644294f1d79770704162c0e8d1f700b6f1 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/ab327f8acdf8d06601fbf058859a539a9422afff | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d65de5ee8b72868fbbbd39ca73017d0e526fa13a |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmips: bmips: BCM6358: disable RAC flush for TP1\n\nRAC flush causes kernel panics on BCM6358 with EHCI/OHCI when booting from TP1:\n[ 3.881739] usb 1-1: new high-speed USB device number 2 using ehci-platform\n[ 3.895011] Reserved instruction in kernel code[#1]:\n[ 3.900113] CPU: 0 PID: 1 Comm: init Not tainted 5.10.16 #0\n[ 3.905829] $ 0 : 00000000 10008700 00000000 77d94060\n[ 3.911238] $ 4 : 7fd1f088 00000000 81431cac 81431ca0\n[ 3.916641] $ 8 : 00000000 ffffefff 8075cd34 00000000\n[ 3.922043] $12 : 806f8d40 f3e812b7 00000000 000d9aaa\n[ 3.927446] $16 : 7fd1f068 7fd1f080 7ff559b8 81428470\n[ 3.932848] $20 : 00000000 00000000 55590000 77d70000\n[ 3.938251] $24 : 00000018 00000010\n[ 3.943655] $28 : 81430000 81431e60 81431f28 800157fc\n[ 3.949058] Hi : 00000000\n[ 3.952013] Lo : 00000000\n[ 3.955019] epc : 80015808 setup_sigcontext+0x54/0x24c\n[ 3.960464] ra : 800157fc setup_sigcontext+0x48/0x24c\n[ 3.965913] Status: 10008703\tKERNEL EXL IE\n[ 3.970216] Cause : 00800028 (ExcCode 0a)\n[ 3.974340] PrId : 0002a010 (Broadcom BMIPS4350)\n[ 3.979170] Modules linked in: ohci_platform ohci_hcd fsl_mph_dr_of ehci_platform ehci_fsl ehci_hcd gpio_button_hotplug usbcore nls_base usb_common\n[ 3.992907] Process init (pid: 1, threadinfo=(ptrval), task=(ptrval), tls=77e22ec8)\n[ 4.000776] Stack : 81431ef4 7fd1f080 81431f28 81428470 7fd1f068 81431edc 7ff559b8 81428470\n[ 4.009467] 81431f28 7fd1f080 55590000 77d70000 77d5498c 80015c70 806f0000 8063ae74\n[ 4.018149] 08100002 81431f28 0000000a 08100002 81431f28 0000000a 77d6b418 00000003\n[ 4.026831] ffffffff 80016414 80080734 81431ecc 81431ecc 00000001 00000000 04000000\n[ 4.035512] 77d54874 00000000 00000000 00000000 00000000 00000012 00000002 00000000\n[ 4.044196] ...\n[ 4.046706] Call Trace:\n[ 4.049238] [\u003c80015808\u003e] setup_sigcontext+0x54/0x24c\n[ 4.054356] [\u003c80015c70\u003e] setup_frame+0xdc/0x124\n[ 4.059015] [\u003c80016414\u003e] do_notify_resume+0x1dc/0x288\n[ 4.064207] [\u003c80011b50\u003e] work_notifysig+0x10/0x18\n[ 4.069036]\n[ 4.070538] Code: 8fc300b4 00001025 26240008 \u003cac820000\u003e ac830004 3c048063 0c0228aa 24846a00 26240010\n[ 4.080686]\n[ 4.082517] ---[ end trace 22a8edb41f5f983b ]---\n[ 4.087374] Kernel panic - not syncing: Fatal exception\n[ 4.092753] Rebooting in 1 seconds..\n\nBecause the bootloader (CFE) is not initializing the Read-ahead cache properly\non the second thread (TP1). Since the RAC was not initialized properly, we\nshould avoid flushing it at the risk of corrupting the instruction stream as\nseen in the trace above."
}
],
"id": "CVE-2023-53986",
"lastModified": "2025-12-29T15:58:56.260",
"metrics": {},
"published": "2025-12-24T11:15:51.490",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/288c96aa5b5526cd4a946e84ef85e165857693b5"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/2cdbcff99f15db86a10672fb220379a1ae46ccae"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/47a449ec09b4479b89dcc6b27ec3829fc82ffafb"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/65b723644294f1d79770704162c0e8d1f700b6f1"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/ab327f8acdf8d06601fbf058859a539a9422afff"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/d65de5ee8b72868fbbbd39ca73017d0e526fa13a"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
WID-SEC-W-2025-2920
Vulnerability from csaf_certbund - Published: 2025-12-23 23:00 - Updated: 2026-03-05 23:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2920 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2920.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2920 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2920"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50697",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50697-6281@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50698",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50698-0d67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50699",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50699-ddde@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50700",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50700-9cf6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50701",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50701-32f6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50702",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50702-c339@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50703",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50703-1c22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50704",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50704-ca2b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50705",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50705-8196@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50706",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50706-930a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50707",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50707-8f32@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50708",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50708-dfe3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50709",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50709-54af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50710",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50710-3f0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50711",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50711-30c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53867",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-53867-cb3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53986",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-53986-14c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53987",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-53987-9f08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53988",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-53988-7ea3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53989",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-53989-1b3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53990",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-53990-b239@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53991",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-53991-037d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53992",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-53992-d45e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53993",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-53993-7ec2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53994",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-53994-2d1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53995",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-53995-1860@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53996",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-53996-2c23@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53997",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-53997-8776@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53998",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-53998-2282@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53999",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-53999-57a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54000",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54000-b0c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54001",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54001-7e74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54002",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54002-10d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54003",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54003-01b7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54004",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54004-34a0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54005",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54005-d9ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54006",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54006-d646@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54007",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54007-89b1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54008",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54008-cfde@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54009",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54009-38dc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54010",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54010-9ff1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54011",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54011-258c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54012",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54012-a617@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54013",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54013-c6e4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54014",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54014-9b8c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54015",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54015-13a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54016",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54016-522e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54017",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54017-f83d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54018",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54018-0a10@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54019",
"url": "https://lore.kernel.org/linux-cve-announce/2025122433-CVE-2023-54019-95e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54020",
"url": "https://lore.kernel.org/linux-cve-announce/2025122433-CVE-2023-54020-3f2f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54021",
"url": "https://lore.kernel.org/linux-cve-announce/2025122433-CVE-2023-54021-15bf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54022",
"url": "https://lore.kernel.org/linux-cve-announce/2025122434-CVE-2023-54022-ae26@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54023",
"url": "https://lore.kernel.org/linux-cve-announce/2025122434-CVE-2023-54023-1300@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54024",
"url": "https://lore.kernel.org/linux-cve-announce/2025122434-CVE-2023-54024-30aa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54025",
"url": "https://lore.kernel.org/linux-cve-announce/2025122435-CVE-2023-54025-68db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54026",
"url": "https://lore.kernel.org/linux-cve-announce/2025122435-CVE-2023-54026-123c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54027",
"url": "https://lore.kernel.org/linux-cve-announce/2025122435-CVE-2023-54027-c1a0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54028",
"url": "https://lore.kernel.org/linux-cve-announce/2025122436-CVE-2023-54028-2399@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54029",
"url": "https://lore.kernel.org/linux-cve-announce/2025122436-CVE-2023-54029-0d67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54030",
"url": "https://lore.kernel.org/linux-cve-announce/2025122436-CVE-2023-54030-e7f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54031",
"url": "https://lore.kernel.org/linux-cve-announce/2025122437-CVE-2023-54031-90af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54032",
"url": "https://lore.kernel.org/linux-cve-announce/2025122437-CVE-2023-54032-cb33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54033",
"url": "https://lore.kernel.org/linux-cve-announce/2025122437-CVE-2023-54033-ad11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54034",
"url": "https://lore.kernel.org/linux-cve-announce/2025122438-CVE-2023-54034-3089@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54035",
"url": "https://lore.kernel.org/linux-cve-announce/2025122438-CVE-2023-54035-76a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54036",
"url": "https://lore.kernel.org/linux-cve-announce/2025122438-CVE-2023-54036-ae42@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54037",
"url": "https://lore.kernel.org/linux-cve-announce/2025122439-CVE-2023-54037-0d5e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54038",
"url": "https://lore.kernel.org/linux-cve-announce/2025122439-CVE-2023-54038-41bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54039",
"url": "https://lore.kernel.org/linux-cve-announce/2025122439-CVE-2023-54039-82a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54040",
"url": "https://lore.kernel.org/linux-cve-announce/2025122440-CVE-2023-54040-83dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54041",
"url": "https://lore.kernel.org/linux-cve-announce/2025122440-CVE-2023-54041-57f4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54042",
"url": "https://lore.kernel.org/linux-cve-announce/2025122440-CVE-2023-54042-2617@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68344",
"url": "https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2025-68344-3af5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68345",
"url": "https://lore.kernel.org/linux-cve-announce/2025122452-CVE-2025-68345-eea0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68346",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68346-10ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68347",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68347-74dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68348",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68348-2088@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68349",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68349-12d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68350",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2025-68350-c55b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68351",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2025-68351-bafe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68352",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2025-68352-a3fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68353",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2025-68353-8704@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68354",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2025-68354-d175@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68355",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2025-68355-adf4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68356",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2025-68356-1574@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68357",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2025-68357-2d18@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68358",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2025-68358-4efc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68359",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2025-68359-c931@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68360",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2025-68360-63e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68361",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2025-68361-83eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68363",
"url": "https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2025-68363-3863@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68364",
"url": "https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2025-68364-ee48@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68365",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2025-68365-4ad3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68366",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2025-68366-b367@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68367",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2025-68367-847e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68368",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2025-68368-4e1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68369",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2025-68369-f437@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68370",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2025-68370-d381@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68371",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2025-68371-5c31@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68372",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2025-68372-98d0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68373",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2025-68373-c983@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68374",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2025-68374-560c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68375",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2025-68375-aa1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68376",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2025-68376-a954@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68377",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2025-68377-38f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68378",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2025-68378-60d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68379",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2025-68379-f90f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68380",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2025-68380-3436@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68724",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2025-68724-4d3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68725",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2025-68725-4488@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68726",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2025-68726-7aff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68727",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2025-68727-8481@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68728",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2025-68728-2b2c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68729",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2025-68729-1e07@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68730",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2025-68730-c272@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68731",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2025-68731-d6d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68732",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2025-68732-d91d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68733",
"url": "https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2025-68733-a65e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68734",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68734-6403@gregkh/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4436 vom 2026-01-14",
"url": "https://lists.debian.org/debian-lts-announce/2026/01/msg00007.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10039-1 vom 2026-01-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNRBJ6HLDODCC2A4DQ3QHZ6XBQSZQO26/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0263-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0317-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0350-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0369-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20220-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20228-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2264 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2264"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6126 vom 2026-02-09",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2378 vom 2026-02-10",
"url": "https://access.redhat.com/errata/RHSA-2026:2378"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6127 vom 2026-02-10",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50100 vom 2026-02-10",
"url": "http://linux.oracle.com/errata/ELSA-2026-50100.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2352 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2352"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0411-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2490 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2490"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2264 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2264.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4476 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8030-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2664 vom 2026-02-12",
"url": "https://access.redhat.com/errata/RHSA-2026:2664"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0475-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0474-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2264 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2264"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0496-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0495-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2722 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2722"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2766 vom 2026-02-17",
"url": "https://access.redhat.com/errata/RHSA-2026:2766"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2721 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-2721.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2721 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2721"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2722 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-2722.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50113 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-50113.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8048-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8048-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-113 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50112 vom 2026-02-23",
"url": "https://linux.oracle.com/errata/ELSA-2026-50112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-3 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8029-3"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2722 vom 2026-02-24",
"url": "https://errata.build.resf.org/RLSA-2026:2722"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3267 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3267"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3277 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3277"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2721 vom 2026-02-24",
"url": "https://errata.build.resf.org/RLSA-2026:2721"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3293 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3293"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3358 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3358"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3360 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3360"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3375 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3375"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20287-1 vom 2026-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7KIWX7XP3UMVFSHT47OOZ24TQQYNNHI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0698-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024518.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0727-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024510.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0707-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024515.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0700-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024516.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0725-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024511.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0696-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024519.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0711-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024513.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0731-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024509.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0713-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024512.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50133 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-50133.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50134 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-50134.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3634 vom 2026-03-03",
"url": "https://access.redhat.com/errata/RHSA-2026:3634"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3685 vom 2026-03-03",
"url": "https://access.redhat.com/errata/RHSA-2026:3685"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20570-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20555-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024590.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-098 vom 2026-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-098.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20615-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20564-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20599-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-05T23:00:00.000+00:00",
"generator": {
"date": "2026-03-06T10:24:36.386+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2920",
"initial_release_date": "2025-12-23T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-205133, EUVD-2025-205111, EUVD-2025-205112, EUVD-2025-205121, EUVD-2025-205113, EUVD-2025-205114, EUVD-2025-205124, EUVD-2025-205130, EUVD-2025-205117, EUVD-2025-205137, EUVD-2025-205128, EUVD-2025-205134, EUVD-2025-205138, EUVD-2025-205127, EUVD-2025-205135, EUVD-2025-205120, EUVD-2025-205122, EUVD-2025-205132, EUVD-2025-205131, EUVD-2025-205125, EUVD-2025-205115, EUVD-2025-205136, EUVD-2025-205129, EUVD-2025-205123, EUVD-2025-205118, EUVD-2025-205139, EUVD-2025-205116, EUVD-2025-205143, EUVD-2025-205163, EUVD-2025-205144, EUVD-2025-205152, EUVD-2025-205161, EUVD-2025-205149, EUVD-2025-205148, EUVD-2025-205157, EUVD-2025-205146, EUVD-2025-205145, EUVD-2025-205147, EUVD-2025-205159, EUVD-2025-205142, EUVD-2025-205141, EUVD-2025-205151, EUVD-2025-205150, EUVD-2025-205164, EUVD-2025-205140, EUVD-2025-205160, EUVD-2025-205168, EUVD-2025-205177, EUVD-2025-205155, EUVD-2025-205181, EUVD-2025-205172, EUVD-2025-205153, EUVD-2025-205174, EUVD-2025-205180, EUVD-2025-205175, EUVD-2025-205167, EUVD-2025-205179, EUVD-2025-205173, EUVD-2025-205166, EUVD-2025-205165, EUVD-2025-205170, EUVD-2025-205176, EUVD-2025-205169, EUVD-2025-205178, EUVD-2025-205182, EUVD-2025-205184, EUVD-2025-205183, EUVD-2025-205064, EUVD-2025-205065, EUVD-2025-205067, EUVD-2025-205068, EUVD-2025-205070, EUVD-2025-205069, EUVD-2025-205071, EUVD-2025-205072, EUVD-2025-205074, EUVD-2025-205083, EUVD-2025-205094, EUVD-2025-205103, EUVD-2025-205066, EUVD-2025-205162, EUVD-2025-205154, EUVD-2025-205158, EUVD-2025-205156, EUVD-2025-205171, EUVD-2025-205126, EUVD-2025-205119"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian und openSUSE aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-08T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Debian, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Debian und SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, Red Hat und SUSE aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-03T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
}
],
"status": "final",
"version": "29"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028463",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50697",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50697"
},
{
"cve": "CVE-2022-50698",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50698"
},
{
"cve": "CVE-2022-50699",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50699"
},
{
"cve": "CVE-2022-50700",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50700"
},
{
"cve": "CVE-2022-50701",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50701"
},
{
"cve": "CVE-2022-50702",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50702"
},
{
"cve": "CVE-2022-50703",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50703"
},
{
"cve": "CVE-2022-50704",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50704"
},
{
"cve": "CVE-2022-50705",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50705"
},
{
"cve": "CVE-2022-50706",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50706"
},
{
"cve": "CVE-2022-50707",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50707"
},
{
"cve": "CVE-2022-50708",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50708"
},
{
"cve": "CVE-2022-50709",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50709"
},
{
"cve": "CVE-2022-50710",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50710"
},
{
"cve": "CVE-2022-50711",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2022-50711"
},
{
"cve": "CVE-2023-3773",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-3773"
},
{
"cve": "CVE-2023-53867",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53867"
},
{
"cve": "CVE-2023-53986",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53986"
},
{
"cve": "CVE-2023-53987",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53987"
},
{
"cve": "CVE-2023-53988",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53988"
},
{
"cve": "CVE-2023-53989",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53989"
},
{
"cve": "CVE-2023-53990",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53990"
},
{
"cve": "CVE-2023-53991",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53991"
},
{
"cve": "CVE-2023-53992",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53992"
},
{
"cve": "CVE-2023-53993",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53993"
},
{
"cve": "CVE-2023-53994",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53994"
},
{
"cve": "CVE-2023-53995",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53995"
},
{
"cve": "CVE-2023-53996",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53996"
},
{
"cve": "CVE-2023-53997",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53997"
},
{
"cve": "CVE-2023-53998",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53998"
},
{
"cve": "CVE-2023-53999",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-53999"
},
{
"cve": "CVE-2023-54000",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54000"
},
{
"cve": "CVE-2023-54001",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54001"
},
{
"cve": "CVE-2023-54002",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54002"
},
{
"cve": "CVE-2023-54003",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54003"
},
{
"cve": "CVE-2023-54004",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54004"
},
{
"cve": "CVE-2023-54005",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54005"
},
{
"cve": "CVE-2023-54006",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54006"
},
{
"cve": "CVE-2023-54007",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54007"
},
{
"cve": "CVE-2023-54008",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54008"
},
{
"cve": "CVE-2023-54009",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54009"
},
{
"cve": "CVE-2023-54010",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54010"
},
{
"cve": "CVE-2023-54011",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54011"
},
{
"cve": "CVE-2023-54012",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54012"
},
{
"cve": "CVE-2023-54013",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54013"
},
{
"cve": "CVE-2023-54014",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54014"
},
{
"cve": "CVE-2023-54015",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54015"
},
{
"cve": "CVE-2023-54016",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54016"
},
{
"cve": "CVE-2023-54017",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54017"
},
{
"cve": "CVE-2023-54018",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54018"
},
{
"cve": "CVE-2023-54019",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54019"
},
{
"cve": "CVE-2023-54020",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54020"
},
{
"cve": "CVE-2023-54021",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54021"
},
{
"cve": "CVE-2023-54022",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54022"
},
{
"cve": "CVE-2023-54023",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54023"
},
{
"cve": "CVE-2023-54024",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54024"
},
{
"cve": "CVE-2023-54025",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54025"
},
{
"cve": "CVE-2023-54026",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54026"
},
{
"cve": "CVE-2023-54027",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54027"
},
{
"cve": "CVE-2023-54028",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54028"
},
{
"cve": "CVE-2023-54029",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54029"
},
{
"cve": "CVE-2023-54030",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54030"
},
{
"cve": "CVE-2023-54031",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54031"
},
{
"cve": "CVE-2023-54032",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54032"
},
{
"cve": "CVE-2023-54033",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54033"
},
{
"cve": "CVE-2023-54034",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54034"
},
{
"cve": "CVE-2023-54035",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54035"
},
{
"cve": "CVE-2023-54036",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54036"
},
{
"cve": "CVE-2023-54037",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54037"
},
{
"cve": "CVE-2023-54038",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54038"
},
{
"cve": "CVE-2023-54039",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54039"
},
{
"cve": "CVE-2023-54040",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54040"
},
{
"cve": "CVE-2023-54041",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54041"
},
{
"cve": "CVE-2023-54042",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2023-54042"
},
{
"cve": "CVE-2025-68344",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68344"
},
{
"cve": "CVE-2025-68345",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68345"
},
{
"cve": "CVE-2025-68346",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68346"
},
{
"cve": "CVE-2025-68347",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68347"
},
{
"cve": "CVE-2025-68348",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68348"
},
{
"cve": "CVE-2025-68349",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68349"
},
{
"cve": "CVE-2025-68350",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68350"
},
{
"cve": "CVE-2025-68351",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68351"
},
{
"cve": "CVE-2025-68352",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68352"
},
{
"cve": "CVE-2025-68353",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68353"
},
{
"cve": "CVE-2025-68354",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68354"
},
{
"cve": "CVE-2025-68355",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68355"
},
{
"cve": "CVE-2025-68356",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68356"
},
{
"cve": "CVE-2025-68357",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68357"
},
{
"cve": "CVE-2025-68358",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68358"
},
{
"cve": "CVE-2025-68359",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68359"
},
{
"cve": "CVE-2025-68360",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68360"
},
{
"cve": "CVE-2025-68361",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68361"
},
{
"cve": "CVE-2025-68363",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68363"
},
{
"cve": "CVE-2025-68364",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68364"
},
{
"cve": "CVE-2025-68365",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68365"
},
{
"cve": "CVE-2025-68366",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68366"
},
{
"cve": "CVE-2025-68367",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68367"
},
{
"cve": "CVE-2025-68368",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68368"
},
{
"cve": "CVE-2025-68369",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68369"
},
{
"cve": "CVE-2025-68370",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68370"
},
{
"cve": "CVE-2025-68371",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68371"
},
{
"cve": "CVE-2025-68372",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68372"
},
{
"cve": "CVE-2025-68373",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68373"
},
{
"cve": "CVE-2025-68374",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68374"
},
{
"cve": "CVE-2025-68375",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68375"
},
{
"cve": "CVE-2025-68376",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68376"
},
{
"cve": "CVE-2025-68377",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68377"
},
{
"cve": "CVE-2025-68378",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68378"
},
{
"cve": "CVE-2025-68379",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68379"
},
{
"cve": "CVE-2025-68380",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68380"
},
{
"cve": "CVE-2025-68724",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68724"
},
{
"cve": "CVE-2025-68725",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68725"
},
{
"cve": "CVE-2025-68726",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68726"
},
{
"cve": "CVE-2025-68727",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68727"
},
{
"cve": "CVE-2025-68728",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68728"
},
{
"cve": "CVE-2025-68729",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68729"
},
{
"cve": "CVE-2025-68730",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68730"
},
{
"cve": "CVE-2025-68731",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68731"
},
{
"cve": "CVE-2025-68732",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68732"
},
{
"cve": "CVE-2025-68733",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68733"
},
{
"cve": "CVE-2025-68734",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-12-23T23:00:00.000+00:00",
"title": "CVE-2025-68734"
}
]
}
GHSA-6GH3-92R7-FCVF
Vulnerability from github – Published: 2025-12-24 12:30 – Updated: 2025-12-24 12:30In the Linux kernel, the following vulnerability has been resolved:
mips: bmips: BCM6358: disable RAC flush for TP1
RAC flush causes kernel panics on BCM6358 with EHCI/OHCI when booting from TP1: [ 3.881739] usb 1-1: new high-speed USB device number 2 using ehci-platform [ 3.895011] Reserved instruction in kernel code[#1]: [ 3.900113] CPU: 0 PID: 1 Comm: init Not tainted 5.10.16 #0 [ 3.905829] $ 0 : 00000000 10008700 00000000 77d94060 [ 3.911238] $ 4 : 7fd1f088 00000000 81431cac 81431ca0 [ 3.916641] $ 8 : 00000000 ffffefff 8075cd34 00000000 [ 3.922043] $12 : 806f8d40 f3e812b7 00000000 000d9aaa [ 3.927446] $16 : 7fd1f068 7fd1f080 7ff559b8 81428470 [ 3.932848] $20 : 00000000 00000000 55590000 77d70000 [ 3.938251] $24 : 00000018 00000010 [ 3.943655] $28 : 81430000 81431e60 81431f28 800157fc [ 3.949058] Hi : 00000000 [ 3.952013] Lo : 00000000 [ 3.955019] epc : 80015808 setup_sigcontext+0x54/0x24c [ 3.960464] ra : 800157fc setup_sigcontext+0x48/0x24c [ 3.965913] Status: 10008703 KERNEL EXL IE [ 3.970216] Cause : 00800028 (ExcCode 0a) [ 3.974340] PrId : 0002a010 (Broadcom BMIPS4350) [ 3.979170] Modules linked in: ohci_platform ohci_hcd fsl_mph_dr_of ehci_platform ehci_fsl ehci_hcd gpio_button_hotplug usbcore nls_base usb_common [ 3.992907] Process init (pid: 1, threadinfo=(ptrval), task=(ptrval), tls=77e22ec8) [ 4.000776] Stack : 81431ef4 7fd1f080 81431f28 81428470 7fd1f068 81431edc 7ff559b8 81428470 [ 4.009467] 81431f28 7fd1f080 55590000 77d70000 77d5498c 80015c70 806f0000 8063ae74 [ 4.018149] 08100002 81431f28 0000000a 08100002 81431f28 0000000a 77d6b418 00000003 [ 4.026831] ffffffff 80016414 80080734 81431ecc 81431ecc 00000001 00000000 04000000 [ 4.035512] 77d54874 00000000 00000000 00000000 00000000 00000012 00000002 00000000 [ 4.044196] ... [ 4.046706] Call Trace: [ 4.049238] [<80015808>] setup_sigcontext+0x54/0x24c [ 4.054356] [<80015c70>] setup_frame+0xdc/0x124 [ 4.059015] [<80016414>] do_notify_resume+0x1dc/0x288 [ 4.064207] [<80011b50>] work_notifysig+0x10/0x18 [ 4.069036] [ 4.070538] Code: 8fc300b4 00001025 26240008 ac830004 3c048063 0c0228aa 24846a00 26240010 [ 4.080686] [ 4.082517] ---[ end trace 22a8edb41f5f983b ]--- [ 4.087374] Kernel panic - not syncing: Fatal exception [ 4.092753] Rebooting in 1 seconds..
Because the bootloader (CFE) is not initializing the Read-ahead cache properly on the second thread (TP1). Since the RAC was not initialized properly, we should avoid flushing it at the risk of corrupting the instruction stream as seen in the trace above.
{
"affected": [],
"aliases": [
"CVE-2023-53986"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-24T11:15:51Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmips: bmips: BCM6358: disable RAC flush for TP1\n\nRAC flush causes kernel panics on BCM6358 with EHCI/OHCI when booting from TP1:\n[ 3.881739] usb 1-1: new high-speed USB device number 2 using ehci-platform\n[ 3.895011] Reserved instruction in kernel code[#1]:\n[ 3.900113] CPU: 0 PID: 1 Comm: init Not tainted 5.10.16 #0\n[ 3.905829] $ 0 : 00000000 10008700 00000000 77d94060\n[ 3.911238] $ 4 : 7fd1f088 00000000 81431cac 81431ca0\n[ 3.916641] $ 8 : 00000000 ffffefff 8075cd34 00000000\n[ 3.922043] $12 : 806f8d40 f3e812b7 00000000 000d9aaa\n[ 3.927446] $16 : 7fd1f068 7fd1f080 7ff559b8 81428470\n[ 3.932848] $20 : 00000000 00000000 55590000 77d70000\n[ 3.938251] $24 : 00000018 00000010\n[ 3.943655] $28 : 81430000 81431e60 81431f28 800157fc\n[ 3.949058] Hi : 00000000\n[ 3.952013] Lo : 00000000\n[ 3.955019] epc : 80015808 setup_sigcontext+0x54/0x24c\n[ 3.960464] ra : 800157fc setup_sigcontext+0x48/0x24c\n[ 3.965913] Status: 10008703\tKERNEL EXL IE\n[ 3.970216] Cause : 00800028 (ExcCode 0a)\n[ 3.974340] PrId : 0002a010 (Broadcom BMIPS4350)\n[ 3.979170] Modules linked in: ohci_platform ohci_hcd fsl_mph_dr_of ehci_platform ehci_fsl ehci_hcd gpio_button_hotplug usbcore nls_base usb_common\n[ 3.992907] Process init (pid: 1, threadinfo=(ptrval), task=(ptrval), tls=77e22ec8)\n[ 4.000776] Stack : 81431ef4 7fd1f080 81431f28 81428470 7fd1f068 81431edc 7ff559b8 81428470\n[ 4.009467] 81431f28 7fd1f080 55590000 77d70000 77d5498c 80015c70 806f0000 8063ae74\n[ 4.018149] 08100002 81431f28 0000000a 08100002 81431f28 0000000a 77d6b418 00000003\n[ 4.026831] ffffffff 80016414 80080734 81431ecc 81431ecc 00000001 00000000 04000000\n[ 4.035512] 77d54874 00000000 00000000 00000000 00000000 00000012 00000002 00000000\n[ 4.044196] ...\n[ 4.046706] Call Trace:\n[ 4.049238] [\u003c80015808\u003e] setup_sigcontext+0x54/0x24c\n[ 4.054356] [\u003c80015c70\u003e] setup_frame+0xdc/0x124\n[ 4.059015] [\u003c80016414\u003e] do_notify_resume+0x1dc/0x288\n[ 4.064207] [\u003c80011b50\u003e] work_notifysig+0x10/0x18\n[ 4.069036]\n[ 4.070538] Code: 8fc300b4 00001025 26240008 \u003cac820000\u003e ac830004 3c048063 0c0228aa 24846a00 26240010\n[ 4.080686]\n[ 4.082517] ---[ end trace 22a8edb41f5f983b ]---\n[ 4.087374] Kernel panic - not syncing: Fatal exception\n[ 4.092753] Rebooting in 1 seconds..\n\nBecause the bootloader (CFE) is not initializing the Read-ahead cache properly\non the second thread (TP1). Since the RAC was not initialized properly, we\nshould avoid flushing it at the risk of corrupting the instruction stream as\nseen in the trace above.",
"id": "GHSA-6gh3-92r7-fcvf",
"modified": "2025-12-24T12:30:27Z",
"published": "2025-12-24T12:30:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53986"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/288c96aa5b5526cd4a946e84ef85e165857693b5"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/2cdbcff99f15db86a10672fb220379a1ae46ccae"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/47a449ec09b4479b89dcc6b27ec3829fc82ffafb"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/65b723644294f1d79770704162c0e8d1f700b6f1"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ab327f8acdf8d06601fbf058859a539a9422afff"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d65de5ee8b72868fbbbd39ca73017d0e526fa13a"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.