Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-50507 (GCVE-0-2022-50507)
Vulnerability from cvelistv5 – Published: 2025-10-04 15:43 – Updated: 2025-10-06 09:07| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
4534a70b7056fd4b9a1c6db5a4ce3c98546b291e , < de5e0955248ff90a2ae91e7f5c108392b52152d0
(git)
Affected: 4534a70b7056fd4b9a1c6db5a4ce3c98546b291e , < e0455361d3068066a91fe18282b751925d7b5ee7 (git) Affected: 4534a70b7056fd4b9a1c6db5a4ce3c98546b291e , < 9173b89c16a603d73c434b695fe2a7a13491300f (git) Affected: 4534a70b7056fd4b9a1c6db5a4ce3c98546b291e , < 6db620863f8528ed9a9aa5ad323b26554a17881d (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/ntfs3/attrib.c",
"fs/ntfs3/attrlist.c",
"fs/ntfs3/frecord.c",
"fs/ntfs3/fslog.c",
"fs/ntfs3/inode.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "de5e0955248ff90a2ae91e7f5c108392b52152d0",
"status": "affected",
"version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e",
"versionType": "git"
},
{
"lessThan": "e0455361d3068066a91fe18282b751925d7b5ee7",
"status": "affected",
"version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e",
"versionType": "git"
},
{
"lessThan": "9173b89c16a603d73c434b695fe2a7a13491300f",
"status": "affected",
"version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e",
"versionType": "git"
},
{
"lessThan": "6db620863f8528ed9a9aa5ad323b26554a17881d",
"status": "affected",
"version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/ntfs3/attrib.c",
"fs/ntfs3/attrlist.c",
"fs/ntfs3/frecord.c",
"fs/ntfs3/fslog.c",
"fs/ntfs3/inode.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.15"
},
{
"lessThan": "5.15",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.87",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.0.*",
"status": "unaffected",
"version": "6.0.17",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.2",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.87",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.17",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.3",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"versionStartIncluding": "5.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate data run offset\n\nThis adds sanity checks for data run offset. We should make sure data\nrun offset is legit before trying to unpack them, otherwise we may\nencounter use-after-free or some unexpected memory access behaviors.\n\n[ 82.940342] BUG: KASAN: use-after-free in run_unpack+0x2e3/0x570\n[ 82.941180] Read of size 1 at addr ffff888008a8487f by task mount/240\n[ 82.941670]\n[ 82.942069] CPU: 0 PID: 240 Comm: mount Not tainted 5.19.0+ #15\n[ 82.942482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 82.943720] Call Trace:\n[ 82.944204] \u003cTASK\u003e\n[ 82.944471] dump_stack_lvl+0x49/0x63\n[ 82.944908] print_report.cold+0xf5/0x67b\n[ 82.945141] ? __wait_on_bit+0x106/0x120\n[ 82.945750] ? run_unpack+0x2e3/0x570\n[ 82.946626] kasan_report+0xa7/0x120\n[ 82.947046] ? run_unpack+0x2e3/0x570\n[ 82.947280] __asan_load1+0x51/0x60\n[ 82.947483] run_unpack+0x2e3/0x570\n[ 82.947709] ? memcpy+0x4e/0x70\n[ 82.947927] ? run_pack+0x7a0/0x7a0\n[ 82.948158] run_unpack_ex+0xad/0x3f0\n[ 82.948399] ? mi_enum_attr+0x14a/0x200\n[ 82.948717] ? run_unpack+0x570/0x570\n[ 82.949072] ? ni_enum_attr_ex+0x1b2/0x1c0\n[ 82.949332] ? ni_fname_type.part.0+0xd0/0xd0\n[ 82.949611] ? mi_read+0x262/0x2c0\n[ 82.949970] ? ntfs_cmp_names_cpu+0x125/0x180\n[ 82.950249] ntfs_iget5+0x632/0x1870\n[ 82.950621] ? ntfs_get_block_bmap+0x70/0x70\n[ 82.951192] ? evict+0x223/0x280\n[ 82.951525] ? iput.part.0+0x286/0x320\n[ 82.951969] ntfs_fill_super+0x1321/0x1e20\n[ 82.952436] ? put_ntfs+0x1d0/0x1d0\n[ 82.952822] ? vsprintf+0x20/0x20\n[ 82.953188] ? mutex_unlock+0x81/0xd0\n[ 82.953379] ? set_blocksize+0x95/0x150\n[ 82.954001] get_tree_bdev+0x232/0x370\n[ 82.954438] ? put_ntfs+0x1d0/0x1d0\n[ 82.954700] ntfs_fs_get_tree+0x15/0x20\n[ 82.955049] vfs_get_tree+0x4c/0x130\n[ 82.955292] path_mount+0x645/0xfd0\n[ 82.955615] ? putname+0x80/0xa0\n[ 82.955955] ? finish_automount+0x2e0/0x2e0\n[ 82.956310] ? kmem_cache_free+0x110/0x390\n[ 82.956723] ? putname+0x80/0xa0\n[ 82.957023] do_mount+0xd6/0xf0\n[ 82.957411] ? path_mount+0xfd0/0xfd0\n[ 82.957638] ? __kasan_check_write+0x14/0x20\n[ 82.957948] __x64_sys_mount+0xca/0x110\n[ 82.958310] do_syscall_64+0x3b/0x90\n[ 82.958719] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 82.959341] RIP: 0033:0x7fd0d1ce948a\n[ 82.960193] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[ 82.961532] RSP: 002b:00007ffe59ff69a8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\n[ 82.962527] RAX: ffffffffffffffda RBX: 0000564dcc107060 RCX: 00007fd0d1ce948a\n[ 82.963266] RDX: 0000564dcc107260 RSI: 0000564dcc1072e0 RDI: 0000564dcc10fce0\n[ 82.963686] RBP: 0000000000000000 R08: 0000564dcc107280 R09: 0000000000000020\n[ 82.964272] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564dcc10fce0\n[ 82.964785] R13: 0000564dcc107260 R14: 0000000000000000 R15: 00000000ffffffff"
}
],
"providerMetadata": {
"dateUpdated": "2025-10-06T09:07:17.155Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/de5e0955248ff90a2ae91e7f5c108392b52152d0"
},
{
"url": "https://git.kernel.org/stable/c/e0455361d3068066a91fe18282b751925d7b5ee7"
},
{
"url": "https://git.kernel.org/stable/c/9173b89c16a603d73c434b695fe2a7a13491300f"
},
{
"url": "https://git.kernel.org/stable/c/6db620863f8528ed9a9aa5ad323b26554a17881d"
}
],
"title": "fs/ntfs3: Validate data run offset",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2022-50507",
"datePublished": "2025-10-04T15:43:55.675Z",
"dateReserved": "2025-10-04T15:39:19.465Z",
"dateUpdated": "2025-10-06T09:07:17.155Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-50507\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-04T16:15:47.960\",\"lastModified\":\"2025-10-06T14:56:21.733\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfs/ntfs3: Validate data run offset\\n\\nThis adds sanity checks for data run offset. We should make sure data\\nrun offset is legit before trying to unpack them, otherwise we may\\nencounter use-after-free or some unexpected memory access behaviors.\\n\\n[ 82.940342] BUG: KASAN: use-after-free in run_unpack+0x2e3/0x570\\n[ 82.941180] Read of size 1 at addr ffff888008a8487f by task mount/240\\n[ 82.941670]\\n[ 82.942069] CPU: 0 PID: 240 Comm: mount Not tainted 5.19.0+ #15\\n[ 82.942482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\\n[ 82.943720] Call Trace:\\n[ 82.944204] \u003cTASK\u003e\\n[ 82.944471] dump_stack_lvl+0x49/0x63\\n[ 82.944908] print_report.cold+0xf5/0x67b\\n[ 82.945141] ? __wait_on_bit+0x106/0x120\\n[ 82.945750] ? run_unpack+0x2e3/0x570\\n[ 82.946626] kasan_report+0xa7/0x120\\n[ 82.947046] ? run_unpack+0x2e3/0x570\\n[ 82.947280] __asan_load1+0x51/0x60\\n[ 82.947483] run_unpack+0x2e3/0x570\\n[ 82.947709] ? memcpy+0x4e/0x70\\n[ 82.947927] ? run_pack+0x7a0/0x7a0\\n[ 82.948158] run_unpack_ex+0xad/0x3f0\\n[ 82.948399] ? mi_enum_attr+0x14a/0x200\\n[ 82.948717] ? run_unpack+0x570/0x570\\n[ 82.949072] ? ni_enum_attr_ex+0x1b2/0x1c0\\n[ 82.949332] ? ni_fname_type.part.0+0xd0/0xd0\\n[ 82.949611] ? mi_read+0x262/0x2c0\\n[ 82.949970] ? ntfs_cmp_names_cpu+0x125/0x180\\n[ 82.950249] ntfs_iget5+0x632/0x1870\\n[ 82.950621] ? ntfs_get_block_bmap+0x70/0x70\\n[ 82.951192] ? evict+0x223/0x280\\n[ 82.951525] ? iput.part.0+0x286/0x320\\n[ 82.951969] ntfs_fill_super+0x1321/0x1e20\\n[ 82.952436] ? put_ntfs+0x1d0/0x1d0\\n[ 82.952822] ? vsprintf+0x20/0x20\\n[ 82.953188] ? mutex_unlock+0x81/0xd0\\n[ 82.953379] ? set_blocksize+0x95/0x150\\n[ 82.954001] get_tree_bdev+0x232/0x370\\n[ 82.954438] ? put_ntfs+0x1d0/0x1d0\\n[ 82.954700] ntfs_fs_get_tree+0x15/0x20\\n[ 82.955049] vfs_get_tree+0x4c/0x130\\n[ 82.955292] path_mount+0x645/0xfd0\\n[ 82.955615] ? putname+0x80/0xa0\\n[ 82.955955] ? finish_automount+0x2e0/0x2e0\\n[ 82.956310] ? kmem_cache_free+0x110/0x390\\n[ 82.956723] ? putname+0x80/0xa0\\n[ 82.957023] do_mount+0xd6/0xf0\\n[ 82.957411] ? path_mount+0xfd0/0xfd0\\n[ 82.957638] ? __kasan_check_write+0x14/0x20\\n[ 82.957948] __x64_sys_mount+0xca/0x110\\n[ 82.958310] do_syscall_64+0x3b/0x90\\n[ 82.958719] entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n[ 82.959341] RIP: 0033:0x7fd0d1ce948a\\n[ 82.960193] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\\n[ 82.961532] RSP: 002b:00007ffe59ff69a8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\\n[ 82.962527] RAX: ffffffffffffffda RBX: 0000564dcc107060 RCX: 00007fd0d1ce948a\\n[ 82.963266] RDX: 0000564dcc107260 RSI: 0000564dcc1072e0 RDI: 0000564dcc10fce0\\n[ 82.963686] RBP: 0000000000000000 R08: 0000564dcc107280 R09: 0000000000000020\\n[ 82.964272] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564dcc10fce0\\n[ 82.964785] R13: 0000564dcc107260 R14: 0000000000000000 R15: 00000000ffffffff\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/6db620863f8528ed9a9aa5ad323b26554a17881d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9173b89c16a603d73c434b695fe2a7a13491300f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/de5e0955248ff90a2ae91e7f5c108392b52152d0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e0455361d3068066a91fe18282b751925d7b5ee7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
WID-SEC-W-2025-2194
Vulnerability from csaf_certbund - Published: 2025-10-05 22:00 - Updated: 2026-01-21 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2194 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2194.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2194 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2194"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50470",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2022-50470-e56f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50471",
"url": "https://lore.kernel.org/linux-cve-announce/2025100436-CVE-2022-50471-a799@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50472",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50472-5d91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50473",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50473-a1fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50474",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50474-7639@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50475",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50475-b3ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50476",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50476-f1b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50477",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50477-1815@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50478",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50478-81f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50479",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50479-de1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50480",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50480-f296@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50481",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50481-3d22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50482",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50482-0291@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50483",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50483-b6b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50484",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50484-1a6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50485",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50485-9d4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50486",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50486-da3d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50487",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50487-f5ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50488",
"url": "https://lore.kernel.org/linux-cve-announce/2025100413-CVE-2022-50488-32e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50489",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50489-9d88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50490",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50490-dcd3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50491",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50491-7a8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50492",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50492-19b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50493",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50493-2b70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50494",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50494-00a0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50495",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50495-fdee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50496",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50496-6e44@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50497",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50497-0aee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50498",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50498-c9ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50499",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50499-9f94@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50500",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50500-787b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50501",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50501-1b81@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50502",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2022-50502-c819@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50503",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2022-50503-6c75@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50504",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50504-d655@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50505",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50505-b427@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50506",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50506-1642@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50507",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2022-50507-9739@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50508",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2022-50508-dd1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53533",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2023-53533-7fbb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53534",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53534-9260@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53535",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53535-c515@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53536",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53536-0e4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53537",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53537-7d50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53538",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53538-f39c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53539",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53539-4411@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53540",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53540-8805@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53541",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53541-d961@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53542",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53542-fc74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53543",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53543-227c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53544",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53544-f48f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53545",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53545-8d50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53546",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53546-a432@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53547",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53547-38ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53548",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53548-8719@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53549",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53549-9c74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53550",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53550-bbac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53551",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53551-4afc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53552",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53552-5ba9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53553",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53553-f661@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53554",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53554-3351@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53555",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53555-b949@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53556",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53556-db4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53557",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53557-e7ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53558",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53558-e6f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53559",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53559-c2f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53560",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53560-8248@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53561",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53561-75a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53562",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53562-a73f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53563",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53563-5cbe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53564",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53564-e874@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53565",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53565-a882@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53566",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53566-1c57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53567",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53567-dedf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53568",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53568-0020@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53569",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53569-181e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53570",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53570-3733@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53571",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53571-3269@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53572",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53572-ab85@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53573",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53573-a05d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53574",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53574-f72d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53575",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53575-2079@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53576",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53576-c5dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53577",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53577-96e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53578",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53578-7dbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53579",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53579-e030@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53580",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2023-53580-7d16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53581",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53581-80fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53582",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53582-3ed8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53583",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53583-b831@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53584",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53584-2034@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53585",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53585-b855@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53586",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53586-67e1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53587",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53587-411f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53588",
"url": "https://lore.kernel.org/linux-cve-announce/2025100426-CVE-2023-53588-1220@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53589",
"url": "https://lore.kernel.org/linux-cve-announce/2025100426-CVE-2023-53589-22f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53590",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53590-9f1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53591",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53591-8496@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53592",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53592-3da6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53593",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53593-228d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53594",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53594-563f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53595",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53595-91fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53596",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53596-dbfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53597",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53597-e30c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53598",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53599",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53599-2a93@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53600",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53600-69ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53601",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53601-aabe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53602",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53602-2de6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53603",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53603-df40@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53604",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53604-31fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53605",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53605-a660@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53606",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53606-8c1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53607",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53607-9638@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53608",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53608-ccb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53609",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53609-1c39@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53610",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53610-3f0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53611",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53611-a508@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53612",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53612-b146@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53613",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53613-bba8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53614",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53614-bf24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53615",
"url": "https://lore.kernel.org/linux-cve-announce/2025100435-CVE-2023-53615-843c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53616",
"url": "https://lore.kernel.org/linux-cve-announce/2025100435-CVE-2023-53616-9379@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39929",
"url": "https://lore.kernel.org/linux-cve-announce/2025100414-CVE-2025-39929-4308@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39931",
"url": "https://lore.kernel.org/linux-cve-announce/2025100416-CVE-2025-39931-8ff7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39932",
"url": "https://lore.kernel.org/linux-cve-announce/2025100416-CVE-2025-39932-bdaf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39933",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39933-e224@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39934",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39934-4c48@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39935",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39935-3e6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39936",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39936-840a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39937",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39937-c8f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39938",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39938-6508@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39939",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39939-7ec4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39940",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39940-6097@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39941",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39941-f256@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39942",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39942-0297@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39943",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39943-f5d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39944",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39944-0d67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39945",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39945-84d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39946",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39946-5f17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39947",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39947-6872@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39948",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39948-7074@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39949",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39949-d909@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39950",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39950-e7d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39951",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39951-24b1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39952",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2025-39952-e36c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39953",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2025-39953-4ac6@gregkh/"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2025-056 vom 2025-10-16",
"url": "https://cloud.google.com/support/bulletins#gcp-2025-056"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-277 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-277.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-093 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-093.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-112 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-112.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-279 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-279.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-109 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-109.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-282 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-282.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-113 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-113.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-280 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-280.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3053 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3053.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-281 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-281.html"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2025-10-28",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#October_20_2025"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6053 vom 2025-11-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00219.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21463 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21463"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4111-1 vom 2025-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4135-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4139-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4149-1 vom 2025-11-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4188-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVPUJWNDCBFGM2O2EFX4S5QBPKDARVQ7/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4379 vom 2025-11-25",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20091-1 vom 2025-11-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVNKE6YBHUN7AVUHO7UZCJJGK4HYS62H/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21040-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21064-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21056-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21052-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023389.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21080-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21074-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4301-1 vom 2025-11-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLIMXFMWOGTFRJZEC4XPGIMNBCRKQ7IF/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21118 vom 2025-12-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-21118.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4320-1 vom 2025-12-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21463 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21463.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21931 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21931.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22801 vom 2025-12-08",
"url": "https://access.redhat.com/errata/RHSA-2025:22801"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22800 vom 2025-12-08",
"url": "https://access.redhat.com/errata/RHSA-2025:22800"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22801 vom 2025-12-09",
"url": "http://linux.oracle.com/errata/ELSA-2025-22801.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21180-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21147-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7921-1 vom 2025-12-10",
"url": "https://ubuntu.com/security/notices/USN-7921-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22800 vom 2025-12-13",
"url": "https://errata.build.resf.org/RLSA-2025:22800"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-December/019260.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28048 vom 2025-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-28048.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22801 vom 2025-12-13",
"url": "https://errata.build.resf.org/RLSA-2025:22801"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7934-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7934-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7936-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7936-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4393-1 vom 2025-12-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7255154 vom 2025-12-17",
"url": "https://www.ibm.com/support/pages/node/7255154"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4422-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4505-1 vom 2025-12-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3D5W2444LYTUJVXYGB63LTMU25GRLRJR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4515-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4517-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4516-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4521-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20021-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20012-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20015-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0090-1 vom 2026-01-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023732.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0107-1 vom 2026-01-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJE4AD3YG7YMRUG6STSQJA6AUB5UHH72/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0107-1 vom 2026-01-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023731.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0534 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0534"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0537 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0537"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0535 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0535"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0576 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0576"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20059-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20039-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0760 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0760"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0759 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0759"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0793 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0793"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0163-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0166-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0176-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PSMTB6JYSBEU2CF3OD7SW3ZIJGKEKBZA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0173-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C7EZZMG5MOJB6A2OZ4KLGVN4SVE4LWEL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0168-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUZFNORTIL7FT4JAMWNYAWMBHYUP24BR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0174-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYNRLMEYZG4OCUWVVR7BLL22PT3MTAV7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0180-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0187-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0184-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0188-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023823.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0186-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0185-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023821.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0191-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0759 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0759.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0793 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0793.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0206-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20260121-0010 vom 2026-01-21",
"url": "https://security.netapp.com/advisory/NTAP-20260121-0010"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-01-21T23:00:00.000+00:00",
"generator": {
"date": "2026-01-22T08:56:03.289+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2194",
"initial_release_date": "2025-10-05T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Google aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von openSUSE und Debian aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, Oracle Linux und Debian aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von IBM und SUSE aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE, Oracle Linux und NetApp aufgenommen"
}
],
"status": "final",
"version": "35"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Cloud Platform",
"product": {
"name": "Google Cloud Platform",
"product_id": "393401",
"product_identification_helper": {
"cpe": "cpe:/a:google:cloud_platform:-"
}
}
},
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF03",
"product_id": "T049499"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF03",
"product_id": "T049499-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if03"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T043317",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:vsphere"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "5.10.0-60.18.0.50.h602",
"product": {
"name": "Open Source Linux Kernel 5.10.0-60.18.0.50.h602",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50470",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50470"
},
{
"cve": "CVE-2022-50471",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50471"
},
{
"cve": "CVE-2022-50472",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50472"
},
{
"cve": "CVE-2022-50473",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50473"
},
{
"cve": "CVE-2022-50474",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50474"
},
{
"cve": "CVE-2022-50475",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50475"
},
{
"cve": "CVE-2022-50476",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50476"
},
{
"cve": "CVE-2022-50477",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50477"
},
{
"cve": "CVE-2022-50478",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50478"
},
{
"cve": "CVE-2022-50479",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50479"
},
{
"cve": "CVE-2022-50480",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50480"
},
{
"cve": "CVE-2022-50481",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50481"
},
{
"cve": "CVE-2022-50482",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50482"
},
{
"cve": "CVE-2022-50483",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50483"
},
{
"cve": "CVE-2022-50484",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50484"
},
{
"cve": "CVE-2022-50485",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50485"
},
{
"cve": "CVE-2022-50486",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50486"
},
{
"cve": "CVE-2022-50487",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50487"
},
{
"cve": "CVE-2022-50488",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50488"
},
{
"cve": "CVE-2022-50489",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50489"
},
{
"cve": "CVE-2022-50490",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50490"
},
{
"cve": "CVE-2022-50491",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50491"
},
{
"cve": "CVE-2022-50492",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50492"
},
{
"cve": "CVE-2022-50493",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50493"
},
{
"cve": "CVE-2022-50494",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50494"
},
{
"cve": "CVE-2022-50495",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50495"
},
{
"cve": "CVE-2022-50496",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50496"
},
{
"cve": "CVE-2022-50497",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50497"
},
{
"cve": "CVE-2022-50498",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50498"
},
{
"cve": "CVE-2022-50499",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50499"
},
{
"cve": "CVE-2022-50500",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50500"
},
{
"cve": "CVE-2022-50501",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50501"
},
{
"cve": "CVE-2022-50502",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50502"
},
{
"cve": "CVE-2022-50503",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50503"
},
{
"cve": "CVE-2022-50504",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50504"
},
{
"cve": "CVE-2022-50505",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50505"
},
{
"cve": "CVE-2022-50506",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50506"
},
{
"cve": "CVE-2022-50507",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50507"
},
{
"cve": "CVE-2022-50508",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50508"
},
{
"cve": "CVE-2023-3773",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-3773"
},
{
"cve": "CVE-2023-53533",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53533"
},
{
"cve": "CVE-2023-53534",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53534"
},
{
"cve": "CVE-2023-53535",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53535"
},
{
"cve": "CVE-2023-53536",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53536"
},
{
"cve": "CVE-2023-53537",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53537"
},
{
"cve": "CVE-2023-53538",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53538"
},
{
"cve": "CVE-2023-53539",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53539"
},
{
"cve": "CVE-2023-53540",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53540"
},
{
"cve": "CVE-2023-53541",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53541"
},
{
"cve": "CVE-2023-53542",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53542"
},
{
"cve": "CVE-2023-53543",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53543"
},
{
"cve": "CVE-2023-53544",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53544"
},
{
"cve": "CVE-2023-53545",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53545"
},
{
"cve": "CVE-2023-53546",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53546"
},
{
"cve": "CVE-2023-53547",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53547"
},
{
"cve": "CVE-2023-53548",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53548"
},
{
"cve": "CVE-2023-53549",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53549"
},
{
"cve": "CVE-2023-53550",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53550"
},
{
"cve": "CVE-2023-53551",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53551"
},
{
"cve": "CVE-2023-53552",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53552"
},
{
"cve": "CVE-2023-53553",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53553"
},
{
"cve": "CVE-2023-53554",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53554"
},
{
"cve": "CVE-2023-53555",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53555"
},
{
"cve": "CVE-2023-53556",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53556"
},
{
"cve": "CVE-2023-53557",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53557"
},
{
"cve": "CVE-2023-53558",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53558"
},
{
"cve": "CVE-2023-53559",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53559"
},
{
"cve": "CVE-2023-53560",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53560"
},
{
"cve": "CVE-2023-53561",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53561"
},
{
"cve": "CVE-2023-53562",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53562"
},
{
"cve": "CVE-2023-53563",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53563"
},
{
"cve": "CVE-2023-53564",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53564"
},
{
"cve": "CVE-2023-53565",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53565"
},
{
"cve": "CVE-2023-53566",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53566"
},
{
"cve": "CVE-2023-53567",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53567"
},
{
"cve": "CVE-2023-53568",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53568"
},
{
"cve": "CVE-2023-53569",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53569"
},
{
"cve": "CVE-2023-53570",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53570"
},
{
"cve": "CVE-2023-53571",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53571"
},
{
"cve": "CVE-2023-53572",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53572"
},
{
"cve": "CVE-2023-53573",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53573"
},
{
"cve": "CVE-2023-53574",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53574"
},
{
"cve": "CVE-2023-53575",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53575"
},
{
"cve": "CVE-2023-53576",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53576"
},
{
"cve": "CVE-2023-53577",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53577"
},
{
"cve": "CVE-2023-53578",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53578"
},
{
"cve": "CVE-2023-53579",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53579"
},
{
"cve": "CVE-2023-53580",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53580"
},
{
"cve": "CVE-2023-53581",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53581"
},
{
"cve": "CVE-2023-53582",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53582"
},
{
"cve": "CVE-2023-53583",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53583"
},
{
"cve": "CVE-2023-53584",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53584"
},
{
"cve": "CVE-2023-53585",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53585"
},
{
"cve": "CVE-2023-53586",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53586"
},
{
"cve": "CVE-2023-53587",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53587"
},
{
"cve": "CVE-2023-53588",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53588"
},
{
"cve": "CVE-2023-53589",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53589"
},
{
"cve": "CVE-2023-53590",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53590"
},
{
"cve": "CVE-2023-53591",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53591"
},
{
"cve": "CVE-2023-53592",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53592"
},
{
"cve": "CVE-2023-53593",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53593"
},
{
"cve": "CVE-2023-53594",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53594"
},
{
"cve": "CVE-2023-53595",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53595"
},
{
"cve": "CVE-2023-53596",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53596"
},
{
"cve": "CVE-2023-53597",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53597"
},
{
"cve": "CVE-2023-53598",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53598"
},
{
"cve": "CVE-2023-53599",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53599"
},
{
"cve": "CVE-2023-53600",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53600"
},
{
"cve": "CVE-2023-53601",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53601"
},
{
"cve": "CVE-2023-53602",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53602"
},
{
"cve": "CVE-2023-53603",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53603"
},
{
"cve": "CVE-2023-53604",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53604"
},
{
"cve": "CVE-2023-53605",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53605"
},
{
"cve": "CVE-2023-53606",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53606"
},
{
"cve": "CVE-2023-53607",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53607"
},
{
"cve": "CVE-2023-53608",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53608"
},
{
"cve": "CVE-2023-53609",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53609"
},
{
"cve": "CVE-2023-53610",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53610"
},
{
"cve": "CVE-2023-53611",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53611"
},
{
"cve": "CVE-2023-53612",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53612"
},
{
"cve": "CVE-2023-53613",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53613"
},
{
"cve": "CVE-2023-53614",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53614"
},
{
"cve": "CVE-2023-53615",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53615"
},
{
"cve": "CVE-2023-53616",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53616"
},
{
"cve": "CVE-2025-39929",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39929"
},
{
"cve": "CVE-2025-39931",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39931"
},
{
"cve": "CVE-2025-39932",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39932"
},
{
"cve": "CVE-2025-39933",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39933"
},
{
"cve": "CVE-2025-39934",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39934"
},
{
"cve": "CVE-2025-39935",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39935"
},
{
"cve": "CVE-2025-39936",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39936"
},
{
"cve": "CVE-2025-39937",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39937"
},
{
"cve": "CVE-2025-39938",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39938"
},
{
"cve": "CVE-2025-39939",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39939"
},
{
"cve": "CVE-2025-39940",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39940"
},
{
"cve": "CVE-2025-39941",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39941"
},
{
"cve": "CVE-2025-39942",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39942"
},
{
"cve": "CVE-2025-39943",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39943"
},
{
"cve": "CVE-2025-39944",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39945",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39945"
},
{
"cve": "CVE-2025-39946",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39946"
},
{
"cve": "CVE-2025-39947",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39947"
},
{
"cve": "CVE-2025-39948",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39948"
},
{
"cve": "CVE-2025-39949",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39949"
},
{
"cve": "CVE-2025-39950",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39950"
},
{
"cve": "CVE-2025-39951",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39951"
},
{
"cve": "CVE-2025-39952",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39952"
},
{
"cve": "CVE-2025-39953",
"product_status": {
"known_affected": [
"T028462",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T000126",
"T043317",
"T027843",
"T049499",
"398363",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39953"
}
]
}
GHSA-397Q-F49X-2C9J
Vulnerability from github – Published: 2025-10-04 18:31 – Updated: 2025-10-04 18:31In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Validate data run offset
This adds sanity checks for data run offset. We should make sure data run offset is legit before trying to unpack them, otherwise we may encounter use-after-free or some unexpected memory access behaviors.
[ 82.940342] BUG: KASAN: use-after-free in run_unpack+0x2e3/0x570 [ 82.941180] Read of size 1 at addr ffff888008a8487f by task mount/240 [ 82.941670] [ 82.942069] CPU: 0 PID: 240 Comm: mount Not tainted 5.19.0+ #15 [ 82.942482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 82.943720] Call Trace: [ 82.944204] [ 82.944471] dump_stack_lvl+0x49/0x63 [ 82.944908] print_report.cold+0xf5/0x67b [ 82.945141] ? __wait_on_bit+0x106/0x120 [ 82.945750] ? run_unpack+0x2e3/0x570 [ 82.946626] kasan_report+0xa7/0x120 [ 82.947046] ? run_unpack+0x2e3/0x570 [ 82.947280] __asan_load1+0x51/0x60 [ 82.947483] run_unpack+0x2e3/0x570 [ 82.947709] ? memcpy+0x4e/0x70 [ 82.947927] ? run_pack+0x7a0/0x7a0 [ 82.948158] run_unpack_ex+0xad/0x3f0 [ 82.948399] ? mi_enum_attr+0x14a/0x200 [ 82.948717] ? run_unpack+0x570/0x570 [ 82.949072] ? ni_enum_attr_ex+0x1b2/0x1c0 [ 82.949332] ? ni_fname_type.part.0+0xd0/0xd0 [ 82.949611] ? mi_read+0x262/0x2c0 [ 82.949970] ? ntfs_cmp_names_cpu+0x125/0x180 [ 82.950249] ntfs_iget5+0x632/0x1870 [ 82.950621] ? ntfs_get_block_bmap+0x70/0x70 [ 82.951192] ? evict+0x223/0x280 [ 82.951525] ? iput.part.0+0x286/0x320 [ 82.951969] ntfs_fill_super+0x1321/0x1e20 [ 82.952436] ? put_ntfs+0x1d0/0x1d0 [ 82.952822] ? vsprintf+0x20/0x20 [ 82.953188] ? mutex_unlock+0x81/0xd0 [ 82.953379] ? set_blocksize+0x95/0x150 [ 82.954001] get_tree_bdev+0x232/0x370 [ 82.954438] ? put_ntfs+0x1d0/0x1d0 [ 82.954700] ntfs_fs_get_tree+0x15/0x20 [ 82.955049] vfs_get_tree+0x4c/0x130 [ 82.955292] path_mount+0x645/0xfd0 [ 82.955615] ? putname+0x80/0xa0 [ 82.955955] ? finish_automount+0x2e0/0x2e0 [ 82.956310] ? kmem_cache_free+0x110/0x390 [ 82.956723] ? putname+0x80/0xa0 [ 82.957023] do_mount+0xd6/0xf0 [ 82.957411] ? path_mount+0xfd0/0xfd0 [ 82.957638] ? __kasan_check_write+0x14/0x20 [ 82.957948] __x64_sys_mount+0xca/0x110 [ 82.958310] do_syscall_64+0x3b/0x90 [ 82.958719] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 82.959341] RIP: 0033:0x7fd0d1ce948a [ 82.960193] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008 [ 82.961532] RSP: 002b:00007ffe59ff69a8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 82.962527] RAX: ffffffffffffffda RBX: 0000564dcc107060 RCX: 00007fd0d1ce948a [ 82.963266] RDX: 0000564dcc107260 RSI: 0000564dcc1072e0 RDI: 0000564dcc10fce0 [ 82.963686] RBP: 0000000000000000 R08: 0000564dcc107280 R09: 0000000000000020 [ 82.964272] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564dcc10fce0 [ 82.964785] R13: 0000564dcc107260 R14: 0000000000000000 R15: 00000000ffffffff
{
"affected": [],
"aliases": [
"CVE-2022-50507"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-04T16:15:47Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate data run offset\n\nThis adds sanity checks for data run offset. We should make sure data\nrun offset is legit before trying to unpack them, otherwise we may\nencounter use-after-free or some unexpected memory access behaviors.\n\n[ 82.940342] BUG: KASAN: use-after-free in run_unpack+0x2e3/0x570\n[ 82.941180] Read of size 1 at addr ffff888008a8487f by task mount/240\n[ 82.941670]\n[ 82.942069] CPU: 0 PID: 240 Comm: mount Not tainted 5.19.0+ #15\n[ 82.942482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 82.943720] Call Trace:\n[ 82.944204] \u003cTASK\u003e\n[ 82.944471] dump_stack_lvl+0x49/0x63\n[ 82.944908] print_report.cold+0xf5/0x67b\n[ 82.945141] ? __wait_on_bit+0x106/0x120\n[ 82.945750] ? run_unpack+0x2e3/0x570\n[ 82.946626] kasan_report+0xa7/0x120\n[ 82.947046] ? run_unpack+0x2e3/0x570\n[ 82.947280] __asan_load1+0x51/0x60\n[ 82.947483] run_unpack+0x2e3/0x570\n[ 82.947709] ? memcpy+0x4e/0x70\n[ 82.947927] ? run_pack+0x7a0/0x7a0\n[ 82.948158] run_unpack_ex+0xad/0x3f0\n[ 82.948399] ? mi_enum_attr+0x14a/0x200\n[ 82.948717] ? run_unpack+0x570/0x570\n[ 82.949072] ? ni_enum_attr_ex+0x1b2/0x1c0\n[ 82.949332] ? ni_fname_type.part.0+0xd0/0xd0\n[ 82.949611] ? mi_read+0x262/0x2c0\n[ 82.949970] ? ntfs_cmp_names_cpu+0x125/0x180\n[ 82.950249] ntfs_iget5+0x632/0x1870\n[ 82.950621] ? ntfs_get_block_bmap+0x70/0x70\n[ 82.951192] ? evict+0x223/0x280\n[ 82.951525] ? iput.part.0+0x286/0x320\n[ 82.951969] ntfs_fill_super+0x1321/0x1e20\n[ 82.952436] ? put_ntfs+0x1d0/0x1d0\n[ 82.952822] ? vsprintf+0x20/0x20\n[ 82.953188] ? mutex_unlock+0x81/0xd0\n[ 82.953379] ? set_blocksize+0x95/0x150\n[ 82.954001] get_tree_bdev+0x232/0x370\n[ 82.954438] ? put_ntfs+0x1d0/0x1d0\n[ 82.954700] ntfs_fs_get_tree+0x15/0x20\n[ 82.955049] vfs_get_tree+0x4c/0x130\n[ 82.955292] path_mount+0x645/0xfd0\n[ 82.955615] ? putname+0x80/0xa0\n[ 82.955955] ? finish_automount+0x2e0/0x2e0\n[ 82.956310] ? kmem_cache_free+0x110/0x390\n[ 82.956723] ? putname+0x80/0xa0\n[ 82.957023] do_mount+0xd6/0xf0\n[ 82.957411] ? path_mount+0xfd0/0xfd0\n[ 82.957638] ? __kasan_check_write+0x14/0x20\n[ 82.957948] __x64_sys_mount+0xca/0x110\n[ 82.958310] do_syscall_64+0x3b/0x90\n[ 82.958719] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 82.959341] RIP: 0033:0x7fd0d1ce948a\n[ 82.960193] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[ 82.961532] RSP: 002b:00007ffe59ff69a8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\n[ 82.962527] RAX: ffffffffffffffda RBX: 0000564dcc107060 RCX: 00007fd0d1ce948a\n[ 82.963266] RDX: 0000564dcc107260 RSI: 0000564dcc1072e0 RDI: 0000564dcc10fce0\n[ 82.963686] RBP: 0000000000000000 R08: 0000564dcc107280 R09: 0000000000000020\n[ 82.964272] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564dcc10fce0\n[ 82.964785] R13: 0000564dcc107260 R14: 0000000000000000 R15: 00000000ffffffff",
"id": "GHSA-397q-f49x-2c9j",
"modified": "2025-10-04T18:31:14Z",
"published": "2025-10-04T18:31:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50507"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/6db620863f8528ed9a9aa5ad323b26554a17881d"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/9173b89c16a603d73c434b695fe2a7a13491300f"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/de5e0955248ff90a2ae91e7f5c108392b52152d0"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/e0455361d3068066a91fe18282b751925d7b5ee7"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2022-50507
Vulnerability from fkie_nvd - Published: 2025-10-04 16:15 - Updated: 2025-10-06 14:56| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate data run offset\n\nThis adds sanity checks for data run offset. We should make sure data\nrun offset is legit before trying to unpack them, otherwise we may\nencounter use-after-free or some unexpected memory access behaviors.\n\n[ 82.940342] BUG: KASAN: use-after-free in run_unpack+0x2e3/0x570\n[ 82.941180] Read of size 1 at addr ffff888008a8487f by task mount/240\n[ 82.941670]\n[ 82.942069] CPU: 0 PID: 240 Comm: mount Not tainted 5.19.0+ #15\n[ 82.942482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 82.943720] Call Trace:\n[ 82.944204] \u003cTASK\u003e\n[ 82.944471] dump_stack_lvl+0x49/0x63\n[ 82.944908] print_report.cold+0xf5/0x67b\n[ 82.945141] ? __wait_on_bit+0x106/0x120\n[ 82.945750] ? run_unpack+0x2e3/0x570\n[ 82.946626] kasan_report+0xa7/0x120\n[ 82.947046] ? run_unpack+0x2e3/0x570\n[ 82.947280] __asan_load1+0x51/0x60\n[ 82.947483] run_unpack+0x2e3/0x570\n[ 82.947709] ? memcpy+0x4e/0x70\n[ 82.947927] ? run_pack+0x7a0/0x7a0\n[ 82.948158] run_unpack_ex+0xad/0x3f0\n[ 82.948399] ? mi_enum_attr+0x14a/0x200\n[ 82.948717] ? run_unpack+0x570/0x570\n[ 82.949072] ? ni_enum_attr_ex+0x1b2/0x1c0\n[ 82.949332] ? ni_fname_type.part.0+0xd0/0xd0\n[ 82.949611] ? mi_read+0x262/0x2c0\n[ 82.949970] ? ntfs_cmp_names_cpu+0x125/0x180\n[ 82.950249] ntfs_iget5+0x632/0x1870\n[ 82.950621] ? ntfs_get_block_bmap+0x70/0x70\n[ 82.951192] ? evict+0x223/0x280\n[ 82.951525] ? iput.part.0+0x286/0x320\n[ 82.951969] ntfs_fill_super+0x1321/0x1e20\n[ 82.952436] ? put_ntfs+0x1d0/0x1d0\n[ 82.952822] ? vsprintf+0x20/0x20\n[ 82.953188] ? mutex_unlock+0x81/0xd0\n[ 82.953379] ? set_blocksize+0x95/0x150\n[ 82.954001] get_tree_bdev+0x232/0x370\n[ 82.954438] ? put_ntfs+0x1d0/0x1d0\n[ 82.954700] ntfs_fs_get_tree+0x15/0x20\n[ 82.955049] vfs_get_tree+0x4c/0x130\n[ 82.955292] path_mount+0x645/0xfd0\n[ 82.955615] ? putname+0x80/0xa0\n[ 82.955955] ? finish_automount+0x2e0/0x2e0\n[ 82.956310] ? kmem_cache_free+0x110/0x390\n[ 82.956723] ? putname+0x80/0xa0\n[ 82.957023] do_mount+0xd6/0xf0\n[ 82.957411] ? path_mount+0xfd0/0xfd0\n[ 82.957638] ? __kasan_check_write+0x14/0x20\n[ 82.957948] __x64_sys_mount+0xca/0x110\n[ 82.958310] do_syscall_64+0x3b/0x90\n[ 82.958719] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 82.959341] RIP: 0033:0x7fd0d1ce948a\n[ 82.960193] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[ 82.961532] RSP: 002b:00007ffe59ff69a8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\n[ 82.962527] RAX: ffffffffffffffda RBX: 0000564dcc107060 RCX: 00007fd0d1ce948a\n[ 82.963266] RDX: 0000564dcc107260 RSI: 0000564dcc1072e0 RDI: 0000564dcc10fce0\n[ 82.963686] RBP: 0000000000000000 R08: 0000564dcc107280 R09: 0000000000000020\n[ 82.964272] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564dcc10fce0\n[ 82.964785] R13: 0000564dcc107260 R14: 0000000000000000 R15: 00000000ffffffff"
}
],
"id": "CVE-2022-50507",
"lastModified": "2025-10-06T14:56:21.733",
"metrics": {},
"published": "2025-10-04T16:15:47.960",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/6db620863f8528ed9a9aa5ad323b26554a17881d"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/9173b89c16a603d73c434b695fe2a7a13491300f"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/de5e0955248ff90a2ae91e7f5c108392b52152d0"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/e0455361d3068066a91fe18282b751925d7b5ee7"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.