Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53133 (GCVE-0-2023-53133)
Vulnerability from cvelistv5
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/ipv4/tcp_bpf.c", "net/ipv4/udp_bpf.c", "net/unix/unix_bpf.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "4a476285f6d2921c3c9faa494eab83b78f78fc55", "status": "affected", "version": "604326b41a6fb9b4a78b6179335decee0365cd8c", "versionType": "git" }, { "lessThan": "f45cf3ae3068e70e2c7f3e24a7f8e8aa99511f03", "status": "affected", "version": "604326b41a6fb9b4a78b6179335decee0365cd8c", "versionType": "git" }, { "lessThan": "bf0579989de64d36e177c0611c685dc4a91457a7", "status": "affected", "version": "604326b41a6fb9b4a78b6179335decee0365cd8c", "versionType": "git" }, { "lessThan": "d900f3d20cc3169ce42ec72acc850e662a4d4db2", "status": "affected", "version": "604326b41a6fb9b4a78b6179335decee0365cd8c", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/ipv4/tcp_bpf.c", "net/ipv4/udp_bpf.c", "net/unix/unix_bpf.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.20" }, { "lessThan": "4.20", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.103", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.20", "versionType": "semver" }, { "lessThanOrEqual": "6.2.*", "status": "unaffected", "version": "6.2.7", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.3", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.103", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.20", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.2.7", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.3", "versionStartIncluding": "4.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser()\n\nWhen the buffer length of the recvmsg system call is 0, we got the\nflollowing soft lockup problem:\n\nwatchdog: BUG: soft lockup - CPU#3 stuck for 27s! [a.out:6149]\nCPU: 3 PID: 6149 Comm: a.out Kdump: loaded Not tainted 6.2.0+ #30\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:remove_wait_queue+0xb/0xc0\nCode: 5e 41 5f c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 57 \u003c41\u003e 56 41 55 41 54 55 48 89 fd 53 48 89 f3 4c 8d 6b 18 4c 8d 73 20\nRSP: 0018:ffff88811b5978b8 EFLAGS: 00000246\nRAX: 0000000000000000 RBX: ffff88811a7d3780 RCX: ffffffffb7a4d768\nRDX: dffffc0000000000 RSI: ffff88811b597908 RDI: ffff888115408040\nRBP: 1ffff110236b2f1b R08: 0000000000000000 R09: ffff88811a7d37e7\nR10: ffffed10234fa6fc R11: 0000000000000001 R12: ffff88811179b800\nR13: 0000000000000001 R14: ffff88811a7d38a8 R15: ffff88811a7d37e0\nFS: 00007f6fb5398740(0000) GS:ffff888237180000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000000 CR3: 000000010b6ba002 CR4: 0000000000370ee0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n tcp_msg_wait_data+0x279/0x2f0\n tcp_bpf_recvmsg_parser+0x3c6/0x490\n inet_recvmsg+0x280/0x290\n sock_recvmsg+0xfc/0x120\n ____sys_recvmsg+0x160/0x3d0\n ___sys_recvmsg+0xf0/0x180\n __sys_recvmsg+0xea/0x1a0\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nThe logic in tcp_bpf_recvmsg_parser is as follows:\n\nmsg_bytes_ready:\n\tcopied = sk_msg_recvmsg(sk, psock, msg, len, flags);\n\tif (!copied) {\n\t\twait data;\n\t\tgoto msg_bytes_ready;\n\t}\n\nIn this case, \"copied\" always is 0, the infinite loop occurs.\n\nAccording to the Linux system call man page, 0 should be returned in this\ncase. Therefore, in tcp_bpf_recvmsg_parser(), if the length is 0, directly\nreturn. Also modify several other functions with the same problem." } ], "providerMetadata": { "dateUpdated": "2025-05-04T07:50:36.779Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/4a476285f6d2921c3c9faa494eab83b78f78fc55" }, { "url": "https://git.kernel.org/stable/c/f45cf3ae3068e70e2c7f3e24a7f8e8aa99511f03" }, { "url": "https://git.kernel.org/stable/c/bf0579989de64d36e177c0611c685dc4a91457a7" }, { "url": "https://git.kernel.org/stable/c/d900f3d20cc3169ce42ec72acc850e662a4d4db2" } ], "title": "bpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser()", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2023-53133", "datePublished": "2025-05-02T15:56:06.981Z", "dateReserved": "2025-05-02T15:51:43.561Z", "dateUpdated": "2025-05-04T07:50:36.779Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-53133\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-02T16:15:32.260\",\"lastModified\":\"2025-05-05T20:54:19.760\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser()\\n\\nWhen the buffer length of the recvmsg system call is 0, we got the\\nflollowing soft lockup problem:\\n\\nwatchdog: BUG: soft lockup - CPU#3 stuck for 27s! [a.out:6149]\\nCPU: 3 PID: 6149 Comm: a.out Kdump: loaded Not tainted 6.2.0+ #30\\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\\nRIP: 0010:remove_wait_queue+0xb/0xc0\\nCode: 5e 41 5f c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 57 \u003c41\u003e 56 41 55 41 54 55 48 89 fd 53 48 89 f3 4c 8d 6b 18 4c 8d 73 20\\nRSP: 0018:ffff88811b5978b8 EFLAGS: 00000246\\nRAX: 0000000000000000 RBX: ffff88811a7d3780 RCX: ffffffffb7a4d768\\nRDX: dffffc0000000000 RSI: ffff88811b597908 RDI: ffff888115408040\\nRBP: 1ffff110236b2f1b R08: 0000000000000000 R09: ffff88811a7d37e7\\nR10: ffffed10234fa6fc R11: 0000000000000001 R12: ffff88811179b800\\nR13: 0000000000000001 R14: ffff88811a7d38a8 R15: ffff88811a7d37e0\\nFS: 00007f6fb5398740(0000) GS:ffff888237180000(0000) knlGS:0000000000000000\\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\nCR2: 0000000020000000 CR3: 000000010b6ba002 CR4: 0000000000370ee0\\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\\nCall Trace:\\n \u003cTASK\u003e\\n tcp_msg_wait_data+0x279/0x2f0\\n tcp_bpf_recvmsg_parser+0x3c6/0x490\\n inet_recvmsg+0x280/0x290\\n sock_recvmsg+0xfc/0x120\\n ____sys_recvmsg+0x160/0x3d0\\n ___sys_recvmsg+0xf0/0x180\\n __sys_recvmsg+0xea/0x1a0\\n do_syscall_64+0x3f/0x90\\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\\n\\nThe logic in tcp_bpf_recvmsg_parser is as follows:\\n\\nmsg_bytes_ready:\\n\\tcopied = sk_msg_recvmsg(sk, psock, msg, len, flags);\\n\\tif (!copied) {\\n\\t\\twait data;\\n\\t\\tgoto msg_bytes_ready;\\n\\t}\\n\\nIn this case, \\\"copied\\\" always is 0, the infinite loop occurs.\\n\\nAccording to the Linux system call man page, 0 should be returned in this\\ncase. Therefore, in tcp_bpf_recvmsg_parser(), if the length is 0, directly\\nreturn. Also modify several other functions with the same problem.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, sockmap: corrige un error de bucle infinito cuando len es 0 en tcp_bpf_recvmsg_parser() Cuando la longitud del b\u00fafer de la llamada del sistema recvmsg es 0, tenemos el siguiente problema de bloqueo suave: watchdog: ERROR: bloqueo suave: \u00a1CPU n.\u00ba 3 bloqueada durante 27 s! [a.out:6149] CPU: 3 PID: 6149 Comm: a.out Kdump: cargado No contaminado 6.2.0+ #30 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014 RIP: 0010:remove_wait_queue+0xb/0xc0 C\u00f3digo: 5e 41 5f c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 57 \u0026lt;41\u0026gt; 56 41 55 41 54 55 48 89 fd 53 48 89 f3 4c 8d 6b 18 4c 8d 73 20 RSP: 0018:ffff88811b5978b8 EFLAGS: 00000246 RAX: 000000000000000 RBX: ffff88811a7d3780 RCX: ffffffffb7a4d768 RDX: dffffc0000000000 RSI: ffff88811b597908 RDI: ffff888115408040 RBP: 1ffff110236b2f1b R08: 000000000000000 R09: ffff88811a7d37e7 R10: ffffed10234fa6fc R11: 000000000000001 R12: ffff88811179b800 R13: 0000000000000001 R14: ffff88811a7d38a8 R15: ffff88811a7d37e0 FS: 00007f6fb5398740(0000) GS:ffff888237180000(0000) knlGS:000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 000000080050033 CR2: 0000000020000000 CR3: 0000000010b6ba002 CR4: 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Rastreo de llamadas: tcp_msg_wait_data+0x279/0x2f0 tcp_bpf_recvmsg_parser+0x3c6/0x490 inet_recvmsg+0x280/0x290 sock_recvmsg+0xfc/0x120 ____sys_recvmsg+0x160/0x3d0 ___sys_recvmsg+0xf0/0x180 __sys_recvmsg+0xea/0x1a0 do_syscall_64+0x3f/0x90 entry_SYSCALL_64_after_hwframe+0x72/0xdc The logic in tcp_bpf_recvmsg_parser is as follows: msg_bytes_ready: copied = sk_msg_recvmsg(sk, psock, msg, len, flags); if (!copied) { wait data; goto msg_bytes_ready; } En este caso, \\\"copiado\\\" siempre es 0, se produce el bucle infinito. Seg\u00fan la p\u00e1gina del manual de llamadas del sistema de Linux, en este caso se deber\u00eda devolver 0. Por lo tanto, en tcp_bpf_recvmsg_parser(), si la longitud es 0, se devuelve directamente. Modifique tambi\u00e9n otras funciones con el mismo problema.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/4a476285f6d2921c3c9faa494eab83b78f78fc55\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bf0579989de64d36e177c0611c685dc4a91457a7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d900f3d20cc3169ce42ec72acc850e662a4d4db2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f45cf3ae3068e70e2c7f3e24a7f8e8aa99511f03\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
CERTFR-2025-AVI-0607
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
SUSE | N/A | SUSE Manager Proxy 4.2 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
SUSE | N/A | SUSE Real Time Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
SUSE | N/A | Legacy Module 15-SP7 | ||
SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
SUSE | N/A | openSUSE Leap 15.5 | ||
SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
SUSE | N/A | SUSE Manager Retail Branch Server 4.2 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
SUSE | N/A | openSUSE Leap 15.6 | ||
SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
SUSE | N/A | Development Tools Module 15-SP7 | ||
SUSE | N/A | SUSE Manager Server 4.2 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
SUSE | N/A | Basesystem Module 15-SP7 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
SUSE | N/A | SUSE Real Time Module 15-SP7 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SUSE Linux Enterprise Micro for Rancher 5.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP7", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP7", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Real Time Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 12 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP7", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP7", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP7", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 12-SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP7", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP7", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Enterprise Storage 7.1", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP7", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 LTSS", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP7", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Real Time Module 15-SP7", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2022-2586", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2586" }, { "name": "CVE-2022-1679", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1679" }, { "name": "CVE-2022-2905", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2905" }, { "name": "CVE-2022-4095", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4095" }, { "name": "CVE-2022-3903", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3903" }, { "name": "CVE-2022-2585", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2585" }, { "name": "CVE-2022-4662", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4662" }, { "name": "CVE-2023-1989", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1989" }, { "name": "CVE-2023-3111", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3111" }, { "name": "CVE-2024-26586", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26586" }, { "name": "CVE-2023-52500", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52500" }, { "name": "CVE-2024-26872", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26872" }, { "name": "CVE-2024-26875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26875" }, { "name": "CVE-2024-26935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26935" }, { "name": "CVE-2024-26924", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26924" }, { "name": "CVE-2024-26808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26808" }, { "name": "CVE-2024-26825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26825" }, { "name": "CVE-2021-47212", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47212" }, { "name": "CVE-2024-36959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36959" }, { "name": "CVE-2021-47455", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47455" }, { "name": "CVE-2021-47527", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47527" }, { "name": "CVE-2021-47557", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47557" }, { "name": "CVE-2024-35790", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790" }, { "name": "CVE-2024-27397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27397" }, { "name": "CVE-2021-47595", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47595" }, { "name": "CVE-2024-36978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36978" }, { "name": "CVE-2024-26831", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26831" }, { "name": "CVE-2024-38588", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38588" }, { "name": "CVE-2024-35839", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35839" }, { "name": "CVE-2024-46800", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46800" }, { "name": "CVE-2023-52888", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52888" }, { "name": "CVE-2024-41085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41085" }, { "name": "CVE-2024-43869", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43869" }, { "name": "CVE-2024-53057", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53057" }, { "name": "CVE-2024-53125", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53125" }, { "name": "CVE-2024-53141", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53141" }, { "name": "CVE-2024-50106", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50106" }, { "name": "CVE-2024-53197", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53197" }, { "name": "CVE-2024-50034", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50034" }, { "name": "CVE-2024-50293", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50293" }, { "name": "CVE-2024-56541", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56541" }, { "name": "CVE-2024-56699", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56699" }, { "name": "CVE-2023-52924", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52924" }, { "name": "CVE-2023-52925", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52925" }, { "name": "CVE-2025-21700", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21700" }, { "name": "CVE-2024-56770", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56770" }, { "name": "CVE-2025-21629", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21629" }, { "name": "CVE-2022-49154", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49154" }, { "name": "CVE-2022-49731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49731" }, { "name": "CVE-2024-49568", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49568" }, { "name": "CVE-2024-56613", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56613" }, { "name": "CVE-2025-21658", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21658" }, { "name": "CVE-2024-58077", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58077" }, { "name": "CVE-2025-21703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21703" }, { "name": "CVE-2023-52927", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927" }, { "name": "CVE-2024-57947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57947" }, { "name": "CVE-2024-57999", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57999" }, { "name": "CVE-2025-21756", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21756" }, { "name": "CVE-2025-21702", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21702" }, { "name": "CVE-2025-21898", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21898" }, { "name": "CVE-2025-21899", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21899" }, { "name": "CVE-2025-21920", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21920" }, { "name": "CVE-2025-21938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21938" }, { "name": "CVE-2025-21959", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959" }, { "name": "CVE-2025-21971", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21971" }, { "name": "CVE-2025-21997", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21997" }, { "name": "CVE-2025-22005", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005" }, { "name": "CVE-2025-22035", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035" }, { "name": "CVE-2025-22066", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066" }, { "name": "CVE-2025-22089", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089" }, { "name": "CVE-2025-22095", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22095" }, { "name": "CVE-2025-37785", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785" }, { "name": "CVE-2025-39735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735" }, { "name": "CVE-2024-28956", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28956" }, { "name": "CVE-2023-53032", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53032" }, { "name": "CVE-2024-35840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35840" }, { "name": "CVE-2025-23145", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145" }, { "name": "CVE-2025-37798", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798" }, { "name": "CVE-2025-23141", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23141" }, { "name": "CVE-2025-23142", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142" }, { "name": "CVE-2025-23144", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144" }, { "name": "CVE-2025-23146", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146" }, { "name": "CVE-2025-23147", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147" }, { "name": "CVE-2025-23148", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148" }, { "name": "CVE-2025-23151", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151" }, { "name": "CVE-2025-23156", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156" }, { "name": "CVE-2025-23157", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157" }, { "name": "CVE-2025-23158", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158" }, { "name": "CVE-2025-23159", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159" }, { "name": "CVE-2025-23161", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161" }, { "name": "CVE-2025-37738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738" }, { "name": "CVE-2025-37740", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740" }, { "name": "CVE-2025-37741", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741" }, { "name": "CVE-2025-37742", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742" }, { "name": "CVE-2025-37752", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37752" }, { "name": "CVE-2025-37756", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756" }, { "name": "CVE-2025-37757", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757" }, { "name": "CVE-2025-37758", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758" }, { "name": "CVE-2025-37765", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765" }, { "name": "CVE-2025-37766", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766" }, { "name": "CVE-2025-37767", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767" }, { "name": "CVE-2025-37768", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768" }, { "name": "CVE-2025-37769", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37769" }, { "name": "CVE-2025-37770", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770" }, { "name": "CVE-2025-37771", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771" }, { "name": "CVE-2025-37772", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37772" }, { "name": "CVE-2025-37781", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781" }, { "name": "CVE-2025-37782", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37782" }, { "name": "CVE-2025-37788", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788" }, { "name": "CVE-2025-37792", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792" }, { "name": "CVE-2025-37794", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794" }, { "name": "CVE-2025-37796", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796" }, { "name": "CVE-2025-37797", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797" }, { "name": "CVE-2025-37801", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37801" }, { "name": "CVE-2025-37805", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805" }, { "name": "CVE-2025-37810", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810" }, { "name": "CVE-2025-37811", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811" }, { "name": "CVE-2025-37812", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812" }, { "name": "CVE-2025-37815", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37815" }, { "name": "CVE-2025-37823", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823" }, { "name": "CVE-2025-37836", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836" }, { "name": "CVE-2025-37839", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839" }, { "name": "CVE-2025-37840", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840" }, { "name": "CVE-2025-37841", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841" }, { "name": "CVE-2025-37844", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844" }, { "name": "CVE-2025-37849", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37849" }, { "name": "CVE-2025-37850", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850" }, { "name": "CVE-2025-37851", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851" }, { "name": "CVE-2025-37852", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37852" }, { "name": "CVE-2025-37854", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37854" }, { "name": "CVE-2025-37858", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858" }, { "name": "CVE-2025-37859", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859" }, { "name": "CVE-2025-37862", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862" }, { "name": "CVE-2025-37865", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37865" }, { "name": "CVE-2025-37867", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867" }, { "name": "CVE-2025-37871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871" }, { "name": "CVE-2025-37875", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875" }, { "name": "CVE-2025-37881", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881" }, { "name": "CVE-2025-37884", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37884" }, { "name": "CVE-2025-37889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889" }, { "name": "CVE-2025-37892", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892" }, { "name": "CVE-2025-37937", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937" }, { "name": "CVE-2025-37938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37938" }, { "name": "CVE-2025-37979", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37979" }, { "name": "CVE-2025-37982", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982" }, { "name": "CVE-2025-37983", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983" }, { "name": "CVE-2025-37985", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985" }, { "name": "CVE-2025-37989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989" }, { "name": "CVE-2025-37819", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819" }, { "name": "CVE-2025-37890", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890" }, { "name": "CVE-2025-37897", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37897" }, { "name": "CVE-2025-37901", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37901" }, { "name": "CVE-2025-37903", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37903" }, { "name": "CVE-2025-37905", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905" }, { "name": "CVE-2025-37909", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909" }, { "name": "CVE-2025-37911", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911" }, { "name": "CVE-2025-37912", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912" }, { "name": "CVE-2025-37913", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913" }, { "name": "CVE-2025-37914", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914" }, { "name": "CVE-2025-37915", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915" }, { "name": "CVE-2025-37917", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37917" }, { "name": "CVE-2025-37921", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37921" }, { "name": "CVE-2025-37923", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923" }, { "name": "CVE-2025-37927", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927" }, { "name": "CVE-2025-37928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37928" }, { "name": "CVE-2025-37929", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37929" }, { "name": "CVE-2025-37930", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930" }, { "name": "CVE-2025-37932", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932" }, { "name": "CVE-2025-37936", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37936" }, { "name": "CVE-2025-37948", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37948" }, { "name": "CVE-2025-37951", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37951" }, { "name": "CVE-2025-37953", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37953" }, { "name": "CVE-2025-37959", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37959" }, { "name": "CVE-2025-37961", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37961" }, { "name": "CVE-2025-37963", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37963" }, { "name": "CVE-2025-37967", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967" }, { "name": "CVE-2025-37969", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969" }, { "name": "CVE-2025-37970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970" }, { "name": "CVE-2025-37972", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37972" }, { "name": "CVE-2025-37990", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990" }, { "name": "CVE-2022-49879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49879" }, { "name": "CVE-2022-49881", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49881" }, { "name": "CVE-2023-53081", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53081" }, { "name": "CVE-2023-53090", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53090" }, { "name": "CVE-2023-53091", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53091" }, { "name": "CVE-2023-53145", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53145" }, { "name": "CVE-2025-37943", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37943" }, { "name": "CVE-2022-49917", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49917" }, { "name": "CVE-2022-49921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49921" }, { "name": "CVE-2023-53146", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53146" }, { "name": "CVE-2024-58098", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58098" }, { "name": "CVE-2024-58099", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58099" }, { "name": "CVE-2024-58100", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58100" }, { "name": "CVE-2024-58237", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58237" }, { "name": "CVE-2025-21868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21868" }, { "name": "CVE-2025-22113", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22113" }, { "name": "CVE-2025-22119", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22119" }, { "name": "CVE-2025-22124", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22124" }, { "name": "CVE-2025-23149", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23149" }, { "name": "CVE-2025-23155", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23155" }, { "name": "CVE-2025-37743", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37743" }, { "name": "CVE-2025-37747", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37747" }, { "name": "CVE-2025-37754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37754" }, { "name": "CVE-2025-37793", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37793" }, { "name": "CVE-2025-37800", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37800" }, { "name": "CVE-2025-37853", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37853" }, { "name": "CVE-2025-37873", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37873" }, { "name": "CVE-2025-37874", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37874" }, { "name": "CVE-2025-37891", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37891" }, { "name": "CVE-2025-37900", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37900" }, { "name": "CVE-2025-37918", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37918" }, { "name": "CVE-2025-37925", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37925" }, { "name": "CVE-2025-37931", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37931" }, { "name": "CVE-2025-37933", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37933" }, { "name": "CVE-2025-37944", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37944" }, { "name": "CVE-2025-37954", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37954" }, { "name": "CVE-2025-37968", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37968" }, { "name": "CVE-2025-37978", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37978" }, { "name": "CVE-2025-37980", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37980" }, { "name": "CVE-2025-37986", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37986" }, { "name": "CVE-2025-37987", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37987" }, { "name": "CVE-2025-37998", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998" }, { "name": "CVE-2025-38104", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38104" }, { "name": "CVE-2025-38240", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38240" }, { "name": "CVE-2025-40014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-40014" }, { "name": "CVE-2025-37997", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997" }, { "name": "CVE-2025-38000", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000" }, { "name": "CVE-2025-38001", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001" }, { "name": "CVE-2025-21911", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21911" }, { "name": "CVE-2025-21939", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21939" }, { "name": "CVE-2025-22023", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22023" }, { "name": "CVE-2025-22083", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22083" }, { "name": "CVE-2025-22111", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22111" }, { "name": "CVE-2025-22120", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22120" }, { "name": "CVE-2025-23162", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23162" }, { "name": "CVE-2025-37761", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37761" }, { "name": "CVE-2025-37763", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37763" }, { "name": "CVE-2025-37764", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37764" }, { "name": "CVE-2025-37786", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37786" }, { "name": "CVE-2025-37791", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37791" }, { "name": "CVE-2025-37813", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37813" }, { "name": "CVE-2025-37814", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37814" }, { "name": "CVE-2025-37816", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37816" }, { "name": "CVE-2025-37837", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37837" }, { "name": "CVE-2025-37847", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37847" }, { "name": "CVE-2025-37848", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37848" }, { "name": "CVE-2025-37861", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37861" }, { "name": "CVE-2025-37868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37868" }, { "name": "CVE-2025-37869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37869" }, { "name": "CVE-2025-37888", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37888" }, { "name": "CVE-2025-37945", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37945" }, { "name": "CVE-2025-37981", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37981" }, { "name": "CVE-2022-49934", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49934" }, { "name": "CVE-2022-49935", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49935" }, { "name": "CVE-2022-49936", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49936" }, { "name": "CVE-2022-49937", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49937" }, { "name": "CVE-2022-49938", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49938" }, { "name": "CVE-2022-49940", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49940" }, { "name": "CVE-2022-49942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49942" }, { "name": "CVE-2022-49943", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49943" }, { "name": "CVE-2022-49944", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49944" }, { "name": "CVE-2022-49945", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49945" }, { "name": "CVE-2022-49946", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49946" }, { "name": "CVE-2022-49948", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49948" }, { "name": "CVE-2022-49949", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49949" }, { "name": "CVE-2022-49950", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49950" }, { "name": "CVE-2022-49951", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49951" }, { "name": "CVE-2022-49952", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49952" }, { "name": "CVE-2022-49954", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49954" }, { "name": "CVE-2022-49956", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49956" }, { "name": "CVE-2022-49957", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49957" }, { "name": "CVE-2022-49958", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49958" }, { "name": "CVE-2022-49960", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49960" }, { "name": "CVE-2022-49962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49962" }, { "name": "CVE-2022-49963", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49963" }, { "name": "CVE-2022-49964", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49964" }, { "name": "CVE-2022-49965", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49965" }, { "name": "CVE-2022-49966", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49966" }, { "name": "CVE-2022-49968", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49968" }, { "name": "CVE-2022-49969", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49969" }, { "name": "CVE-2022-49971", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49971" }, { "name": "CVE-2022-49972", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49972" }, { "name": "CVE-2022-49977", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49977" }, { "name": "CVE-2022-49978", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49978" }, { "name": "CVE-2022-49980", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49980" }, { "name": "CVE-2022-49981", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49981" }, { "name": "CVE-2022-49982", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49982" }, { "name": "CVE-2022-49983", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49983" }, { "name": "CVE-2022-49984", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49984" }, { "name": "CVE-2022-49985", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49985" }, { "name": "CVE-2022-49986", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49986" }, { "name": "CVE-2022-49987", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49987" }, { "name": "CVE-2022-49989", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49989" }, { "name": "CVE-2022-49990", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49990" }, { "name": "CVE-2022-49993", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49993" }, { "name": "CVE-2022-49995", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49995" }, { "name": "CVE-2022-49999", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49999" }, { "name": "CVE-2022-50002", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50002" }, { "name": "CVE-2022-50003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50003" }, { "name": "CVE-2022-50005", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50005" }, { "name": "CVE-2022-50006", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50006" }, { "name": "CVE-2022-50008", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50008" }, { "name": "CVE-2022-50010", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50010" }, { "name": "CVE-2022-50011", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50011" }, { "name": "CVE-2022-50012", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50012" }, { "name": "CVE-2022-50015", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50015" }, { "name": "CVE-2022-50016", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50016" }, { "name": "CVE-2022-50019", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50019" }, { "name": "CVE-2022-50020", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50020" }, { "name": "CVE-2022-50021", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50021" }, { "name": "CVE-2022-50022", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50022" }, { "name": "CVE-2022-50023", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50023" }, { "name": "CVE-2022-50024", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50024" }, { "name": "CVE-2022-50026", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50026" }, { "name": "CVE-2022-50027", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50027" }, { "name": "CVE-2022-50028", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50028" }, { "name": "CVE-2022-50029", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50029" }, { "name": "CVE-2022-50030", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50030" }, { "name": "CVE-2022-50031", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50031" }, { "name": "CVE-2022-50032", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50032" }, { "name": "CVE-2022-50033", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50033" }, { "name": "CVE-2022-50034", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50034" }, { "name": "CVE-2022-50035", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50035" }, { "name": "CVE-2022-50036", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50036" }, { "name": "CVE-2022-50037", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50037" }, { "name": "CVE-2022-50038", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50038" }, { "name": "CVE-2022-50039", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50039" }, { "name": "CVE-2022-50040", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50040" }, { "name": "CVE-2022-50041", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50041" }, { "name": "CVE-2022-50044", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50044" }, { "name": "CVE-2022-50045", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50045" }, { "name": "CVE-2022-50046", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50046" }, { "name": "CVE-2022-50047", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50047" }, { "name": "CVE-2022-50049", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50049" }, { "name": "CVE-2022-50050", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50050" }, { "name": "CVE-2022-50051", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50051" }, { "name": "CVE-2022-50052", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50052" }, { "name": "CVE-2022-50053", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50053" }, { "name": "CVE-2022-50054", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50054" }, { "name": "CVE-2022-50055", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50055" }, { "name": "CVE-2022-50059", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50059" }, { "name": "CVE-2022-50060", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50060" }, { "name": "CVE-2022-50061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50061" }, { "name": "CVE-2022-50062", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50062" }, { "name": "CVE-2022-50065", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50065" }, { "name": "CVE-2022-50066", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50066" }, { "name": "CVE-2022-50067", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50067" }, { "name": "CVE-2022-50068", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50068" }, { "name": "CVE-2022-50072", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50072" }, { "name": "CVE-2022-50073", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50073" }, { "name": "CVE-2022-50074", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50074" }, { "name": "CVE-2022-50076", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50076" }, { "name": "CVE-2022-50077", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50077" }, { "name": "CVE-2022-50079", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50079" }, { "name": "CVE-2022-50083", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50083" }, { "name": "CVE-2022-50084", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50084" }, { "name": "CVE-2022-50085", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50085" }, { "name": "CVE-2022-50086", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50086" }, { "name": "CVE-2022-50087", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50087" }, { "name": "CVE-2022-50092", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50092" }, { "name": "CVE-2022-50093", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50093" }, { "name": "CVE-2022-50094", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50094" }, { "name": "CVE-2022-50095", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50095" }, { "name": "CVE-2022-50097", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50097" }, { "name": "CVE-2022-50098", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50098" }, { "name": "CVE-2022-50099", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50099" }, { "name": "CVE-2022-50100", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50100" }, { "name": "CVE-2022-50101", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50101" }, { "name": "CVE-2022-50102", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50102" }, { "name": "CVE-2022-50103", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50103" }, { "name": "CVE-2022-50104", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50104" }, { "name": "CVE-2022-50108", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50108" }, { "name": "CVE-2022-50109", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50109" }, { "name": "CVE-2022-50110", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50110" }, { "name": "CVE-2022-50111", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50111" }, { "name": "CVE-2022-50112", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50112" }, { "name": "CVE-2022-50115", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50115" }, { "name": "CVE-2022-50116", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50116" }, { "name": "CVE-2022-50117", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50117" }, { "name": "CVE-2022-50118", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50118" }, { "name": "CVE-2022-50120", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50120" }, { "name": "CVE-2022-50121", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50121" }, { "name": "CVE-2022-50124", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50124" }, { "name": "CVE-2022-50125", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50125" }, { "name": "CVE-2022-50126", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50126" }, { "name": "CVE-2022-50127", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50127" }, { "name": "CVE-2022-50129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50129" }, { "name": "CVE-2022-50131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50131" }, { "name": "CVE-2022-50132", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50132" }, { "name": "CVE-2022-50133", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50133" }, { "name": "CVE-2022-50134", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50134" }, { "name": "CVE-2022-50135", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50135" }, { "name": "CVE-2022-50136", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50136" }, { "name": "CVE-2022-50137", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50137" }, { "name": "CVE-2022-50138", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50138" }, { "name": "CVE-2022-50139", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50139" }, { "name": "CVE-2022-50140", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50140" }, { "name": "CVE-2022-50141", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50141" }, { "name": "CVE-2022-50142", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50142" }, { "name": "CVE-2022-50143", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50143" }, { "name": "CVE-2022-50144", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50144" }, { "name": "CVE-2022-50145", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50145" }, { "name": "CVE-2022-50146", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50146" }, { "name": "CVE-2022-50149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50149" }, { "name": "CVE-2022-50151", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50151" }, { "name": "CVE-2022-50152", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50152" }, { "name": "CVE-2022-50153", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50153" }, { "name": "CVE-2022-50154", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50154" }, { "name": "CVE-2022-50155", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50155" }, { "name": "CVE-2022-50156", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50156" }, { "name": "CVE-2022-50157", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50157" }, { "name": "CVE-2022-50158", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50158" }, { "name": "CVE-2022-50160", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50160" }, { "name": "CVE-2022-50161", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50161" }, { "name": "CVE-2022-50162", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50162" }, { "name": "CVE-2022-50164", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50164" }, { "name": "CVE-2022-50165", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50165" }, { "name": "CVE-2022-50166", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50166" }, { "name": "CVE-2022-50169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50169" }, { "name": "CVE-2022-50171", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50171" }, { "name": "CVE-2022-50172", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50172" }, { "name": "CVE-2022-50173", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50173" }, { "name": "CVE-2022-50175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50175" }, { "name": "CVE-2022-50176", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50176" }, { "name": "CVE-2022-50178", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50178" }, { "name": "CVE-2022-50179", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50179" }, { "name": "CVE-2022-50181", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50181" }, { "name": "CVE-2022-50183", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50183" }, { "name": "CVE-2022-50184", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50184" }, { "name": "CVE-2022-50185", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50185" }, { "name": "CVE-2022-50186", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50186" }, { "name": "CVE-2022-50187", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50187" }, { "name": "CVE-2022-50188", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50188" }, { "name": "CVE-2022-50190", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50190" }, { "name": "CVE-2022-50191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50191" }, { "name": "CVE-2022-50192", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50192" }, { "name": "CVE-2022-50194", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50194" }, { "name": "CVE-2022-50196", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50196" }, { "name": "CVE-2022-50197", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50197" }, { "name": "CVE-2022-50198", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50198" }, { "name": "CVE-2022-50199", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50199" }, { "name": "CVE-2022-50200", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50200" }, { "name": "CVE-2022-50201", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50201" }, { "name": "CVE-2022-50202", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50202" }, { "name": "CVE-2022-50203", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50203" }, { "name": "CVE-2022-50204", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50204" }, { "name": "CVE-2022-50206", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50206" }, { "name": "CVE-2022-50207", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50207" }, { "name": "CVE-2022-50208", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50208" }, { "name": "CVE-2022-50209", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50209" }, { "name": "CVE-2022-50211", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50211" }, { "name": "CVE-2022-50212", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50212" }, { "name": "CVE-2022-50213", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50213" }, { "name": "CVE-2022-50215", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50215" }, { "name": "CVE-2022-50218", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50218" }, { "name": "CVE-2022-50220", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50220" }, { "name": "CVE-2022-50221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50221" }, { "name": "CVE-2022-50222", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50222" }, { "name": "CVE-2022-50226", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50226" }, { "name": "CVE-2022-50228", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50228" }, { "name": "CVE-2022-50229", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50229" }, { "name": "CVE-2022-50231", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50231" }, { "name": "CVE-2023-53046", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53046" }, { "name": "CVE-2023-53048", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53048" }, { "name": "CVE-2023-53076", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53076" }, { "name": "CVE-2023-53097", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53097" }, { "name": "CVE-2024-26762", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26762" }, { "name": "CVE-2024-57982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57982" }, { "name": "CVE-2024-57987", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57987" }, { "name": "CVE-2024-57988", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57988" }, { "name": "CVE-2024-57995", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57995" }, { "name": "CVE-2024-58004", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58004" }, { "name": "CVE-2024-58015", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58015" }, { "name": "CVE-2024-58053", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58053" }, { "name": "CVE-2024-58062", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58062" }, { "name": "CVE-2025-21713", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21713" }, { "name": "CVE-2025-21720", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21720" }, { "name": "CVE-2025-21770", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21770" }, { "name": "CVE-2025-21805", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21805" }, { "name": "CVE-2025-21824", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21824" }, { "name": "CVE-2025-21842", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21842" }, { "name": "CVE-2025-21849", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21849" }, { "name": "CVE-2025-21880", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21880" }, { "name": "CVE-2025-21901", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21901" }, { "name": "CVE-2025-21940", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21940" }, { "name": "CVE-2025-21987", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21987" }, { "name": "CVE-2025-37934", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37934" }, { "name": "CVE-2025-37946", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37946" }, { "name": "CVE-2025-37965", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37965" }, { "name": "CVE-2025-37973", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37973" }, { "name": "CVE-2025-37992", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992" }, { "name": "CVE-2025-37994", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994" }, { "name": "CVE-2025-37995", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995" }, { "name": "CVE-2025-38003", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38003" }, { "name": "CVE-2025-38004", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38004" }, { "name": "CVE-2025-38005", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005" }, { "name": "CVE-2025-38007", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38007" }, { "name": "CVE-2025-38009", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009" }, { "name": "CVE-2025-38010", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38010" }, { "name": "CVE-2025-38011", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38011" }, { "name": "CVE-2025-38013", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38013" }, { "name": "CVE-2025-38014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38014" }, { "name": "CVE-2025-38015", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38015" }, { "name": "CVE-2025-38018", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38018" }, { "name": "CVE-2025-38020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38020" }, { "name": "CVE-2025-38022", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38022" }, { "name": "CVE-2025-38023", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023" }, { "name": "CVE-2025-38024", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024" }, { "name": "CVE-2025-38027", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38027" }, { "name": "CVE-2025-38031", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38031" }, { "name": "CVE-2025-38040", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38040" }, { "name": "CVE-2025-38043", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38043" }, { "name": "CVE-2025-38044", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38044" }, { "name": "CVE-2025-38045", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38045" }, { "name": "CVE-2025-38053", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38053" }, { "name": "CVE-2025-38055", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38055" }, { "name": "CVE-2025-38057", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38057" }, { "name": "CVE-2025-38059", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38059" }, { "name": "CVE-2025-38060", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38060" }, { "name": "CVE-2025-38065", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38065" }, { "name": "CVE-2025-38068", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38068" }, { "name": "CVE-2025-38072", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38072" }, { "name": "CVE-2025-38077", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38077" }, { "name": "CVE-2025-38078", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38078" }, { "name": "CVE-2025-38079", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38079" }, { "name": "CVE-2025-38080", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38080" }, { "name": "CVE-2025-38081", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38081" }, { "name": "CVE-2025-38083", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083" }, { "name": "CVE-2022-21546", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21546" }, { "name": "CVE-2022-49622", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49622" }, { "name": "CVE-2022-49764", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49764" }, { "name": "CVE-2022-49780", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49780" }, { "name": "CVE-2022-49814", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49814" }, { "name": "CVE-2022-50091", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50091" }, { "name": "CVE-2023-53020", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53020" }, { "name": "CVE-2023-53063", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53063" }, { "name": "CVE-2023-53133", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53133" }, { "name": "CVE-2025-38061", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38061" } ], "initial_release_date": "2025-07-18T00:00:00", "last_revision_date": "2025-07-18T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0607", "revisions": [ { "description": "Version initiale", "revision_date": "2025-07-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE", "vendor_advisories": [ { "published_at": "2025-07-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02307-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502307-1" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02322-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502322-1" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02312-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502312-1" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02321-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502321-1" }, { "published_at": "2025-07-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02335-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502335-1" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02320-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502320-1" }, { "published_at": "2025-07-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02333-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502333-1" }, { "published_at": "2025-07-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02334-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502334-1" }, { "published_at": "2025-07-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02308-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502308-1" } ] }
ghsa-2j2m-cc64-3xh4
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser()
When the buffer length of the recvmsg system call is 0, we got the flollowing soft lockup problem:
watchdog: BUG: soft lockup - CPU#3 stuck for 27s! [a.out:6149] CPU: 3 PID: 6149 Comm: a.out Kdump: loaded Not tainted 6.2.0+ #30 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014 RIP: 0010:remove_wait_queue+0xb/0xc0 Code: 5e 41 5f c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 57 <41> 56 41 55 41 54 55 48 89 fd 53 48 89 f3 4c 8d 6b 18 4c 8d 73 20 RSP: 0018:ffff88811b5978b8 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffff88811a7d3780 RCX: ffffffffb7a4d768 RDX: dffffc0000000000 RSI: ffff88811b597908 RDI: ffff888115408040 RBP: 1ffff110236b2f1b R08: 0000000000000000 R09: ffff88811a7d37e7 R10: ffffed10234fa6fc R11: 0000000000000001 R12: ffff88811179b800 R13: 0000000000000001 R14: ffff88811a7d38a8 R15: ffff88811a7d37e0 FS: 00007f6fb5398740(0000) GS:ffff888237180000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000000 CR3: 000000010b6ba002 CR4: 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: tcp_msg_wait_data+0x279/0x2f0 tcp_bpf_recvmsg_parser+0x3c6/0x490 inet_recvmsg+0x280/0x290 sock_recvmsg+0xfc/0x120 _sysrecvmsg+0x160/0x3d0 _sys_recvmsg+0xf0/0x180 __sys_recvmsg+0xea/0x1a0 do_syscall_64+0x3f/0x90 entry_SYSCALL_64_after_hwframe+0x72/0xdc
The logic in tcp_bpf_recvmsg_parser is as follows:
msg_bytes_ready: copied = sk_msg_recvmsg(sk, psock, msg, len, flags); if (!copied) { wait data; goto msg_bytes_ready; }
In this case, "copied" always is 0, the infinite loop occurs.
According to the Linux system call man page, 0 should be returned in this case. Therefore, in tcp_bpf_recvmsg_parser(), if the length is 0, directly return. Also modify several other functions with the same problem.
{ "affected": [], "aliases": [ "CVE-2023-53133" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-05-02T16:15:32Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser()\n\nWhen the buffer length of the recvmsg system call is 0, we got the\nflollowing soft lockup problem:\n\nwatchdog: BUG: soft lockup - CPU#3 stuck for 27s! [a.out:6149]\nCPU: 3 PID: 6149 Comm: a.out Kdump: loaded Not tainted 6.2.0+ #30\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:remove_wait_queue+0xb/0xc0\nCode: 5e 41 5f c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 57 \u003c41\u003e 56 41 55 41 54 55 48 89 fd 53 48 89 f3 4c 8d 6b 18 4c 8d 73 20\nRSP: 0018:ffff88811b5978b8 EFLAGS: 00000246\nRAX: 0000000000000000 RBX: ffff88811a7d3780 RCX: ffffffffb7a4d768\nRDX: dffffc0000000000 RSI: ffff88811b597908 RDI: ffff888115408040\nRBP: 1ffff110236b2f1b R08: 0000000000000000 R09: ffff88811a7d37e7\nR10: ffffed10234fa6fc R11: 0000000000000001 R12: ffff88811179b800\nR13: 0000000000000001 R14: ffff88811a7d38a8 R15: ffff88811a7d37e0\nFS: 00007f6fb5398740(0000) GS:ffff888237180000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000000 CR3: 000000010b6ba002 CR4: 0000000000370ee0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n tcp_msg_wait_data+0x279/0x2f0\n tcp_bpf_recvmsg_parser+0x3c6/0x490\n inet_recvmsg+0x280/0x290\n sock_recvmsg+0xfc/0x120\n ____sys_recvmsg+0x160/0x3d0\n ___sys_recvmsg+0xf0/0x180\n __sys_recvmsg+0xea/0x1a0\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nThe logic in tcp_bpf_recvmsg_parser is as follows:\n\nmsg_bytes_ready:\n\tcopied = sk_msg_recvmsg(sk, psock, msg, len, flags);\n\tif (!copied) {\n\t\twait data;\n\t\tgoto msg_bytes_ready;\n\t}\n\nIn this case, \"copied\" always is 0, the infinite loop occurs.\n\nAccording to the Linux system call man page, 0 should be returned in this\ncase. Therefore, in tcp_bpf_recvmsg_parser(), if the length is 0, directly\nreturn. Also modify several other functions with the same problem.", "id": "GHSA-2j2m-cc64-3xh4", "modified": "2025-05-02T18:31:38Z", "published": "2025-05-02T18:31:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53133" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/4a476285f6d2921c3c9faa494eab83b78f78fc55" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/bf0579989de64d36e177c0611c685dc4a91457a7" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/d900f3d20cc3169ce42ec72acc850e662a4d4db2" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f45cf3ae3068e70e2c7f3e24a7f8e8aa99511f03" } ], "schema_version": "1.4.0", "severity": [] }
wid-sec-w-2025-0932
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff oder einen unspezifischen Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0932 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0932.json" }, { "category": "self", "summary": "WID-SEC-2025-0932 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0932" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53109", "url": "https://lore.kernel.org/linux-cve-announce/2025050227-CVE-2023-53109-1fbd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53111", "url": "https://lore.kernel.org/linux-cve-announce/2025050227-CVE-2023-53111-2257@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53112", "url": "https://lore.kernel.org/linux-cve-announce/2025050228-CVE-2023-53112-f86a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53113", "url": "https://lore.kernel.org/linux-cve-announce/2025050228-CVE-2023-53113-a3ff@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53114", "url": "https://lore.kernel.org/linux-cve-announce/2025050228-CVE-2023-53114-39ab@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53115", "url": "https://lore.kernel.org/linux-cve-announce/2025050229-CVE-2023-53115-0a1f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53116", "url": "https://lore.kernel.org/linux-cve-announce/2025050229-CVE-2023-53116-469c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53117", "url": "https://lore.kernel.org/linux-cve-announce/2025050229-CVE-2023-53117-09c9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53118", "url": "https://lore.kernel.org/linux-cve-announce/2025050230-CVE-2023-53118-8472@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53129", "url": "https://lore.kernel.org/linux-cve-announce/2025050234-CVE-2023-53129-038a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53130", "url": "https://lore.kernel.org/linux-cve-announce/2025050234-CVE-2023-53130-015e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53131", "url": "https://lore.kernel.org/linux-cve-announce/2025050234-CVE-2023-53131-b288@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53132", "url": "https://lore.kernel.org/linux-cve-announce/2025050235-CVE-2023-53132-2281@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53133", "url": "https://lore.kernel.org/linux-cve-announce/2025050235-CVE-2023-53133-89c0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53134", "url": "https://lore.kernel.org/linux-cve-announce/2025050235-CVE-2023-53134-68c9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53135", "url": "https://lore.kernel.org/linux-cve-announce/2025050236-CVE-2023-53135-3c65@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53136", "url": "https://lore.kernel.org/linux-cve-announce/2025050236-CVE-2023-53136-74ee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53137", "url": "https://lore.kernel.org/linux-cve-announce/2025050237-CVE-2023-53137-f8bc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53138", "url": "https://lore.kernel.org/linux-cve-announce/2025050237-CVE-2023-53138-0ff0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53139", "url": "https://lore.kernel.org/linux-cve-announce/2025050237-CVE-2023-53139-6557@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53140", "url": "https://lore.kernel.org/linux-cve-announce/2025050238-CVE-2023-53140-a5f2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53141", "url": "https://lore.kernel.org/linux-cve-announce/2025050238-CVE-2023-53141-e701@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53142", "url": "https://lore.kernel.org/linux-cve-announce/2025050238-CVE-2023-53142-4d74@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53143", "url": "https://lore.kernel.org/linux-cve-announce/2025050239-CVE-2023-53143-7a2c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53144", "url": "https://lore.kernel.org/linux-cve-announce/2025050239-CVE-2023-53144-2ad8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37797", "url": "https://lore.kernel.org/linux-cve-announce/2025050210-CVE-2025-37797-2aab@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37798", "url": "https://lore.kernel.org/linux-cve-announce/2025050212-CVE-2025-37798-1d06@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37799", "url": "https://lore.kernel.org/linux-cve-announce/2025050358-CVE-2025-37799-a1aa@gregkh/" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01918-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01965-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01966-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20408-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021550.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02000-1 vom 2025-06-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021568.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20419-1 vom 2025-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021591.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-076 vom 2025-06-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-076.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2892 vom 2025-06-24", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2892.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7594-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7594-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7594-2 vom 2025-06-26", "url": "https://ubuntu.com/security/notices/USN-7594-2" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-102 vom 2025-06-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-102.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02173-1 vom 2025-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021714.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2892 vom 2025-06-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2892.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7607-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-3 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7608-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7609-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7609-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-2 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7608-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01", "url": "https://ubuntu.com/security/notices/USN-7607-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7609-1 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7609-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7610-1 vom 2025-07-02", "url": "https://ubuntu.com/security/notices/USN-7610-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-1 vom 2025-07-01", "url": "https://ubuntu.com/security/notices/USN-7608-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-4 vom 2025-07-03", "url": "https://ubuntu.com/security/notices/USN-7608-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7609-3 vom 2025-07-04", "url": "https://ubuntu.com/security/notices/USN-7609-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10371 vom 2025-07-07", "url": "https://access.redhat.com/errata/RHSA-2025:10371" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10379 vom 2025-07-07", "url": "https://access.redhat.com/errata/RHSA-2025:10379" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-10371 vom 2025-07-08", "url": "https://linux.oracle.com/errata/ELSA-2025-10371.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7607-3" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-10379 vom 2025-07-08", "url": "https://linux.oracle.com/errata/ELSA-2025-10379.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10674 vom 2025-07-09", "url": "https://access.redhat.com/errata/RHSA-2025:10674" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7628-1 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7628-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7627-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08", "url": "https://ubuntu.com/security/notices/USN-7627-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7610-2 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7610-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7609-4 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7609-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-5 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7608-5" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7594-3 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7594-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02262-1 vom 2025-07-10", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B53IHD74IRNJDAOHBW4L7JGWNOM26XE7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-242 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-242.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-245 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-245.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-079 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-079.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2929 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2929.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2909 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2909.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-244 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-244.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-243 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-243.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-6 vom 2025-07-11", "url": "https://ubuntu.com/security/notices/USN-7608-6" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02308-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021805.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7610-3 vom 2025-07-15", "url": "https://ubuntu.com/security/notices/USN-7610-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02320-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02322-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021810.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20471 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20471.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7653-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7653-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7609-5 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7609-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25", "url": "https://ubuntu.com/security/notices/USN-7671-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11861 vom 2025-07-28", "url": "https://access.redhat.com/errata/RHSA-2025:11861" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11855 vom 2025-07-28", "url": "https://access.redhat.com/errata/RHSA-2025:11855" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02537-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021978.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11861 vom 2025-07-30", "url": "https://linux.oracle.com/errata/ELSA-2025-11861.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7671-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7682-1 vom 2025-07-30", "url": "https://ubuntu.com/security/notices/USN-7682-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7608-7 vom 2025-07-30", "url": "https://ubuntu.com/security/notices/USN-7608-7" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11855 vom 2025-07-30", "url": "https://linux.oracle.com/errata/ELSA-2025-11855.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7682-3 vom 2025-07-31", "url": "https://ubuntu.com/security/notices/USN-7682-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7682-4 vom 2025-08-01", "url": "https://ubuntu.com/security/notices/USN-7682-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02611-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CAY42JX32A3BASFZGJE6DQP2CXN2LUAW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02602-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022047.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02604-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022046.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02606-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022045.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02588-1 vom 2025-08-01", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQYPF6FAXKWBHQ4POBUPZVPW4L73XJR5/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02607-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOXFW6IMLHSFMN655UONMR2V76DWL7LG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02601-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022048.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02610-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRIUGMNHYH2DWCCLRZ5NFTLFBXQCRTE6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02608-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SMY25R62WPNQL2TYEAZTDCWAVFYQUQ2E/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02619-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWVUGRLCXJQB55343B5DGQRVGA6GMIQ6/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02618-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022014.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-086 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-086.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2955 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2955.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-100 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02673-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPKQ4BU54XGSANMAROPDJAEFKO2OEKKP/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02632-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6QW6TXS545RIQWDHD4QUITTGGA4K6MY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02627-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HNZG2UKJBSDT23RIH4WSPIP5XJJH7AQ/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02637-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON23RSVRQYIYWSN7KWZHAT23BQ2YH6EK/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02636-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CZW4BWHO76REHV7LNO6WHLF4JRL7WMEJ/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02676-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBQGO5F7GAWGWOOC2BA5DLBISXIOXMMS/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02648-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKXBRO2HUJQNRZTJLJHZC32ZUUQLD7RS/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02647-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LHOHSHBEJMHDNQVQMNHA7MC22TR34HJY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02638-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT3EVLQ3E46O7RVXSFVUBEM6JEJUWQI4/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04", "url": "https://ubuntu.com/security/notices/USN-7671-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02671-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2UYKOPOTPXFPAHZK3XT64P5TUTPP2DDO/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02687-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VW2HW4WHUKAUC34CIESGAAISQVOIIZS/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02652-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPV72PULRBVAYNVLOGDPAXEYAOLJPHYQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02693-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q562SYU3GEAQLUF7RIJSZKOPWTHBMXYI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02691-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HQYM2FGJQXM5CJJ3L6LDY723WGAYBFPL/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02689-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U2TRD6KWXEAIWY33DHM2QPZCBKLAECTA/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7685-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02688-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NCR2KWOE2L5E5ZMBPLRQ3ZRAPKHOJX5/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02710-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EF7HBZKJ7TRGPEOKPY66PCZKIYFKRU56/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02707-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXO3ZDMTCCPF5B4XOQY7TAQ5JY4T2NWP/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02697-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4DC3XA5ITEIHVOJ5XXILV3NMSJPM3PS2/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02708-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OIV3PQR5UOAFXL7SARDQRG7OSG5GJOE7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02704-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PAJM6DY43HWTMYM763Y57Q6KWBGTAHOM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02698-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TM2FOPKL26WFLLS5YFPKON7STKP3HL4I/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-101 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-101.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-087 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-087.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13633 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13633" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7682-5 vom 2025-08-12", "url": "https://ubuntu.com/security/notices/USN-7682-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13", "url": "https://ubuntu.com/security/notices/USN-7685-5" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13781 vom 2025-08-13", "url": "https://access.redhat.com/errata/RHSA-2025:13781" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13946 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:13946" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14054 vom 2025-08-19", "url": "https://access.redhat.com/errata/RHSA-2025:14054" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02858-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022197.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02844-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022194.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02848-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022193.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02850-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022203.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02852-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022201.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14094 vom 2025-08-19", "url": "https://access.redhat.com/errata/RHSA-2025:14094" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7701-1 vom 2025-08-19", "url": "https://ubuntu.com/security/notices/USN-7701-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7682-6 vom 2025-08-20", "url": "https://ubuntu.com/security/notices/USN-7682-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7701-2 vom 2025-08-20", "url": "https://ubuntu.com/security/notices/USN-7701-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7701-3 vom 2025-08-21", "url": "https://ubuntu.com/security/notices/USN-7701-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02942-1 vom 2025-08-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022247.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7711-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7712-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7719-1 vom 2025-08-26", "url": "https://ubuntu.com/security/notices/USN-7719-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20584-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022297.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20576-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022305.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20583-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022298.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20579-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022302.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20582-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022299.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20574-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022307.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20569-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022312.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20578-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022303.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20581-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022300.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20570-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022311.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20575-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20573-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022308.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20572-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022309.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20568-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022313.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20580-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022301.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20625-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022347.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20623-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022349.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20624-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022348.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20622-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022350.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20621-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022351.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20612-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022358.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20620-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022352.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20616-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022354.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20615-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022355.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20614-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022356.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20613-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022357.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20611-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022359.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20610-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022360.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7712-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03", "url": "https://ubuntu.com/security/notices/USN-7737-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15011 vom 2025-09-03", "url": "https://linux.oracle.com/errata/ELSA-2025-15011.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10", "url": "https://linux.oracle.com/errata/ELSA-2025-20553.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-09T22:00:00.000+00:00", "generator": { "date": "2025-09-10T05:06:17.337+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0932", "initial_release_date": "2025-05-04T22:00:00.000+00:00", "revision_history": [ { "date": "2025-05-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian und SUSE aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian und SUSE aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-19T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-06-24T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2025-06-26T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2025-07-01T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-03T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-06T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-07T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu, Oracle Linux, Red Hat und SUSE aufgenommen" }, { "date": "2025-07-09T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2025-07-13T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-27T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-03T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-08-10T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-11T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-17T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-18T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2025-08-19T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2025-08-20T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-21T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-26T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-27T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-28T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-31T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-03T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2025-09-09T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "50" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T043337", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-53109", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53109" }, { "cve": "CVE-2023-53111", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53111" }, { "cve": "CVE-2023-53112", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53112" }, { "cve": "CVE-2023-53113", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53113" }, { "cve": "CVE-2023-53114", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53114" }, { "cve": "CVE-2023-53115", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53115" }, { "cve": "CVE-2023-53116", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53116" }, { "cve": "CVE-2023-53117", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53117" }, { "cve": "CVE-2023-53118", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53118" }, { "cve": "CVE-2023-53126", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53126" }, { "cve": "CVE-2023-53129", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53129" }, { "cve": "CVE-2023-53130", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53130" }, { "cve": "CVE-2023-53131", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53131" }, { "cve": "CVE-2023-53132", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53132" }, { "cve": "CVE-2023-53133", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53133" }, { "cve": "CVE-2023-53134", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53134" }, { "cve": "CVE-2023-53135", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53135" }, { "cve": "CVE-2023-53136", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53136" }, { "cve": "CVE-2023-53137", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53137" }, { "cve": "CVE-2023-53138", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53138" }, { "cve": "CVE-2023-53139", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53139" }, { "cve": "CVE-2023-53140", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53140" }, { "cve": "CVE-2023-53141", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53141" }, { "cve": "CVE-2023-53142", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53142" }, { "cve": "CVE-2023-53143", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53143" }, { "cve": "CVE-2023-53144", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2023-53144" }, { "cve": "CVE-2025-23163", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2025-23163" }, { "cve": "CVE-2025-37766", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2025-37766" }, { "cve": "CVE-2025-37770", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2025-37770" }, { "cve": "CVE-2025-37797", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2025-37797" }, { "cve": "CVE-2025-37798", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2025-37798" }, { "cve": "CVE-2025-37799", "product_status": { "known_affected": [ "2951", "T002207", "T043337", "67646", "T000126", "398363", "T004914" ] }, "release_date": "2025-05-04T22:00:00.000+00:00", "title": "CVE-2025-37799" } ] }
fkie_cve-2023-53133
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/4a476285f6d2921c3c9faa494eab83b78f78fc55 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/bf0579989de64d36e177c0611c685dc4a91457a7 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d900f3d20cc3169ce42ec72acc850e662a4d4db2 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/f45cf3ae3068e70e2c7f3e24a7f8e8aa99511f03 |
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser()\n\nWhen the buffer length of the recvmsg system call is 0, we got the\nflollowing soft lockup problem:\n\nwatchdog: BUG: soft lockup - CPU#3 stuck for 27s! [a.out:6149]\nCPU: 3 PID: 6149 Comm: a.out Kdump: loaded Not tainted 6.2.0+ #30\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:remove_wait_queue+0xb/0xc0\nCode: 5e 41 5f c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 57 \u003c41\u003e 56 41 55 41 54 55 48 89 fd 53 48 89 f3 4c 8d 6b 18 4c 8d 73 20\nRSP: 0018:ffff88811b5978b8 EFLAGS: 00000246\nRAX: 0000000000000000 RBX: ffff88811a7d3780 RCX: ffffffffb7a4d768\nRDX: dffffc0000000000 RSI: ffff88811b597908 RDI: ffff888115408040\nRBP: 1ffff110236b2f1b R08: 0000000000000000 R09: ffff88811a7d37e7\nR10: ffffed10234fa6fc R11: 0000000000000001 R12: ffff88811179b800\nR13: 0000000000000001 R14: ffff88811a7d38a8 R15: ffff88811a7d37e0\nFS: 00007f6fb5398740(0000) GS:ffff888237180000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000000 CR3: 000000010b6ba002 CR4: 0000000000370ee0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n tcp_msg_wait_data+0x279/0x2f0\n tcp_bpf_recvmsg_parser+0x3c6/0x490\n inet_recvmsg+0x280/0x290\n sock_recvmsg+0xfc/0x120\n ____sys_recvmsg+0x160/0x3d0\n ___sys_recvmsg+0xf0/0x180\n __sys_recvmsg+0xea/0x1a0\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nThe logic in tcp_bpf_recvmsg_parser is as follows:\n\nmsg_bytes_ready:\n\tcopied = sk_msg_recvmsg(sk, psock, msg, len, flags);\n\tif (!copied) {\n\t\twait data;\n\t\tgoto msg_bytes_ready;\n\t}\n\nIn this case, \"copied\" always is 0, the infinite loop occurs.\n\nAccording to the Linux system call man page, 0 should be returned in this\ncase. Therefore, in tcp_bpf_recvmsg_parser(), if the length is 0, directly\nreturn. Also modify several other functions with the same problem." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, sockmap: corrige un error de bucle infinito cuando len es 0 en tcp_bpf_recvmsg_parser() Cuando la longitud del b\u00fafer de la llamada del sistema recvmsg es 0, tenemos el siguiente problema de bloqueo suave: watchdog: ERROR: bloqueo suave: \u00a1CPU n.\u00ba 3 bloqueada durante 27 s! [a.out:6149] CPU: 3 PID: 6149 Comm: a.out Kdump: cargado No contaminado 6.2.0+ #30 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014 RIP: 0010:remove_wait_queue+0xb/0xc0 C\u00f3digo: 5e 41 5f c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 57 \u0026lt;41\u0026gt; 56 41 55 41 54 55 48 89 fd 53 48 89 f3 4c 8d 6b 18 4c 8d 73 20 RSP: 0018:ffff88811b5978b8 EFLAGS: 00000246 RAX: 000000000000000 RBX: ffff88811a7d3780 RCX: ffffffffb7a4d768 RDX: dffffc0000000000 RSI: ffff88811b597908 RDI: ffff888115408040 RBP: 1ffff110236b2f1b R08: 000000000000000 R09: ffff88811a7d37e7 R10: ffffed10234fa6fc R11: 000000000000001 R12: ffff88811179b800 R13: 0000000000000001 R14: ffff88811a7d38a8 R15: ffff88811a7d37e0 FS: 00007f6fb5398740(0000) GS:ffff888237180000(0000) knlGS:000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 000000080050033 CR2: 0000000020000000 CR3: 0000000010b6ba002 CR4: 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Rastreo de llamadas: tcp_msg_wait_data+0x279/0x2f0 tcp_bpf_recvmsg_parser+0x3c6/0x490 inet_recvmsg+0x280/0x290 sock_recvmsg+0xfc/0x120 ____sys_recvmsg+0x160/0x3d0 ___sys_recvmsg+0xf0/0x180 __sys_recvmsg+0xea/0x1a0 do_syscall_64+0x3f/0x90 entry_SYSCALL_64_after_hwframe+0x72/0xdc The logic in tcp_bpf_recvmsg_parser is as follows: msg_bytes_ready: copied = sk_msg_recvmsg(sk, psock, msg, len, flags); if (!copied) { wait data; goto msg_bytes_ready; } En este caso, \"copiado\" siempre es 0, se produce el bucle infinito. Seg\u00fan la p\u00e1gina del manual de llamadas del sistema de Linux, en este caso se deber\u00eda devolver 0. Por lo tanto, en tcp_bpf_recvmsg_parser(), si la longitud es 0, se devuelve directamente. Modifique tambi\u00e9n otras funciones con el mismo problema." } ], "id": "CVE-2023-53133", "lastModified": "2025-05-05T20:54:19.760", "metrics": {}, "published": "2025-05-02T16:15:32.260", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/4a476285f6d2921c3c9faa494eab83b78f78fc55" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/bf0579989de64d36e177c0611c685dc4a91457a7" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/d900f3d20cc3169ce42ec72acc850e662a4d4db2" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/f45cf3ae3068e70e2c7f3e24a7f8e8aa99511f03" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.