Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-39953 (GCVE-0-2025-39953)
Vulnerability from cvelistv5
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Version: 334c3679ec4b2b113c35ebe37d2018b112dd5013 Version: 334c3679ec4b2b113c35ebe37d2018b112dd5013 Version: 334c3679ec4b2b113c35ebe37d2018b112dd5013 Version: 334c3679ec4b2b113c35ebe37d2018b112dd5013 Version: 334c3679ec4b2b113c35ebe37d2018b112dd5013 Version: 334c3679ec4b2b113c35ebe37d2018b112dd5013 Version: 334c3679ec4b2b113c35ebe37d2018b112dd5013 Version: 334c3679ec4b2b113c35ebe37d2018b112dd5013 |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"kernel/cgroup/cgroup.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "cabadd7fd15f97090f752fd22dd7f876a0dc3dc4",
"status": "affected",
"version": "334c3679ec4b2b113c35ebe37d2018b112dd5013",
"versionType": "git"
},
{
"lessThan": "a0c896bda7077aa5005473e2c5b3c27173313b4c",
"status": "affected",
"version": "334c3679ec4b2b113c35ebe37d2018b112dd5013",
"versionType": "git"
},
{
"lessThan": "f2795d1b92506e3adf52a298f7181032a1525e04",
"status": "affected",
"version": "334c3679ec4b2b113c35ebe37d2018b112dd5013",
"versionType": "git"
},
{
"lessThan": "993049c9b1355c78918344a6403427d53f9ee700",
"status": "affected",
"version": "334c3679ec4b2b113c35ebe37d2018b112dd5013",
"versionType": "git"
},
{
"lessThan": "4a1e3ec28e8062cd9f339aa6a942df9c5bcb6811",
"status": "affected",
"version": "334c3679ec4b2b113c35ebe37d2018b112dd5013",
"versionType": "git"
},
{
"lessThan": "ded4d207a3209a834b6831ceec7f39b934c74802",
"status": "affected",
"version": "334c3679ec4b2b113c35ebe37d2018b112dd5013",
"versionType": "git"
},
{
"lessThan": "05e0b03447cf215ec384210441b34b7a3b16e8b0",
"status": "affected",
"version": "334c3679ec4b2b113c35ebe37d2018b112dd5013",
"versionType": "git"
},
{
"lessThan": "79f919a89c9d06816dbdbbd168fa41d27411a7f9",
"status": "affected",
"version": "334c3679ec4b2b113c35ebe37d2018b112dd5013",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"kernel/cgroup/cgroup.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "4.6"
},
{
"lessThan": "4.6",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.300",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.245",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.194",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.154",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.108",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.49",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.16.*",
"status": "unaffected",
"version": "6.16.9",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.17",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.300",
"versionStartIncluding": "4.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.245",
"versionStartIncluding": "4.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.194",
"versionStartIncluding": "4.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.154",
"versionStartIncluding": "4.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.108",
"versionStartIncluding": "4.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.49",
"versionStartIncluding": "4.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.16.9",
"versionStartIncluding": "4.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.17",
"versionStartIncluding": "4.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: split cgroup_destroy_wq into 3 workqueues\n\nA hung task can occur during [1] LTP cgroup testing when repeatedly\nmounting/unmounting perf_event and net_prio controllers with\nsystemd.unified_cgroup_hierarchy=1. The hang manifests in\ncgroup_lock_and_drain_offline() during root destruction.\n\nRelated case:\ncgroup_fj_function_perf_event cgroup_fj_function.sh perf_event\ncgroup_fj_function_net_prio cgroup_fj_function.sh net_prio\n\nCall Trace:\n\tcgroup_lock_and_drain_offline+0x14c/0x1e8\n\tcgroup_destroy_root+0x3c/0x2c0\n\tcss_free_rwork_fn+0x248/0x338\n\tprocess_one_work+0x16c/0x3b8\n\tworker_thread+0x22c/0x3b0\n\tkthread+0xec/0x100\n\tret_from_fork+0x10/0x20\n\nRoot Cause:\n\nCPU0 CPU1\nmount perf_event umount net_prio\ncgroup1_get_tree cgroup_kill_sb\nrebind_subsystems // root destruction enqueues\n\t\t\t\t// cgroup_destroy_wq\n// kill all perf_event css\n // one perf_event css A is dying\n // css A offline enqueues cgroup_destroy_wq\n // root destruction will be executed first\n css_free_rwork_fn\n cgroup_destroy_root\n cgroup_lock_and_drain_offline\n // some perf descendants are dying\n // cgroup_destroy_wq max_active = 1\n // waiting for css A to die\n\nProblem scenario:\n1. CPU0 mounts perf_event (rebind_subsystems)\n2. CPU1 unmounts net_prio (cgroup_kill_sb), queuing root destruction work\n3. A dying perf_event CSS gets queued for offline after root destruction\n4. Root destruction waits for offline completion, but offline work is\n blocked behind root destruction in cgroup_destroy_wq (max_active=1)\n\nSolution:\nSplit cgroup_destroy_wq into three dedicated workqueues:\ncgroup_offline_wq \u2013 Handles CSS offline operations\ncgroup_release_wq \u2013 Manages resource release\ncgroup_free_wq \u2013 Performs final memory deallocation\n\nThis separation eliminates blocking in the CSS free path while waiting for\noffline operations to complete.\n\n[1] https://github.com/linux-test-project/ltp/blob/master/runtest/controllers"
}
],
"providerMetadata": {
"dateUpdated": "2025-10-04T07:37:08.557Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/cabadd7fd15f97090f752fd22dd7f876a0dc3dc4"
},
{
"url": "https://git.kernel.org/stable/c/a0c896bda7077aa5005473e2c5b3c27173313b4c"
},
{
"url": "https://git.kernel.org/stable/c/f2795d1b92506e3adf52a298f7181032a1525e04"
},
{
"url": "https://git.kernel.org/stable/c/993049c9b1355c78918344a6403427d53f9ee700"
},
{
"url": "https://git.kernel.org/stable/c/4a1e3ec28e8062cd9f339aa6a942df9c5bcb6811"
},
{
"url": "https://git.kernel.org/stable/c/ded4d207a3209a834b6831ceec7f39b934c74802"
},
{
"url": "https://git.kernel.org/stable/c/05e0b03447cf215ec384210441b34b7a3b16e8b0"
},
{
"url": "https://git.kernel.org/stable/c/79f919a89c9d06816dbdbbd168fa41d27411a7f9"
}
],
"title": "cgroup: split cgroup_destroy_wq into 3 workqueues",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-39953",
"datePublished": "2025-10-04T07:31:13.237Z",
"dateReserved": "2025-04-16T07:20:57.149Z",
"dateUpdated": "2025-10-04T07:37:08.557Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-39953\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-04T08:15:48.627\",\"lastModified\":\"2025-10-06T14:56:47.823\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncgroup: split cgroup_destroy_wq into 3 workqueues\\n\\nA hung task can occur during [1] LTP cgroup testing when repeatedly\\nmounting/unmounting perf_event and net_prio controllers with\\nsystemd.unified_cgroup_hierarchy=1. The hang manifests in\\ncgroup_lock_and_drain_offline() during root destruction.\\n\\nRelated case:\\ncgroup_fj_function_perf_event cgroup_fj_function.sh perf_event\\ncgroup_fj_function_net_prio cgroup_fj_function.sh net_prio\\n\\nCall Trace:\\n\\tcgroup_lock_and_drain_offline+0x14c/0x1e8\\n\\tcgroup_destroy_root+0x3c/0x2c0\\n\\tcss_free_rwork_fn+0x248/0x338\\n\\tprocess_one_work+0x16c/0x3b8\\n\\tworker_thread+0x22c/0x3b0\\n\\tkthread+0xec/0x100\\n\\tret_from_fork+0x10/0x20\\n\\nRoot Cause:\\n\\nCPU0 CPU1\\nmount perf_event umount net_prio\\ncgroup1_get_tree cgroup_kill_sb\\nrebind_subsystems // root destruction enqueues\\n\\t\\t\\t\\t// cgroup_destroy_wq\\n// kill all perf_event css\\n // one perf_event css A is dying\\n // css A offline enqueues cgroup_destroy_wq\\n // root destruction will be executed first\\n css_free_rwork_fn\\n cgroup_destroy_root\\n cgroup_lock_and_drain_offline\\n // some perf descendants are dying\\n // cgroup_destroy_wq max_active = 1\\n // waiting for css A to die\\n\\nProblem scenario:\\n1. CPU0 mounts perf_event (rebind_subsystems)\\n2. CPU1 unmounts net_prio (cgroup_kill_sb), queuing root destruction work\\n3. A dying perf_event CSS gets queued for offline after root destruction\\n4. Root destruction waits for offline completion, but offline work is\\n blocked behind root destruction in cgroup_destroy_wq (max_active=1)\\n\\nSolution:\\nSplit cgroup_destroy_wq into three dedicated workqueues:\\ncgroup_offline_wq \u2013 Handles CSS offline operations\\ncgroup_release_wq \u2013 Manages resource release\\ncgroup_free_wq \u2013 Performs final memory deallocation\\n\\nThis separation eliminates blocking in the CSS free path while waiting for\\noffline operations to complete.\\n\\n[1] https://github.com/linux-test-project/ltp/blob/master/runtest/controllers\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/05e0b03447cf215ec384210441b34b7a3b16e8b0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4a1e3ec28e8062cd9f339aa6a942df9c5bcb6811\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/79f919a89c9d06816dbdbbd168fa41d27411a7f9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/993049c9b1355c78918344a6403427d53f9ee700\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a0c896bda7077aa5005473e2c5b3c27173313b4c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cabadd7fd15f97090f752fd22dd7f876a0dc3dc4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ded4d207a3209a834b6831ceec7f39b934c74802\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f2795d1b92506e3adf52a298f7181032a1525e04\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
ghsa-vgcj-37hg-gm6g
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
cgroup: split cgroup_destroy_wq into 3 workqueues
A hung task can occur during [1] LTP cgroup testing when repeatedly mounting/unmounting perf_event and net_prio controllers with systemd.unified_cgroup_hierarchy=1. The hang manifests in cgroup_lock_and_drain_offline() during root destruction.
Related case: cgroup_fj_function_perf_event cgroup_fj_function.sh perf_event cgroup_fj_function_net_prio cgroup_fj_function.sh net_prio
Call Trace: cgroup_lock_and_drain_offline+0x14c/0x1e8 cgroup_destroy_root+0x3c/0x2c0 css_free_rwork_fn+0x248/0x338 process_one_work+0x16c/0x3b8 worker_thread+0x22c/0x3b0 kthread+0xec/0x100 ret_from_fork+0x10/0x20
Root Cause:
CPU0 CPU1 mount perf_event umount net_prio cgroup1_get_tree cgroup_kill_sb rebind_subsystems // root destruction enqueues // cgroup_destroy_wq // kill all perf_event css // one perf_event css A is dying // css A offline enqueues cgroup_destroy_wq // root destruction will be executed first css_free_rwork_fn cgroup_destroy_root cgroup_lock_and_drain_offline // some perf descendants are dying // cgroup_destroy_wq max_active = 1 // waiting for css A to die
Problem scenario: 1. CPU0 mounts perf_event (rebind_subsystems) 2. CPU1 unmounts net_prio (cgroup_kill_sb), queuing root destruction work 3. A dying perf_event CSS gets queued for offline after root destruction 4. Root destruction waits for offline completion, but offline work is blocked behind root destruction in cgroup_destroy_wq (max_active=1)
Solution: Split cgroup_destroy_wq into three dedicated workqueues: cgroup_offline_wq – Handles CSS offline operations cgroup_release_wq – Manages resource release cgroup_free_wq – Performs final memory deallocation
This separation eliminates blocking in the CSS free path while waiting for offline operations to complete.
[1] https://github.com/linux-test-project/ltp/blob/master/runtest/controllers
{
"affected": [],
"aliases": [
"CVE-2025-39953"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-04T08:15:48Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: split cgroup_destroy_wq into 3 workqueues\n\nA hung task can occur during [1] LTP cgroup testing when repeatedly\nmounting/unmounting perf_event and net_prio controllers with\nsystemd.unified_cgroup_hierarchy=1. The hang manifests in\ncgroup_lock_and_drain_offline() during root destruction.\n\nRelated case:\ncgroup_fj_function_perf_event cgroup_fj_function.sh perf_event\ncgroup_fj_function_net_prio cgroup_fj_function.sh net_prio\n\nCall Trace:\n\tcgroup_lock_and_drain_offline+0x14c/0x1e8\n\tcgroup_destroy_root+0x3c/0x2c0\n\tcss_free_rwork_fn+0x248/0x338\n\tprocess_one_work+0x16c/0x3b8\n\tworker_thread+0x22c/0x3b0\n\tkthread+0xec/0x100\n\tret_from_fork+0x10/0x20\n\nRoot Cause:\n\nCPU0 CPU1\nmount perf_event umount net_prio\ncgroup1_get_tree cgroup_kill_sb\nrebind_subsystems // root destruction enqueues\n\t\t\t\t// cgroup_destroy_wq\n// kill all perf_event css\n // one perf_event css A is dying\n // css A offline enqueues cgroup_destroy_wq\n // root destruction will be executed first\n css_free_rwork_fn\n cgroup_destroy_root\n cgroup_lock_and_drain_offline\n // some perf descendants are dying\n // cgroup_destroy_wq max_active = 1\n // waiting for css A to die\n\nProblem scenario:\n1. CPU0 mounts perf_event (rebind_subsystems)\n2. CPU1 unmounts net_prio (cgroup_kill_sb), queuing root destruction work\n3. A dying perf_event CSS gets queued for offline after root destruction\n4. Root destruction waits for offline completion, but offline work is\n blocked behind root destruction in cgroup_destroy_wq (max_active=1)\n\nSolution:\nSplit cgroup_destroy_wq into three dedicated workqueues:\ncgroup_offline_wq \u2013 Handles CSS offline operations\ncgroup_release_wq \u2013 Manages resource release\ncgroup_free_wq \u2013 Performs final memory deallocation\n\nThis separation eliminates blocking in the CSS free path while waiting for\noffline operations to complete.\n\n[1] https://github.com/linux-test-project/ltp/blob/master/runtest/controllers",
"id": "GHSA-vgcj-37hg-gm6g",
"modified": "2025-10-04T09:30:21Z",
"published": "2025-10-04T09:30:21Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-39953"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/05e0b03447cf215ec384210441b34b7a3b16e8b0"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/4a1e3ec28e8062cd9f339aa6a942df9c5bcb6811"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/79f919a89c9d06816dbdbbd168fa41d27411a7f9"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/993049c9b1355c78918344a6403427d53f9ee700"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a0c896bda7077aa5005473e2c5b3c27173313b4c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/cabadd7fd15f97090f752fd22dd7f876a0dc3dc4"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ded4d207a3209a834b6831ceec7f39b934c74802"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/f2795d1b92506e3adf52a298f7181032a1525e04"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTFR-2025-AVI-1010
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian bookworm versions ant\u00e9rieures \u00e0 6.1.158-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-40022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40022"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-11-14T00:00:00",
"last_revision_date": "2025-11-14T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1010",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-6053-1",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00219.html"
}
]
}
CERTFR-2025-AVI-0899
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 gdb 11.2-7 | ||
| Microsoft | N/A | cbl2 binutils 2.37-16 | ||
| Microsoft | N/A | cbl2 redis 6.2.20-1 | ||
| Microsoft | N/A | cbl2 redis 6.2.18-3 | ||
| Microsoft | N/A | azl3 python3 3.12.9-4 versions antérieures à 3.12.9-5 | ||
| Microsoft | N/A | cbl2 crash 8.0.1-4 | ||
| Microsoft | N/A | cbl2 binutils 2.37-17 | ||
| Microsoft | N/A | cbl2 pytorch 2.0.0-9 | ||
| Microsoft | N/A | azl3 kernel 6.6.96.2-2 | ||
| Microsoft | N/A | azl3 binutils 2.41-7 | ||
| Microsoft | N/A | cbl2 qt5-qtsvg 5.12.11-6 versions antérieures à 5.12.11-7 | ||
| Microsoft | N/A | cbl2 python3 3.9.19-14 | ||
| Microsoft | N/A | azl3 openssh 9.8p1-4 | ||
| Microsoft | N/A | cbl2 kernel 5.15.186.1-1 | ||
| Microsoft | N/A | cbl2 rubygem-elasticsearch 8.3.0-1 | ||
| Microsoft | N/A | azl3 kernel 6.6.104.2-1 | ||
| Microsoft | N/A | cbl2 python3 3.9.19-15 versions antérieures à 3.9.19-16 | ||
| Microsoft | N/A | cbl2 qemu 6.2.0-24 | ||
| Microsoft | N/A | azl3 qemu 8.2.0-19 | ||
| Microsoft | N/A | cbl2 gdb 11.2-6 | ||
| Microsoft | N/A | cbl2 openssh 8.9p1-8 versions antérieures à 8.9p1-9 | ||
| Microsoft | N/A | azl3 valkey 8.0.4-1 versions antérieures à 8.0.6-1 | ||
| Microsoft | N/A | azl3 rubygem-elasticsearch 8.9.0-1 | ||
| Microsoft | N/A | azl3 pytorch 2.2.2-7 | ||
| Microsoft | N/A | azl3 ruby 3.3.5-5 | ||
| Microsoft | N/A | cbl2 redis 6.2.18-3 versions antérieures à 6.2.20-1 | ||
| Microsoft | N/A | azl3 qtsvg 6.6.1-2 versions antérieures à 6.6.1-3 | ||
| Microsoft | N/A | azl3 valkey 8.0.4-1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 gdb 11.2-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 binutils 2.37-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 redis 6.2.20-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 redis 6.2.18-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python3 3.12.9-4 versions ant\u00e9rieures \u00e0 3.12.9-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 crash 8.0.1-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 binutils 2.37-17",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 pytorch 2.0.0-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.96.2-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 binutils 2.41-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 qt5-qtsvg 5.12.11-6 versions ant\u00e9rieures \u00e0 5.12.11-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python3 3.9.19-14",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 openssh 9.8p1-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kernel 5.15.186.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 rubygem-elasticsearch 8.3.0-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.104.2-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python3 3.9.19-15 versions ant\u00e9rieures \u00e0 3.9.19-16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 qemu 6.2.0-24",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 qemu 8.2.0-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 gdb 11.2-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 openssh 8.9p1-8 versions ant\u00e9rieures \u00e0 8.9p1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 valkey 8.0.4-1 versions ant\u00e9rieures \u00e0 8.0.6-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 rubygem-elasticsearch 8.9.0-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 pytorch 2.2.2-7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 ruby 3.3.5-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 redis 6.2.18-3 versions ant\u00e9rieures \u00e0 6.2.20-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 qtsvg 6.6.1-2 versions ant\u00e9rieures \u00e0 6.6.1-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 valkey 8.0.4-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-49844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49844"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46819"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46817"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-39981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39981"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-11495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-39965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39965"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2022-50502",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50502"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2025-11413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11413"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2025-37727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37727"
},
{
"name": "CVE-2025-10729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10729"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46818"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2020-8130",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8130"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
}
],
"initial_release_date": "2025-10-20T00:00:00",
"last_revision_date": "2025-10-20T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0899",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39967",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39967"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39940",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39940"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11412",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11412"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39994",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39994"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39947",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39947"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53687",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53687"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39931",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39931"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39942",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39942"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55551",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55551"
},
{
"published_at": "2025-10-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50502",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50502"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-42321",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-42321"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53195",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53195"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-39508",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39508"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53234",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53234"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39981",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39981"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-46818",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46818"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39998",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39998"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39972",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39972"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39953",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39953"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-49133",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49133"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39934",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39934"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39968",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39968"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39932",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39932"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49844",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49844"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-56709",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-56709"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39965",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39965"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39985",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39985"
},
{
"published_at": "2025-10-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11234",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11234"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39970",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39970"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39980",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39980"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39977",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39977"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39964",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39964"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39938",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39938"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11495",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11495"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-56641",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-56641"
},
{
"published_at": "2025-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2020-8130",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-8130"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-8291",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8291"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-21645",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21645"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39982",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39982"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39987",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39987"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-40989",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40989"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49568",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49568"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-37727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37727"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-49069",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49069"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-46817",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46817"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-46717",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-46717"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39961",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39961"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55552",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55552"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-41079",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-41079"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39969"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-40966",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-40966"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61985",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61985"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39949",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39949"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11414",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11414"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-46819",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46819"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39945",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39945"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61984",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61984"
},
{
"published_at": "2025-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-48816",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-48816"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39955",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39955"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39937",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39937"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55554",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55554"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-56592",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-56592"
},
{
"published_at": "2025-10-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-10729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10729"
},
{
"published_at": "2025-10-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11413",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11413"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39929",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39929"
},
{
"published_at": "2025-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-49124",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-49124"
},
{
"published_at": "2025-10-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39946",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39946"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39973",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39973"
},
{
"published_at": "2025-10-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-21629",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21629"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-53196",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-53196"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39990",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39990"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39971",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39971"
},
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-39957",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39957"
}
]
}
CERTFR-2025-AVI-1048
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 6.1.158-1~deb11u1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-40022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40022"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-11-28T00:00:00",
"last_revision_date": "2025-11-28T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2025-11-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4379-1",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
}
]
}
msrc_cve-2025-39953
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39953 cgroup: split cgroup_destroy_wq into 3 workqueues - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-39953.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "cgroup: split cgroup_destroy_wq into 3 workqueues",
"tracking": {
"current_release_date": "2025-10-05T01:03:03.000Z",
"generator": {
"date": "2025-10-22T22:49:11.231Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-39953",
"initial_release_date": "2025-10-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-10-05T01:03:03.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 kernel 6.6.96.2-2",
"product": {
"name": "azl3 kernel 6.6.96.2-2",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "azl3 kernel 6.6.104.2-4",
"product": {
"name": "azl3 kernel 6.6.104.2-4",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.96.2-2 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.104.2-4 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-39953",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17084-2",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39953 cgroup: split cgroup_destroy_wq into 3 workqueues - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-39953.json"
}
],
"title": "cgroup: split cgroup_destroy_wq into 3 workqueues"
}
]
}
wid-sec-w-2025-2194
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2194 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2194.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2194 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2194"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50470",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2022-50470-e56f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50471",
"url": "https://lore.kernel.org/linux-cve-announce/2025100436-CVE-2022-50471-a799@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50472",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50472-5d91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50473",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50473-a1fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50474",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50474-7639@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50475",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50475-b3ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50476",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50476-f1b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50477",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50477-1815@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50478",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50478-81f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50479",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50479-de1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50480",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50480-f296@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50481",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50481-3d22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50482",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50482-0291@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50483",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50483-b6b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50484",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50484-1a6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50485",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50485-9d4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50486",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50486-da3d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50487",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50487-f5ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50488",
"url": "https://lore.kernel.org/linux-cve-announce/2025100413-CVE-2022-50488-32e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50489",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50489-9d88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50490",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50490-dcd3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50491",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50491-7a8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50492",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50492-19b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50493",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50493-2b70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50494",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50494-00a0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50495",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50495-fdee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50496",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50496-6e44@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50497",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50497-0aee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50498",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50498-c9ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50499",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50499-9f94@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50500",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50500-787b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50501",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50501-1b81@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50502",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2022-50502-c819@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50503",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2022-50503-6c75@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50504",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50504-d655@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50505",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50505-b427@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50506",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50506-1642@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50507",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2022-50507-9739@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50508",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2022-50508-dd1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53533",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2023-53533-7fbb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53534",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53534-9260@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53535",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53535-c515@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53536",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53536-0e4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53537",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53537-7d50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53538",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53538-f39c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53539",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53539-4411@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53540",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53540-8805@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53541",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53541-d961@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53542",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53542-fc74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53543",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53543-227c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53544",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53544-f48f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53545",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53545-8d50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53546",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53546-a432@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53547",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53547-38ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53548",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53548-8719@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53549",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53549-9c74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53550",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53550-bbac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53551",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53551-4afc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53552",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53552-5ba9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53553",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53553-f661@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53554",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53554-3351@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53555",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53555-b949@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53556",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53556-db4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53557",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53557-e7ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53558",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53558-e6f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53559",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53559-c2f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53560",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53560-8248@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53561",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53561-75a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53562",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53562-a73f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53563",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53563-5cbe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53564",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53564-e874@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53565",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53565-a882@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53566",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53566-1c57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53567",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53567-dedf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53568",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53568-0020@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53569",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53569-181e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53570",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53570-3733@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53571",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53571-3269@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53572",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53572-ab85@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53573",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53573-a05d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53574",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53574-f72d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53575",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53575-2079@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53576",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53576-c5dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53577",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53577-96e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53578",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53578-7dbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53579",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53579-e030@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53580",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2023-53580-7d16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53581",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53581-80fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53582",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53582-3ed8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53583",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53583-b831@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53584",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53584-2034@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53585",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53585-b855@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53586",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53586-67e1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53587",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53587-411f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53588",
"url": "https://lore.kernel.org/linux-cve-announce/2025100426-CVE-2023-53588-1220@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53589",
"url": "https://lore.kernel.org/linux-cve-announce/2025100426-CVE-2023-53589-22f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53590",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53590-9f1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53591",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53591-8496@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53592",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53592-3da6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53593",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53593-228d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53594",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53594-563f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53595",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53595-91fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53596",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53596-dbfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53597",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53597-e30c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53598",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53599",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53599-2a93@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53600",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53600-69ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53601",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53601-aabe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53602",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53602-2de6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53603",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53603-df40@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53604",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53604-31fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53605",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53605-a660@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53606",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53606-8c1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53607",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53607-9638@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53608",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53608-ccb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53609",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53609-1c39@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53610",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53610-3f0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53611",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53611-a508@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53612",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53612-b146@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53613",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53613-bba8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53614",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53614-bf24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53615",
"url": "https://lore.kernel.org/linux-cve-announce/2025100435-CVE-2023-53615-843c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53616",
"url": "https://lore.kernel.org/linux-cve-announce/2025100435-CVE-2023-53616-9379@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39929",
"url": "https://lore.kernel.org/linux-cve-announce/2025100414-CVE-2025-39929-4308@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39931",
"url": "https://lore.kernel.org/linux-cve-announce/2025100416-CVE-2025-39931-8ff7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39932",
"url": "https://lore.kernel.org/linux-cve-announce/2025100416-CVE-2025-39932-bdaf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39933",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39933-e224@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39934",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39934-4c48@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39935",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39935-3e6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39936",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39936-840a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39937",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39937-c8f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39938",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39938-6508@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39939",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39939-7ec4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39940",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39940-6097@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39941",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39941-f256@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39942",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39942-0297@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39943",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39943-f5d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39944",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39944-0d67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39945",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39945-84d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39946",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39946-5f17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39947",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39947-6872@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39948",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39948-7074@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39949",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39949-d909@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39950",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39950-e7d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39951",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39951-24b1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39952",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2025-39952-e36c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39953",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2025-39953-4ac6@gregkh/"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2025-056 vom 2025-10-16",
"url": "https://cloud.google.com/support/bulletins#gcp-2025-056"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-277 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-277.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-093 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-093.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-112 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-112.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-279 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-279.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-109 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-109.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-282 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-282.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-113 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-113.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-280 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-280.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3053 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3053.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-281 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-281.html"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2025-10-28",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#October_20_2025"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6053 vom 2025-11-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00219.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21463 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21463"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4111-1 vom 2025-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4135-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4139-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4149-1 vom 2025-11-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4188-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVPUJWNDCBFGM2O2EFX4S5QBPKDARVQ7/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4379 vom 2025-11-25",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20091-1 vom 2025-11-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVNKE6YBHUN7AVUHO7UZCJJGK4HYS62H/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21040-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21064-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21056-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21052-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023389.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-27T23:00:00.000+00:00",
"generator": {
"date": "2025-11-28T06:34:27.323+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2194",
"initial_release_date": "2025-10-05T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Google aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von openSUSE und Debian aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "15"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Cloud Platform",
"product": {
"name": "Google Cloud Platform",
"product_id": "393401",
"product_identification_helper": {
"cpe": "cpe:/a:google:cloud_platform:-"
}
}
},
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "5.10.0-60.18.0.50.h602",
"product": {
"name": "Open Source Linux Kernel 5.10.0-60.18.0.50.h602",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50470",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50470"
},
{
"cve": "CVE-2022-50471",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50471"
},
{
"cve": "CVE-2022-50472",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50472"
},
{
"cve": "CVE-2022-50473",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50473"
},
{
"cve": "CVE-2022-50474",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50474"
},
{
"cve": "CVE-2022-50475",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50475"
},
{
"cve": "CVE-2022-50476",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50476"
},
{
"cve": "CVE-2022-50477",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50477"
},
{
"cve": "CVE-2022-50478",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50478"
},
{
"cve": "CVE-2022-50479",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50479"
},
{
"cve": "CVE-2022-50480",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50480"
},
{
"cve": "CVE-2022-50481",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50481"
},
{
"cve": "CVE-2022-50482",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50482"
},
{
"cve": "CVE-2022-50483",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50483"
},
{
"cve": "CVE-2022-50484",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50484"
},
{
"cve": "CVE-2022-50485",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50485"
},
{
"cve": "CVE-2022-50486",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50486"
},
{
"cve": "CVE-2022-50487",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50487"
},
{
"cve": "CVE-2022-50488",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50488"
},
{
"cve": "CVE-2022-50489",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50489"
},
{
"cve": "CVE-2022-50490",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50490"
},
{
"cve": "CVE-2022-50491",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50491"
},
{
"cve": "CVE-2022-50492",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50492"
},
{
"cve": "CVE-2022-50493",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50493"
},
{
"cve": "CVE-2022-50494",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50494"
},
{
"cve": "CVE-2022-50495",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50495"
},
{
"cve": "CVE-2022-50496",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50496"
},
{
"cve": "CVE-2022-50497",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50497"
},
{
"cve": "CVE-2022-50498",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50498"
},
{
"cve": "CVE-2022-50499",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50499"
},
{
"cve": "CVE-2022-50500",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50500"
},
{
"cve": "CVE-2022-50501",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50501"
},
{
"cve": "CVE-2022-50502",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50502"
},
{
"cve": "CVE-2022-50503",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50503"
},
{
"cve": "CVE-2022-50504",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50504"
},
{
"cve": "CVE-2022-50505",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50505"
},
{
"cve": "CVE-2022-50506",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50506"
},
{
"cve": "CVE-2022-50507",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50507"
},
{
"cve": "CVE-2022-50508",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50508"
},
{
"cve": "CVE-2023-3773",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-3773"
},
{
"cve": "CVE-2023-53533",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53533"
},
{
"cve": "CVE-2023-53534",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53534"
},
{
"cve": "CVE-2023-53535",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53535"
},
{
"cve": "CVE-2023-53536",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53536"
},
{
"cve": "CVE-2023-53537",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53537"
},
{
"cve": "CVE-2023-53538",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53538"
},
{
"cve": "CVE-2023-53539",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53539"
},
{
"cve": "CVE-2023-53540",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53540"
},
{
"cve": "CVE-2023-53541",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53541"
},
{
"cve": "CVE-2023-53542",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53542"
},
{
"cve": "CVE-2023-53543",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53543"
},
{
"cve": "CVE-2023-53544",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53544"
},
{
"cve": "CVE-2023-53545",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53545"
},
{
"cve": "CVE-2023-53546",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53546"
},
{
"cve": "CVE-2023-53547",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53547"
},
{
"cve": "CVE-2023-53548",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53548"
},
{
"cve": "CVE-2023-53549",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53549"
},
{
"cve": "CVE-2023-53550",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53550"
},
{
"cve": "CVE-2023-53551",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53551"
},
{
"cve": "CVE-2023-53552",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53552"
},
{
"cve": "CVE-2023-53553",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53553"
},
{
"cve": "CVE-2023-53554",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53554"
},
{
"cve": "CVE-2023-53555",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53555"
},
{
"cve": "CVE-2023-53556",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53556"
},
{
"cve": "CVE-2023-53557",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53557"
},
{
"cve": "CVE-2023-53558",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53558"
},
{
"cve": "CVE-2023-53559",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53559"
},
{
"cve": "CVE-2023-53560",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53560"
},
{
"cve": "CVE-2023-53561",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53561"
},
{
"cve": "CVE-2023-53562",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53562"
},
{
"cve": "CVE-2023-53563",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53563"
},
{
"cve": "CVE-2023-53564",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53564"
},
{
"cve": "CVE-2023-53565",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53565"
},
{
"cve": "CVE-2023-53566",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53566"
},
{
"cve": "CVE-2023-53567",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53567"
},
{
"cve": "CVE-2023-53568",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53568"
},
{
"cve": "CVE-2023-53569",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53569"
},
{
"cve": "CVE-2023-53570",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53570"
},
{
"cve": "CVE-2023-53571",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53571"
},
{
"cve": "CVE-2023-53572",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53572"
},
{
"cve": "CVE-2023-53573",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53573"
},
{
"cve": "CVE-2023-53574",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53574"
},
{
"cve": "CVE-2023-53575",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53575"
},
{
"cve": "CVE-2023-53576",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53576"
},
{
"cve": "CVE-2023-53577",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53577"
},
{
"cve": "CVE-2023-53578",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53578"
},
{
"cve": "CVE-2023-53579",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53579"
},
{
"cve": "CVE-2023-53580",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53580"
},
{
"cve": "CVE-2023-53581",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53581"
},
{
"cve": "CVE-2023-53582",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53582"
},
{
"cve": "CVE-2023-53583",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53583"
},
{
"cve": "CVE-2023-53584",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53584"
},
{
"cve": "CVE-2023-53585",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53585"
},
{
"cve": "CVE-2023-53586",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53586"
},
{
"cve": "CVE-2023-53587",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53587"
},
{
"cve": "CVE-2023-53588",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53588"
},
{
"cve": "CVE-2023-53589",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53589"
},
{
"cve": "CVE-2023-53590",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53590"
},
{
"cve": "CVE-2023-53591",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53591"
},
{
"cve": "CVE-2023-53592",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53592"
},
{
"cve": "CVE-2023-53593",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53593"
},
{
"cve": "CVE-2023-53594",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53594"
},
{
"cve": "CVE-2023-53595",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53595"
},
{
"cve": "CVE-2023-53596",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53596"
},
{
"cve": "CVE-2023-53597",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53597"
},
{
"cve": "CVE-2023-53598",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53598"
},
{
"cve": "CVE-2023-53599",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53599"
},
{
"cve": "CVE-2023-53600",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53600"
},
{
"cve": "CVE-2023-53601",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53601"
},
{
"cve": "CVE-2023-53602",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53602"
},
{
"cve": "CVE-2023-53603",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53603"
},
{
"cve": "CVE-2023-53604",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53604"
},
{
"cve": "CVE-2023-53605",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53605"
},
{
"cve": "CVE-2023-53606",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53606"
},
{
"cve": "CVE-2023-53607",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53607"
},
{
"cve": "CVE-2023-53608",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53608"
},
{
"cve": "CVE-2023-53609",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53609"
},
{
"cve": "CVE-2023-53610",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53610"
},
{
"cve": "CVE-2023-53611",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53611"
},
{
"cve": "CVE-2023-53612",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53612"
},
{
"cve": "CVE-2023-53613",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53613"
},
{
"cve": "CVE-2023-53614",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53614"
},
{
"cve": "CVE-2023-53615",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53615"
},
{
"cve": "CVE-2023-53616",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53616"
},
{
"cve": "CVE-2025-39929",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39929"
},
{
"cve": "CVE-2025-39931",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39931"
},
{
"cve": "CVE-2025-39932",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39932"
},
{
"cve": "CVE-2025-39933",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39933"
},
{
"cve": "CVE-2025-39934",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39934"
},
{
"cve": "CVE-2025-39935",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39935"
},
{
"cve": "CVE-2025-39936",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39936"
},
{
"cve": "CVE-2025-39937",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39937"
},
{
"cve": "CVE-2025-39938",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39938"
},
{
"cve": "CVE-2025-39939",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39939"
},
{
"cve": "CVE-2025-39940",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39940"
},
{
"cve": "CVE-2025-39941",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39941"
},
{
"cve": "CVE-2025-39942",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39942"
},
{
"cve": "CVE-2025-39943",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39943"
},
{
"cve": "CVE-2025-39944",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39945",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39945"
},
{
"cve": "CVE-2025-39946",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39946"
},
{
"cve": "CVE-2025-39947",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39947"
},
{
"cve": "CVE-2025-39948",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39948"
},
{
"cve": "CVE-2025-39949",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39949"
},
{
"cve": "CVE-2025-39950",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39950"
},
{
"cve": "CVE-2025-39951",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39951"
},
{
"cve": "CVE-2025-39952",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39952"
},
{
"cve": "CVE-2025-39953",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"393401",
"T004914",
"1607324"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39953"
}
]
}
fkie_cve-2025-39953
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/05e0b03447cf215ec384210441b34b7a3b16e8b0 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/4a1e3ec28e8062cd9f339aa6a942df9c5bcb6811 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/79f919a89c9d06816dbdbbd168fa41d27411a7f9 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/993049c9b1355c78918344a6403427d53f9ee700 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/a0c896bda7077aa5005473e2c5b3c27173313b4c | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/cabadd7fd15f97090f752fd22dd7f876a0dc3dc4 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/ded4d207a3209a834b6831ceec7f39b934c74802 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/f2795d1b92506e3adf52a298f7181032a1525e04 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: split cgroup_destroy_wq into 3 workqueues\n\nA hung task can occur during [1] LTP cgroup testing when repeatedly\nmounting/unmounting perf_event and net_prio controllers with\nsystemd.unified_cgroup_hierarchy=1. The hang manifests in\ncgroup_lock_and_drain_offline() during root destruction.\n\nRelated case:\ncgroup_fj_function_perf_event cgroup_fj_function.sh perf_event\ncgroup_fj_function_net_prio cgroup_fj_function.sh net_prio\n\nCall Trace:\n\tcgroup_lock_and_drain_offline+0x14c/0x1e8\n\tcgroup_destroy_root+0x3c/0x2c0\n\tcss_free_rwork_fn+0x248/0x338\n\tprocess_one_work+0x16c/0x3b8\n\tworker_thread+0x22c/0x3b0\n\tkthread+0xec/0x100\n\tret_from_fork+0x10/0x20\n\nRoot Cause:\n\nCPU0 CPU1\nmount perf_event umount net_prio\ncgroup1_get_tree cgroup_kill_sb\nrebind_subsystems // root destruction enqueues\n\t\t\t\t// cgroup_destroy_wq\n// kill all perf_event css\n // one perf_event css A is dying\n // css A offline enqueues cgroup_destroy_wq\n // root destruction will be executed first\n css_free_rwork_fn\n cgroup_destroy_root\n cgroup_lock_and_drain_offline\n // some perf descendants are dying\n // cgroup_destroy_wq max_active = 1\n // waiting for css A to die\n\nProblem scenario:\n1. CPU0 mounts perf_event (rebind_subsystems)\n2. CPU1 unmounts net_prio (cgroup_kill_sb), queuing root destruction work\n3. A dying perf_event CSS gets queued for offline after root destruction\n4. Root destruction waits for offline completion, but offline work is\n blocked behind root destruction in cgroup_destroy_wq (max_active=1)\n\nSolution:\nSplit cgroup_destroy_wq into three dedicated workqueues:\ncgroup_offline_wq \u2013 Handles CSS offline operations\ncgroup_release_wq \u2013 Manages resource release\ncgroup_free_wq \u2013 Performs final memory deallocation\n\nThis separation eliminates blocking in the CSS free path while waiting for\noffline operations to complete.\n\n[1] https://github.com/linux-test-project/ltp/blob/master/runtest/controllers"
}
],
"id": "CVE-2025-39953",
"lastModified": "2025-10-06T14:56:47.823",
"metrics": {},
"published": "2025-10-04T08:15:48.627",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/05e0b03447cf215ec384210441b34b7a3b16e8b0"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/4a1e3ec28e8062cd9f339aa6a942df9c5bcb6811"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/79f919a89c9d06816dbdbbd168fa41d27411a7f9"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/993049c9b1355c78918344a6403427d53f9ee700"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/a0c896bda7077aa5005473e2c5b3c27173313b4c"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/cabadd7fd15f97090f752fd22dd7f876a0dc3dc4"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/ded4d207a3209a834b6831ceec7f39b934c74802"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/f2795d1b92506e3adf52a298f7181032a1525e04"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.