Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53590 (GCVE-0-2023-53590)
Vulnerability from cvelistv5 – Published: 2025-10-04 15:44 – Updated: 2025-10-04 15:44
VLAI?
EPSS
Title
sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop
Summary
In the Linux kernel, the following vulnerability has been resolved:
sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop
With this refcnt added in sctp_stream_priorities, we don't need to
traverse all streams to check if the prio is used by other streams
when freeing one stream's prio in sctp_sched_prio_free_sid(). This
can avoid a nested loop (up to 65535 * 65535), which may cause a
stuck as Ying reported:
watchdog: BUG: soft lockup - CPU#23 stuck for 26s! [ksoftirqd/23:136]
Call Trace:
<TASK>
sctp_sched_prio_free_sid+0xab/0x100 [sctp]
sctp_stream_free_ext+0x64/0xa0 [sctp]
sctp_stream_free+0x31/0x50 [sctp]
sctp_association_free+0xa5/0x200 [sctp]
Note that it doesn't need to use refcount_t type for this counter,
as its accessing is always protected under the sock lock.
v1->v2:
- add a check in sctp_sched_prio_set to avoid the possible prio_head
refcnt overflow.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
a7555681e50bdebed2c40ff7404ee73c2e932993 , < cec326443f01283ef68ea00c06ea073b1835a562
(git)
Affected: 176ee6c673ccd118e9392fd2dbb165423bdb99ca , < 8ee401f89cdb10f39098c0656d695b2bc4052100 (git) Affected: 0dfb9a566327182387c90100ea54d8426cee8c67 , < bf5540cbd20e2dae2c81ab9b31deef41ef147d0a (git) Affected: 9ed7bfc79542119ac0a9e1ce8a2a5285e43433e9 , < 03c3a5584a0a29821e59b7834635ce823050caaa (git) Affected: 9ed7bfc79542119ac0a9e1ce8a2a5285e43433e9 , < 6d529928ea212127851a2df8c40d822237ca946b (git) Affected: 9ed7bfc79542119ac0a9e1ce8a2a5285e43433e9 , < 68ba44639537de6f91fe32783766322d41848127 (git) Affected: fa20f88271259d42ebe66f0a8c4c20199e888c99 (git) |
|||||||
|
|||||||||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"include/net/sctp/structs.h",
"net/sctp/stream_sched_prio.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "cec326443f01283ef68ea00c06ea073b1835a562",
"status": "affected",
"version": "a7555681e50bdebed2c40ff7404ee73c2e932993",
"versionType": "git"
},
{
"lessThan": "8ee401f89cdb10f39098c0656d695b2bc4052100",
"status": "affected",
"version": "176ee6c673ccd118e9392fd2dbb165423bdb99ca",
"versionType": "git"
},
{
"lessThan": "bf5540cbd20e2dae2c81ab9b31deef41ef147d0a",
"status": "affected",
"version": "0dfb9a566327182387c90100ea54d8426cee8c67",
"versionType": "git"
},
{
"lessThan": "03c3a5584a0a29821e59b7834635ce823050caaa",
"status": "affected",
"version": "9ed7bfc79542119ac0a9e1ce8a2a5285e43433e9",
"versionType": "git"
},
{
"lessThan": "6d529928ea212127851a2df8c40d822237ca946b",
"status": "affected",
"version": "9ed7bfc79542119ac0a9e1ce8a2a5285e43433e9",
"versionType": "git"
},
{
"lessThan": "68ba44639537de6f91fe32783766322d41848127",
"status": "affected",
"version": "9ed7bfc79542119ac0a9e1ce8a2a5285e43433e9",
"versionType": "git"
},
{
"status": "affected",
"version": "fa20f88271259d42ebe66f0a8c4c20199e888c99",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"include/net/sctp/structs.h",
"net/sctp/stream_sched_prio.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.1"
},
{
"lessThan": "6.1",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.235",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.173",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.100",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.18",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.2.*",
"status": "unaffected",
"version": "6.2.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.3",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.235",
"versionStartIncluding": "5.4.226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.173",
"versionStartIncluding": "5.10.158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.100",
"versionStartIncluding": "5.15.82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.18",
"versionStartIncluding": "6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.5",
"versionStartIncluding": "6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3",
"versionStartIncluding": "6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: add a refcnt in sctp_stream_priorities to avoid a nested loop\n\nWith this refcnt added in sctp_stream_priorities, we don\u0027t need to\ntraverse all streams to check if the prio is used by other streams\nwhen freeing one stream\u0027s prio in sctp_sched_prio_free_sid(). This\ncan avoid a nested loop (up to 65535 * 65535), which may cause a\nstuck as Ying reported:\n\n watchdog: BUG: soft lockup - CPU#23 stuck for 26s! [ksoftirqd/23:136]\n Call Trace:\n \u003cTASK\u003e\n sctp_sched_prio_free_sid+0xab/0x100 [sctp]\n sctp_stream_free_ext+0x64/0xa0 [sctp]\n sctp_stream_free+0x31/0x50 [sctp]\n sctp_association_free+0xa5/0x200 [sctp]\n\nNote that it doesn\u0027t need to use refcount_t type for this counter,\nas its accessing is always protected under the sock lock.\n\nv1-\u003ev2:\n - add a check in sctp_sched_prio_set to avoid the possible prio_head\n refcnt overflow."
}
],
"providerMetadata": {
"dateUpdated": "2025-10-04T15:44:04.733Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/cec326443f01283ef68ea00c06ea073b1835a562"
},
{
"url": "https://git.kernel.org/stable/c/8ee401f89cdb10f39098c0656d695b2bc4052100"
},
{
"url": "https://git.kernel.org/stable/c/bf5540cbd20e2dae2c81ab9b31deef41ef147d0a"
},
{
"url": "https://git.kernel.org/stable/c/03c3a5584a0a29821e59b7834635ce823050caaa"
},
{
"url": "https://git.kernel.org/stable/c/6d529928ea212127851a2df8c40d822237ca946b"
},
{
"url": "https://git.kernel.org/stable/c/68ba44639537de6f91fe32783766322d41848127"
}
],
"title": "sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-53590",
"datePublished": "2025-10-04T15:44:04.733Z",
"dateReserved": "2025-10-04T15:40:38.478Z",
"dateUpdated": "2025-10-04T15:44:04.733Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-53590\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-04T16:15:55.437\",\"lastModified\":\"2025-10-06T14:56:21.733\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nsctp: add a refcnt in sctp_stream_priorities to avoid a nested loop\\n\\nWith this refcnt added in sctp_stream_priorities, we don\u0027t need to\\ntraverse all streams to check if the prio is used by other streams\\nwhen freeing one stream\u0027s prio in sctp_sched_prio_free_sid(). This\\ncan avoid a nested loop (up to 65535 * 65535), which may cause a\\nstuck as Ying reported:\\n\\n watchdog: BUG: soft lockup - CPU#23 stuck for 26s! [ksoftirqd/23:136]\\n Call Trace:\\n \u003cTASK\u003e\\n sctp_sched_prio_free_sid+0xab/0x100 [sctp]\\n sctp_stream_free_ext+0x64/0xa0 [sctp]\\n sctp_stream_free+0x31/0x50 [sctp]\\n sctp_association_free+0xa5/0x200 [sctp]\\n\\nNote that it doesn\u0027t need to use refcount_t type for this counter,\\nas its accessing is always protected under the sock lock.\\n\\nv1-\u003ev2:\\n - add a check in sctp_sched_prio_set to avoid the possible prio_head\\n refcnt overflow.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/03c3a5584a0a29821e59b7834635ce823050caaa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/68ba44639537de6f91fe32783766322d41848127\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6d529928ea212127851a2df8c40d822237ca946b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8ee401f89cdb10f39098c0656d695b2bc4052100\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bf5540cbd20e2dae2c81ab9b31deef41ef147d0a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cec326443f01283ef68ea00c06ea073b1835a562\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
WID-SEC-W-2025-2194
Vulnerability from csaf_certbund - Published: 2025-10-05 22:00 - Updated: 2026-01-19 23:00Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um nicht näher spezifizierte Angriffe durchzuführen.
Betroffene Betriebssysteme
- Linux
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2194 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2194.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2194 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2194"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50470",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2022-50470-e56f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50471",
"url": "https://lore.kernel.org/linux-cve-announce/2025100436-CVE-2022-50471-a799@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50472",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50472-5d91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50473",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50473-a1fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50474",
"url": "https://lore.kernel.org/linux-cve-announce/2025100437-CVE-2022-50474-7639@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50475",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50475-b3ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50476",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50476-f1b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50477",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50477-1815@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50478",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50478-81f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50479",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50479-de1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50480",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50480-f296@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50481",
"url": "https://lore.kernel.org/linux-cve-announce/2025100439-CVE-2022-50481-3d22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50482",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50482-0291@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50483",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50483-b6b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50484",
"url": "https://lore.kernel.org/linux-cve-announce/2025100440-CVE-2022-50484-1a6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50485",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50485-9d4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50486",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50486-da3d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50487",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2022-50487-f5ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50488",
"url": "https://lore.kernel.org/linux-cve-announce/2025100413-CVE-2022-50488-32e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50489",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50489-9d88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50490",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50490-dcd3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50491",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2022-50491-7a8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50492",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50492-19b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50493",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50493-2b70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50494",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2022-50494-00a0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50495",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50495-fdee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50496",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50496-6e44@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50497",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50497-0aee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50498",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2022-50498-c9ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50499",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50499-9f94@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50500",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50500-787b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50501",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2022-50501-1b81@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50502",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2022-50502-c819@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50503",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2022-50503-6c75@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50504",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50504-d655@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50505",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50505-b427@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50506",
"url": "https://lore.kernel.org/linux-cve-announce/2025100422-CVE-2022-50506-1642@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50507",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2022-50507-9739@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50508",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2022-50508-dd1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53533",
"url": "https://lore.kernel.org/linux-cve-announce/2025100441-CVE-2023-53533-7fbb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53534",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53534-9260@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53535",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53535-c515@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53536",
"url": "https://lore.kernel.org/linux-cve-announce/2025100442-CVE-2023-53536-0e4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53537",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53537-7d50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53538",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53538-f39c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53539",
"url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53539-4411@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53540",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53540-8805@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53541",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53541-d961@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53542",
"url": "https://lore.kernel.org/linux-cve-announce/2025100444-CVE-2023-53542-fc74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53543",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53543-227c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53544",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53544-f48f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53545",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53545-8d50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53546",
"url": "https://lore.kernel.org/linux-cve-announce/2025100445-CVE-2023-53546-a432@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53547",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53547-38ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53548",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53548-8719@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53549",
"url": "https://lore.kernel.org/linux-cve-announce/2025100446-CVE-2023-53549-9c74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53550",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53550-bbac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53551",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53551-4afc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53552",
"url": "https://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53552-5ba9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53553",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53553-f661@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53554",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53554-3351@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53555",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53555-b949@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53556",
"url": "https://lore.kernel.org/linux-cve-announce/2025100448-CVE-2023-53556-db4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53557",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53557-e7ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53558",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53558-e6f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53559",
"url": "https://lore.kernel.org/linux-cve-announce/2025100449-CVE-2023-53559-c2f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53560",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53560-8248@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53561",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53561-75a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53562",
"url": "https://lore.kernel.org/linux-cve-announce/2025100450-CVE-2023-53562-a73f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53563",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53563-5cbe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53564",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53564-e874@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53565",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53565-a882@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53566",
"url": "https://lore.kernel.org/linux-cve-announce/2025100451-CVE-2023-53566-1c57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53567",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53567-dedf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53568",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53568-0020@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53569",
"url": "https://lore.kernel.org/linux-cve-announce/2025100452-CVE-2023-53569-181e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53570",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53570-3733@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53571",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53571-3269@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53572",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53572-ab85@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53573",
"url": "https://lore.kernel.org/linux-cve-announce/2025100453-CVE-2023-53573-a05d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53574",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53574-f72d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53575",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53575-2079@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53576",
"url": "https://lore.kernel.org/linux-cve-announce/2025100454-CVE-2023-53576-c5dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53577",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53577-96e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53578",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53578-7dbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53579",
"url": "https://lore.kernel.org/linux-cve-announce/2025100455-CVE-2023-53579-e030@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53580",
"url": "https://lore.kernel.org/linux-cve-announce/2025100423-CVE-2023-53580-7d16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53581",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53581-80fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53582",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53582-3ed8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53583",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53583-b831@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53584",
"url": "https://lore.kernel.org/linux-cve-announce/2025100424-CVE-2023-53584-2034@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53585",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53585-b855@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53586",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53586-67e1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53587",
"url": "https://lore.kernel.org/linux-cve-announce/2025100425-CVE-2023-53587-411f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53588",
"url": "https://lore.kernel.org/linux-cve-announce/2025100426-CVE-2023-53588-1220@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53589",
"url": "https://lore.kernel.org/linux-cve-announce/2025100426-CVE-2023-53589-22f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53590",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53590-9f1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53591",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53591-8496@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53592",
"url": "https://lore.kernel.org/linux-cve-announce/2025100427-CVE-2023-53592-3da6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53593",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53593-228d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53594",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53594-563f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53595",
"url": "https://lore.kernel.org/linux-cve-announce/2025100428-CVE-2023-53595-91fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53596",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53596-dbfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53597",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53597-e30c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53598",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53599",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53599-2a93@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53600",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53600-69ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53601",
"url": "https://lore.kernel.org/linux-cve-announce/2025100430-CVE-2023-53601-aabe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53602",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53602-2de6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53603",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53603-df40@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53604",
"url": "https://lore.kernel.org/linux-cve-announce/2025100431-CVE-2023-53604-31fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53605",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53605-a660@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53606",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53606-8c1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53607",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53607-9638@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53608",
"url": "https://lore.kernel.org/linux-cve-announce/2025100432-CVE-2023-53608-ccb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53609",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53609-1c39@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53610",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53610-3f0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53611",
"url": "https://lore.kernel.org/linux-cve-announce/2025100433-CVE-2023-53611-a508@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53612",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53612-b146@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53613",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53613-bba8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53614",
"url": "https://lore.kernel.org/linux-cve-announce/2025100434-CVE-2023-53614-bf24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53615",
"url": "https://lore.kernel.org/linux-cve-announce/2025100435-CVE-2023-53615-843c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53616",
"url": "https://lore.kernel.org/linux-cve-announce/2025100435-CVE-2023-53616-9379@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39929",
"url": "https://lore.kernel.org/linux-cve-announce/2025100414-CVE-2025-39929-4308@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39931",
"url": "https://lore.kernel.org/linux-cve-announce/2025100416-CVE-2025-39931-8ff7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39932",
"url": "https://lore.kernel.org/linux-cve-announce/2025100416-CVE-2025-39932-bdaf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39933",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39933-e224@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39934",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39934-4c48@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39935",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39935-3e6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39936",
"url": "https://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39936-840a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39937",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39937-c8f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39938",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39938-6508@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39939",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39939-7ec4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39940",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39940-6097@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39941",
"url": "https://lore.kernel.org/linux-cve-announce/2025100418-CVE-2025-39941-f256@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39942",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39942-0297@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39943",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39943-f5d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39944",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39944-0d67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39945",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39945-84d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39946",
"url": "https://lore.kernel.org/linux-cve-announce/2025100419-CVE-2025-39946-5f17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39947",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39947-6872@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39948",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39948-7074@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39949",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39949-d909@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39950",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39950-e7d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39951",
"url": "https://lore.kernel.org/linux-cve-announce/2025100420-CVE-2025-39951-24b1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39952",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2025-39952-e36c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39953",
"url": "https://lore.kernel.org/linux-cve-announce/2025100421-CVE-2025-39953-4ac6@gregkh/"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2025-056 vom 2025-10-16",
"url": "https://cloud.google.com/support/bulletins#gcp-2025-056"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-277 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-277.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-093 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-093.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-112 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-112.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-279 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-279.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-109 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-109.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-282 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-282.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-113 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-113.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-280 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-280.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3053 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3053.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-281 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-281.html"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2025-10-28",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#October_20_2025"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6053 vom 2025-11-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00219.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21463 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21463"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4111-1 vom 2025-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4135-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4139-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4149-1 vom 2025-11-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4188-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVPUJWNDCBFGM2O2EFX4S5QBPKDARVQ7/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4379 vom 2025-11-25",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20091-1 vom 2025-11-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVNKE6YBHUN7AVUHO7UZCJJGK4HYS62H/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21040-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21064-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21056-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21052-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023389.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21080-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21074-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4301-1 vom 2025-11-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLIMXFMWOGTFRJZEC4XPGIMNBCRKQ7IF/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21118 vom 2025-12-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-21118.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4320-1 vom 2025-12-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21463 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21463.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21931 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21931.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22801 vom 2025-12-08",
"url": "https://access.redhat.com/errata/RHSA-2025:22801"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22800 vom 2025-12-08",
"url": "https://access.redhat.com/errata/RHSA-2025:22800"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22801 vom 2025-12-09",
"url": "http://linux.oracle.com/errata/ELSA-2025-22801.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21180-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21147-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7921-1 vom 2025-12-10",
"url": "https://ubuntu.com/security/notices/USN-7921-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22800 vom 2025-12-13",
"url": "https://errata.build.resf.org/RLSA-2025:22800"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-December/019260.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28048 vom 2025-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-28048.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22801 vom 2025-12-13",
"url": "https://errata.build.resf.org/RLSA-2025:22801"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7934-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7934-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7936-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7936-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4393-1 vom 2025-12-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7255154 vom 2025-12-17",
"url": "https://www.ibm.com/support/pages/node/7255154"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4422-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4505-1 vom 2025-12-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3D5W2444LYTUJVXYGB63LTMU25GRLRJR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4515-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4517-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4516-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4521-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20021-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20012-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20015-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0090-1 vom 2026-01-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023732.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0107-1 vom 2026-01-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJE4AD3YG7YMRUG6STSQJA6AUB5UHH72/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0107-1 vom 2026-01-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023731.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0534 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0534"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0537 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0537"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0535 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0535"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0576 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0576"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20059-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20039-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0760 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0760"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0759 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0759"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0793 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0793"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0163-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0166-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-01-19T23:00:00.000+00:00",
"generator": {
"date": "2026-01-20T08:36:03.933+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2194",
"initial_release_date": "2025-10-05T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Google aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von openSUSE und Debian aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, Oracle Linux und Debian aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von IBM und SUSE aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "33"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Cloud Platform",
"product": {
"name": "Google Cloud Platform",
"product_id": "393401",
"product_identification_helper": {
"cpe": "cpe:/a:google:cloud_platform:-"
}
}
},
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF03",
"product_id": "T049499"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF03",
"product_id": "T049499-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if03"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "5.10.0-60.18.0.50.h602",
"product": {
"name": "Open Source Linux Kernel 5.10.0-60.18.0.50.h602",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50470",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50470"
},
{
"cve": "CVE-2022-50471",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50471"
},
{
"cve": "CVE-2022-50472",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50472"
},
{
"cve": "CVE-2022-50473",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50473"
},
{
"cve": "CVE-2022-50474",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50474"
},
{
"cve": "CVE-2022-50475",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50475"
},
{
"cve": "CVE-2022-50476",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50476"
},
{
"cve": "CVE-2022-50477",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50477"
},
{
"cve": "CVE-2022-50478",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50478"
},
{
"cve": "CVE-2022-50479",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50479"
},
{
"cve": "CVE-2022-50480",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50480"
},
{
"cve": "CVE-2022-50481",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50481"
},
{
"cve": "CVE-2022-50482",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50482"
},
{
"cve": "CVE-2022-50483",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50483"
},
{
"cve": "CVE-2022-50484",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50484"
},
{
"cve": "CVE-2022-50485",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50485"
},
{
"cve": "CVE-2022-50486",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50486"
},
{
"cve": "CVE-2022-50487",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50487"
},
{
"cve": "CVE-2022-50488",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50488"
},
{
"cve": "CVE-2022-50489",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50489"
},
{
"cve": "CVE-2022-50490",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50490"
},
{
"cve": "CVE-2022-50491",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50491"
},
{
"cve": "CVE-2022-50492",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50492"
},
{
"cve": "CVE-2022-50493",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50493"
},
{
"cve": "CVE-2022-50494",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50494"
},
{
"cve": "CVE-2022-50495",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50495"
},
{
"cve": "CVE-2022-50496",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50496"
},
{
"cve": "CVE-2022-50497",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50497"
},
{
"cve": "CVE-2022-50498",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50498"
},
{
"cve": "CVE-2022-50499",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50499"
},
{
"cve": "CVE-2022-50500",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50500"
},
{
"cve": "CVE-2022-50501",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50501"
},
{
"cve": "CVE-2022-50502",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50502"
},
{
"cve": "CVE-2022-50503",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50503"
},
{
"cve": "CVE-2022-50504",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50504"
},
{
"cve": "CVE-2022-50505",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50505"
},
{
"cve": "CVE-2022-50506",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50506"
},
{
"cve": "CVE-2022-50507",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50507"
},
{
"cve": "CVE-2022-50508",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2022-50508"
},
{
"cve": "CVE-2023-3773",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-3773"
},
{
"cve": "CVE-2023-53533",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53533"
},
{
"cve": "CVE-2023-53534",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53534"
},
{
"cve": "CVE-2023-53535",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53535"
},
{
"cve": "CVE-2023-53536",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53536"
},
{
"cve": "CVE-2023-53537",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53537"
},
{
"cve": "CVE-2023-53538",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53538"
},
{
"cve": "CVE-2023-53539",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53539"
},
{
"cve": "CVE-2023-53540",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53540"
},
{
"cve": "CVE-2023-53541",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53541"
},
{
"cve": "CVE-2023-53542",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53542"
},
{
"cve": "CVE-2023-53543",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53543"
},
{
"cve": "CVE-2023-53544",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53544"
},
{
"cve": "CVE-2023-53545",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53545"
},
{
"cve": "CVE-2023-53546",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53546"
},
{
"cve": "CVE-2023-53547",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53547"
},
{
"cve": "CVE-2023-53548",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53548"
},
{
"cve": "CVE-2023-53549",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53549"
},
{
"cve": "CVE-2023-53550",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53550"
},
{
"cve": "CVE-2023-53551",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53551"
},
{
"cve": "CVE-2023-53552",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53552"
},
{
"cve": "CVE-2023-53553",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53553"
},
{
"cve": "CVE-2023-53554",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53554"
},
{
"cve": "CVE-2023-53555",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53555"
},
{
"cve": "CVE-2023-53556",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53556"
},
{
"cve": "CVE-2023-53557",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53557"
},
{
"cve": "CVE-2023-53558",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53558"
},
{
"cve": "CVE-2023-53559",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53559"
},
{
"cve": "CVE-2023-53560",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53560"
},
{
"cve": "CVE-2023-53561",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53561"
},
{
"cve": "CVE-2023-53562",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53562"
},
{
"cve": "CVE-2023-53563",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53563"
},
{
"cve": "CVE-2023-53564",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53564"
},
{
"cve": "CVE-2023-53565",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53565"
},
{
"cve": "CVE-2023-53566",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53566"
},
{
"cve": "CVE-2023-53567",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53567"
},
{
"cve": "CVE-2023-53568",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53568"
},
{
"cve": "CVE-2023-53569",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53569"
},
{
"cve": "CVE-2023-53570",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53570"
},
{
"cve": "CVE-2023-53571",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53571"
},
{
"cve": "CVE-2023-53572",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53572"
},
{
"cve": "CVE-2023-53573",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53573"
},
{
"cve": "CVE-2023-53574",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53574"
},
{
"cve": "CVE-2023-53575",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53575"
},
{
"cve": "CVE-2023-53576",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53576"
},
{
"cve": "CVE-2023-53577",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53577"
},
{
"cve": "CVE-2023-53578",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53578"
},
{
"cve": "CVE-2023-53579",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53579"
},
{
"cve": "CVE-2023-53580",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53580"
},
{
"cve": "CVE-2023-53581",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53581"
},
{
"cve": "CVE-2023-53582",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53582"
},
{
"cve": "CVE-2023-53583",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53583"
},
{
"cve": "CVE-2023-53584",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53584"
},
{
"cve": "CVE-2023-53585",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53585"
},
{
"cve": "CVE-2023-53586",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53586"
},
{
"cve": "CVE-2023-53587",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53587"
},
{
"cve": "CVE-2023-53588",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53588"
},
{
"cve": "CVE-2023-53589",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53589"
},
{
"cve": "CVE-2023-53590",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53590"
},
{
"cve": "CVE-2023-53591",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53591"
},
{
"cve": "CVE-2023-53592",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53592"
},
{
"cve": "CVE-2023-53593",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53593"
},
{
"cve": "CVE-2023-53594",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53594"
},
{
"cve": "CVE-2023-53595",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53595"
},
{
"cve": "CVE-2023-53596",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53596"
},
{
"cve": "CVE-2023-53597",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53597"
},
{
"cve": "CVE-2023-53598",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53598"
},
{
"cve": "CVE-2023-53599",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53599"
},
{
"cve": "CVE-2023-53600",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53600"
},
{
"cve": "CVE-2023-53601",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53601"
},
{
"cve": "CVE-2023-53602",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53602"
},
{
"cve": "CVE-2023-53603",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53603"
},
{
"cve": "CVE-2023-53604",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53604"
},
{
"cve": "CVE-2023-53605",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53605"
},
{
"cve": "CVE-2023-53606",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53606"
},
{
"cve": "CVE-2023-53607",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53607"
},
{
"cve": "CVE-2023-53608",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53608"
},
{
"cve": "CVE-2023-53609",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53609"
},
{
"cve": "CVE-2023-53610",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53610"
},
{
"cve": "CVE-2023-53611",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53611"
},
{
"cve": "CVE-2023-53612",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53612"
},
{
"cve": "CVE-2023-53613",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53613"
},
{
"cve": "CVE-2023-53614",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53614"
},
{
"cve": "CVE-2023-53615",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53615"
},
{
"cve": "CVE-2023-53616",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2023-53616"
},
{
"cve": "CVE-2025-39929",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39929"
},
{
"cve": "CVE-2025-39931",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39931"
},
{
"cve": "CVE-2025-39932",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39932"
},
{
"cve": "CVE-2025-39933",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39933"
},
{
"cve": "CVE-2025-39934",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39934"
},
{
"cve": "CVE-2025-39935",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39935"
},
{
"cve": "CVE-2025-39936",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39936"
},
{
"cve": "CVE-2025-39937",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39937"
},
{
"cve": "CVE-2025-39938",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39938"
},
{
"cve": "CVE-2025-39939",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39939"
},
{
"cve": "CVE-2025-39940",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39940"
},
{
"cve": "CVE-2025-39941",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39941"
},
{
"cve": "CVE-2025-39942",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39942"
},
{
"cve": "CVE-2025-39943",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39943"
},
{
"cve": "CVE-2025-39944",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39945",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39945"
},
{
"cve": "CVE-2025-39946",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39946"
},
{
"cve": "CVE-2025-39947",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39947"
},
{
"cve": "CVE-2025-39948",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39948"
},
{
"cve": "CVE-2025-39949",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39949"
},
{
"cve": "CVE-2025-39950",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39950"
},
{
"cve": "CVE-2025-39951",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39951"
},
{
"cve": "CVE-2025-39952",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39952"
},
{
"cve": "CVE-2025-39953",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"T049499",
"398363",
"393401",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-10-05T22:00:00.000+00:00",
"title": "CVE-2025-39953"
}
]
}
GHSA-H343-797X-8CG9
Vulnerability from github – Published: 2025-10-04 18:31 – Updated: 2025-10-04 18:31
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop
With this refcnt added in sctp_stream_priorities, we don't need to traverse all streams to check if the prio is used by other streams when freeing one stream's prio in sctp_sched_prio_free_sid(). This can avoid a nested loop (up to 65535 * 65535), which may cause a stuck as Ying reported:
watchdog: BUG: soft lockup - CPU#23 stuck for 26s! [ksoftirqd/23:136]
Call Trace:
<TASK>
sctp_sched_prio_free_sid+0xab/0x100 [sctp]
sctp_stream_free_ext+0x64/0xa0 [sctp]
sctp_stream_free+0x31/0x50 [sctp]
sctp_association_free+0xa5/0x200 [sctp]
Note that it doesn't need to use refcount_t type for this counter, as its accessing is always protected under the sock lock.
v1->v2: - add a check in sctp_sched_prio_set to avoid the possible prio_head refcnt overflow.
{
"affected": [],
"aliases": [
"CVE-2023-53590"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-04T16:15:55Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: add a refcnt in sctp_stream_priorities to avoid a nested loop\n\nWith this refcnt added in sctp_stream_priorities, we don\u0027t need to\ntraverse all streams to check if the prio is used by other streams\nwhen freeing one stream\u0027s prio in sctp_sched_prio_free_sid(). This\ncan avoid a nested loop (up to 65535 * 65535), which may cause a\nstuck as Ying reported:\n\n watchdog: BUG: soft lockup - CPU#23 stuck for 26s! [ksoftirqd/23:136]\n Call Trace:\n \u003cTASK\u003e\n sctp_sched_prio_free_sid+0xab/0x100 [sctp]\n sctp_stream_free_ext+0x64/0xa0 [sctp]\n sctp_stream_free+0x31/0x50 [sctp]\n sctp_association_free+0xa5/0x200 [sctp]\n\nNote that it doesn\u0027t need to use refcount_t type for this counter,\nas its accessing is always protected under the sock lock.\n\nv1-\u003ev2:\n - add a check in sctp_sched_prio_set to avoid the possible prio_head\n refcnt overflow.",
"id": "GHSA-h343-797x-8cg9",
"modified": "2025-10-04T18:31:15Z",
"published": "2025-10-04T18:31:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53590"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/03c3a5584a0a29821e59b7834635ce823050caaa"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/68ba44639537de6f91fe32783766322d41848127"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/6d529928ea212127851a2df8c40d822237ca946b"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/8ee401f89cdb10f39098c0656d695b2bc4052100"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/bf5540cbd20e2dae2c81ab9b31deef41ef147d0a"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/cec326443f01283ef68ea00c06ea073b1835a562"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2023-53590
Vulnerability from fkie_nvd - Published: 2025-10-04 16:15 - Updated: 2025-10-06 14:56
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop
With this refcnt added in sctp_stream_priorities, we don't need to
traverse all streams to check if the prio is used by other streams
when freeing one stream's prio in sctp_sched_prio_free_sid(). This
can avoid a nested loop (up to 65535 * 65535), which may cause a
stuck as Ying reported:
watchdog: BUG: soft lockup - CPU#23 stuck for 26s! [ksoftirqd/23:136]
Call Trace:
<TASK>
sctp_sched_prio_free_sid+0xab/0x100 [sctp]
sctp_stream_free_ext+0x64/0xa0 [sctp]
sctp_stream_free+0x31/0x50 [sctp]
sctp_association_free+0xa5/0x200 [sctp]
Note that it doesn't need to use refcount_t type for this counter,
as its accessing is always protected under the sock lock.
v1->v2:
- add a check in sctp_sched_prio_set to avoid the possible prio_head
refcnt overflow.
References
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/03c3a5584a0a29821e59b7834635ce823050caaa | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/68ba44639537de6f91fe32783766322d41848127 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/6d529928ea212127851a2df8c40d822237ca946b | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/8ee401f89cdb10f39098c0656d695b2bc4052100 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/bf5540cbd20e2dae2c81ab9b31deef41ef147d0a | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/cec326443f01283ef68ea00c06ea073b1835a562 |
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: add a refcnt in sctp_stream_priorities to avoid a nested loop\n\nWith this refcnt added in sctp_stream_priorities, we don\u0027t need to\ntraverse all streams to check if the prio is used by other streams\nwhen freeing one stream\u0027s prio in sctp_sched_prio_free_sid(). This\ncan avoid a nested loop (up to 65535 * 65535), which may cause a\nstuck as Ying reported:\n\n watchdog: BUG: soft lockup - CPU#23 stuck for 26s! [ksoftirqd/23:136]\n Call Trace:\n \u003cTASK\u003e\n sctp_sched_prio_free_sid+0xab/0x100 [sctp]\n sctp_stream_free_ext+0x64/0xa0 [sctp]\n sctp_stream_free+0x31/0x50 [sctp]\n sctp_association_free+0xa5/0x200 [sctp]\n\nNote that it doesn\u0027t need to use refcount_t type for this counter,\nas its accessing is always protected under the sock lock.\n\nv1-\u003ev2:\n - add a check in sctp_sched_prio_set to avoid the possible prio_head\n refcnt overflow."
}
],
"id": "CVE-2023-53590",
"lastModified": "2025-10-06T14:56:21.733",
"metrics": {},
"published": "2025-10-04T16:15:55.437",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/03c3a5584a0a29821e59b7834635ce823050caaa"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/68ba44639537de6f91fe32783766322d41848127"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/6d529928ea212127851a2df8c40d822237ca946b"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/8ee401f89cdb10f39098c0656d695b2bc4052100"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/bf5540cbd20e2dae2c81ab9b31deef41ef147d0a"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/cec326443f01283ef68ea00c06ea073b1835a562"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…