Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-50620 (GCVE-0-2022-50620)
Vulnerability from cvelistv5 – Published: 2025-12-08 01:16 – Updated: 2025-12-08 01:16| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
4d67490498acb4ffcef5ba7bc44990d46e66a44c , < 865bb7b5a7deeb0e5afbd82381d52d38825dc64d
(git)
Affected: 4d67490498acb4ffcef5ba7bc44990d46e66a44c , < a3e517a6ba695d683ee63615e1ea6e6b4c7d2732 (git) Affected: 4d67490498acb4ffcef5ba7bc44990d46e66a44c , < ae6c960a82c52c3bda5adc82d90643d6c12d308e (git) Affected: 4d67490498acb4ffcef5ba7bc44990d46e66a44c , < 91586ce0d39a05f88795aa8814fb99b1387236b3 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/f2fs/segment.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "865bb7b5a7deeb0e5afbd82381d52d38825dc64d",
"status": "affected",
"version": "4d67490498acb4ffcef5ba7bc44990d46e66a44c",
"versionType": "git"
},
{
"lessThan": "a3e517a6ba695d683ee63615e1ea6e6b4c7d2732",
"status": "affected",
"version": "4d67490498acb4ffcef5ba7bc44990d46e66a44c",
"versionType": "git"
},
{
"lessThan": "ae6c960a82c52c3bda5adc82d90643d6c12d308e",
"status": "affected",
"version": "4d67490498acb4ffcef5ba7bc44990d46e66a44c",
"versionType": "git"
},
{
"lessThan": "91586ce0d39a05f88795aa8814fb99b1387236b3",
"status": "affected",
"version": "4d67490498acb4ffcef5ba7bc44990d46e66a44c",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/f2fs/segment.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.15"
},
{
"lessThan": "5.15",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.86",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.0.*",
"status": "unaffected",
"version": "6.0.16",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.2",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.86",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.16",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.2",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"versionStartIncluding": "5.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to invalidate dcc-\u003ef2fs_issue_discard in error path\n\nSyzbot reports a NULL pointer dereference issue as below:\n\n __refcount_add include/linux/refcount.h:193 [inline]\n __refcount_inc include/linux/refcount.h:250 [inline]\n refcount_inc include/linux/refcount.h:267 [inline]\n get_task_struct include/linux/sched/task.h:110 [inline]\n kthread_stop+0x34/0x1c0 kernel/kthread.c:703\n f2fs_stop_discard_thread+0x3c/0x5c fs/f2fs/segment.c:1638\n kill_f2fs_super+0x5c/0x194 fs/f2fs/super.c:4522\n deactivate_locked_super+0x70/0xe8 fs/super.c:332\n deactivate_super+0xd0/0xd4 fs/super.c:363\n cleanup_mnt+0x1f8/0x234 fs/namespace.c:1186\n __cleanup_mnt+0x20/0x30 fs/namespace.c:1193\n task_work_run+0xc4/0x14c kernel/task_work.c:177\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0x26c/0xbe0 kernel/exit.c:795\n do_group_exit+0x60/0xe8 kernel/exit.c:925\n __do_sys_exit_group kernel/exit.c:936 [inline]\n __se_sys_exit_group kernel/exit.c:934 [inline]\n __wake_up_parent+0x0/0x40 kernel/exit.c:934\n __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]\n invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]\n el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142\n do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206\n el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636\n el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654\n el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581\n\nThe root cause of this issue is in error path of f2fs_start_discard_thread(),\nit missed to invalidate dcc-\u003ef2fs_issue_discard, later kthread_stop() may\naccess invalid pointer."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-08T01:16:33.771Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/865bb7b5a7deeb0e5afbd82381d52d38825dc64d"
},
{
"url": "https://git.kernel.org/stable/c/a3e517a6ba695d683ee63615e1ea6e6b4c7d2732"
},
{
"url": "https://git.kernel.org/stable/c/ae6c960a82c52c3bda5adc82d90643d6c12d308e"
},
{
"url": "https://git.kernel.org/stable/c/91586ce0d39a05f88795aa8814fb99b1387236b3"
}
],
"title": "f2fs: fix to invalidate dcc-\u003ef2fs_issue_discard in error path",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2022-50620",
"datePublished": "2025-12-08T01:16:33.771Z",
"dateReserved": "2025-12-08T01:14:55.189Z",
"dateUpdated": "2025-12-08T01:16:33.771Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-50620\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-08T02:15:47.870\",\"lastModified\":\"2025-12-08T18:26:19.900\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: fix to invalidate dcc-\u003ef2fs_issue_discard in error path\\n\\nSyzbot reports a NULL pointer dereference issue as below:\\n\\n __refcount_add include/linux/refcount.h:193 [inline]\\n __refcount_inc include/linux/refcount.h:250 [inline]\\n refcount_inc include/linux/refcount.h:267 [inline]\\n get_task_struct include/linux/sched/task.h:110 [inline]\\n kthread_stop+0x34/0x1c0 kernel/kthread.c:703\\n f2fs_stop_discard_thread+0x3c/0x5c fs/f2fs/segment.c:1638\\n kill_f2fs_super+0x5c/0x194 fs/f2fs/super.c:4522\\n deactivate_locked_super+0x70/0xe8 fs/super.c:332\\n deactivate_super+0xd0/0xd4 fs/super.c:363\\n cleanup_mnt+0x1f8/0x234 fs/namespace.c:1186\\n __cleanup_mnt+0x20/0x30 fs/namespace.c:1193\\n task_work_run+0xc4/0x14c kernel/task_work.c:177\\n exit_task_work include/linux/task_work.h:38 [inline]\\n do_exit+0x26c/0xbe0 kernel/exit.c:795\\n do_group_exit+0x60/0xe8 kernel/exit.c:925\\n __do_sys_exit_group kernel/exit.c:936 [inline]\\n __se_sys_exit_group kernel/exit.c:934 [inline]\\n __wake_up_parent+0x0/0x40 kernel/exit.c:934\\n __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]\\n invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]\\n el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142\\n do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206\\n el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636\\n el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654\\n el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581\\n\\nThe root cause of this issue is in error path of f2fs_start_discard_thread(),\\nit missed to invalidate dcc-\u003ef2fs_issue_discard, later kthread_stop() may\\naccess invalid pointer.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/865bb7b5a7deeb0e5afbd82381d52d38825dc64d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/91586ce0d39a05f88795aa8814fb99b1387236b3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a3e517a6ba695d683ee63615e1ea6e6b4c7d2732\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ae6c960a82c52c3bda5adc82d90643d6c12d308e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
WID-SEC-W-2025-2756
Vulnerability from csaf_certbund - Published: 2025-12-07 23:00 - Updated: 2026-03-02 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder weitere, nicht spezifizierte Auswirkungen zu erlangen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2756 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2756.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2756 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2756"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50583",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2022-50583-a25a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50614",
"url": "https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50614-cc88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50615",
"url": "https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50615-5c90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50616",
"url": "https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50616-bef8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50617",
"url": "https://lore.kernel.org/linux-cve-announce/2025120851-CVE-2022-50617-84c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50618",
"url": "https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50618-6be5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50619",
"url": "https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50619-9b47@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50620",
"url": "https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50620-bf1f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50621",
"url": "https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50621-be59@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50622",
"url": "https://lore.kernel.org/linux-cve-announce/2025120852-CVE-2022-50622-9f34@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50623",
"url": "https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50623-03df@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50624",
"url": "https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50624-0011@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50625",
"url": "https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50625-a1e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50626",
"url": "https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50626-a97f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50627",
"url": "https://lore.kernel.org/linux-cve-announce/2025120853-CVE-2022-50627-a907@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50628",
"url": "https://lore.kernel.org/linux-cve-announce/2025120854-CVE-2022-50628-69d3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50629",
"url": "https://lore.kernel.org/linux-cve-announce/2025120854-CVE-2022-50629-52d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50630",
"url": "https://lore.kernel.org/linux-cve-announce/2025120854-CVE-2022-50630-3891@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53742",
"url": "https://lore.kernel.org/linux-cve-announce/2025120840-CVE-2023-53742-3a0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53743",
"url": "https://lore.kernel.org/linux-cve-announce/2025120840-CVE-2023-53743-5da6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53744",
"url": "https://lore.kernel.org/linux-cve-announce/2025120841-CVE-2023-53744-c66e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53745",
"url": "https://lore.kernel.org/linux-cve-announce/2025120841-CVE-2023-53745-2ae7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53746",
"url": "https://lore.kernel.org/linux-cve-announce/2025120841-CVE-2023-53746-cbfd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53747",
"url": "https://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53747-ae4a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53748",
"url": "https://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53748-4905@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53749",
"url": "https://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53749-b458@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53750",
"url": "https://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53750-c3be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53751",
"url": "https://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53751-2ff2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53752",
"url": "https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53752-339f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53753",
"url": "https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53753-1a11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53754",
"url": "https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53754-c601@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53755",
"url": "https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53755-1c4b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53756",
"url": "https://lore.kernel.org/linux-cve-announce/2025120843-CVE-2023-53756-f234@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53757",
"url": "https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53757-8c1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53758",
"url": "https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53758-93a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53759",
"url": "https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53759-c444@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53760",
"url": "https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53760-8e04@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53761",
"url": "https://lore.kernel.org/linux-cve-announce/2025120844-CVE-2023-53761-ea1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53762",
"url": "https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53762-01bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53763",
"url": "https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53763-3a65@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53764",
"url": "https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53764-c257@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53765",
"url": "https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53765-0317@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53766",
"url": "https://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53766-9bc9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53767",
"url": "https://lore.kernel.org/linux-cve-announce/2025120846-CVE-2023-53767-02ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53768",
"url": "https://lore.kernel.org/linux-cve-announce/2025120846-CVE-2023-53768-2b71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53769",
"url": "https://lore.kernel.org/linux-cve-announce/2025120846-CVE-2023-53769-1a8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40267",
"url": "https://lore.kernel.org/linux-cve-announce/2025120714-CVE-2025-40267-4904@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40268",
"url": "https://lore.kernel.org/linux-cve-announce/2025120715-CVE-2025-40268-390a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40269",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40269-9769@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40270",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40270-78dc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40271",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40271-7612@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40272",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40272-507b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40273",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40273-3765@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40274",
"url": "https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40274-53be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40275",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40275-021a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40276",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40276-6558@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40277",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40277-d511@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40278",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40278-dae4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40279",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40279-81d3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40280",
"url": "https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40280-4612@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40281",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40281-557d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40282",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40282-cdda@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40283",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40283-0706@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40284",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40284-9c41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40285",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40285-9158@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40286",
"url": "https://lore.kernel.org/linux-cve-announce/2025120718-CVE-2025-40286-1b9c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40287",
"url": "https://lore.kernel.org/linux-cve-announce/2025120719-CVE-2025-40287-a68f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40288",
"url": "https://lore.kernel.org/linux-cve-announce/2025120719-CVE-2025-40288-7d9f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40289",
"url": "https://lore.kernel.org/linux-cve-announce/2025120719-CVE-2025-40289-6833@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40290",
"url": "https://lore.kernel.org/linux-cve-announce/2025120811-CVE-2025-40290-852d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40291",
"url": "https://lore.kernel.org/linux-cve-announce/2025120815-CVE-2025-40291-8752@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40292",
"url": "https://lore.kernel.org/linux-cve-announce/2025120818-CVE-2025-40292-e613@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40293",
"url": "https://lore.kernel.org/linux-cve-announce/2025120818-CVE-2025-40293-cfe7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40294",
"url": "https://lore.kernel.org/linux-cve-announce/2025120818-CVE-2025-40294-b8e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40295",
"url": "https://lore.kernel.org/linux-cve-announce/2025120818-CVE-2025-40295-e4f2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40296",
"url": "https://lore.kernel.org/linux-cve-announce/2025120818-CVE-2025-40296-0769@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40297",
"url": "https://lore.kernel.org/linux-cve-announce/2025120819-CVE-2025-40297-8d83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40298",
"url": "https://lore.kernel.org/linux-cve-announce/2025120819-CVE-2025-40298-af76@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40299",
"url": "https://lore.kernel.org/linux-cve-announce/2025120819-CVE-2025-40299-fd5b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40301",
"url": "https://lore.kernel.org/linux-cve-announce/2025120819-CVE-2025-40301-4d3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40302",
"url": "https://lore.kernel.org/linux-cve-announce/2025120819-CVE-2025-40302-84e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40303",
"url": "https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40303-8209@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40304",
"url": "https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40304-47b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40305",
"url": "https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40305-d66a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40306",
"url": "https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40306-3e2f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40307",
"url": "https://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40307-40f1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40308",
"url": "https://lore.kernel.org/linux-cve-announce/2025120821-CVE-2025-40308-0613@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40309",
"url": "https://lore.kernel.org/linux-cve-announce/2025120821-CVE-2025-40309-8e98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40310",
"url": "https://lore.kernel.org/linux-cve-announce/2025120821-CVE-2025-40310-23c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40311",
"url": "https://lore.kernel.org/linux-cve-announce/2025120821-CVE-2025-40311-34ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40312",
"url": "https://lore.kernel.org/linux-cve-announce/2025120821-CVE-2025-40312-2743@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40313",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2025-40313-d68b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40314",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2025-40314-1dcb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40315",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2025-40315-38da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40316",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2025-40316-eeed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40317",
"url": "https://lore.kernel.org/linux-cve-announce/2025120822-CVE-2025-40317-5237@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40318",
"url": "https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40318-0f27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40319",
"url": "https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40319-9a46@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40320",
"url": "https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40320-8b44@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40321",
"url": "https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40321-83bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40322",
"url": "https://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40322-6355@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40323",
"url": "https://lore.kernel.org/linux-cve-announce/2025120824-CVE-2025-40323-047f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40324",
"url": "https://lore.kernel.org/linux-cve-announce/2025120824-CVE-2025-40324-a4cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40326",
"url": "https://lore.kernel.org/linux-cve-announce/2025120824-CVE-2025-40326-4c06@gregkh/"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2025-12-09",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28067 vom 2025-12-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-28067.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28068 vom 2025-12-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-28068.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20251224-0011 vom 2025-12-24",
"url": "https://security.netapp.com/advisory/NTAP-20251224-0011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0453 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0453"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0453 vom 2026-01-13",
"url": "https://linux.oracle.com/errata/ELSA-2026-0453.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50005 vom 2026-01-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50005.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50007 vom 2026-01-14",
"url": "https://linux.oracle.com/errata/ELSA-2026-50007.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4436 vom 2026-01-14",
"url": "https://lists.debian.org/debian-lts-announce/2026/01/msg00007.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50006 vom 2026-01-15",
"url": "http://linux.oracle.com/errata/ELSA-2026-50006.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0453 vom 2026-01-17",
"url": "https://errata.build.resf.org/RLSA-2026:0453"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0793 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0793"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50061 vom 2026-01-20",
"url": "http://linux.oracle.com/errata/ELSA-2026-50061.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0917 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0917"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0793 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0793.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0263-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1148 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1148"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0793 vom 2026-01-24",
"url": "https://errata.build.resf.org/RLSA-2026:0793"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1236 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1236"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1194 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:1194"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50071 vom 2026-01-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-50071.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1143 vom 2026-01-27",
"url": "https://linux.oracle.com/errata/ELSA-2026-1143.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1441 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1441"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1445 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1445"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1443 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1443"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1442 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1442"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1512 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1512"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1495 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1495"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1494 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1494"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0317-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0350-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1661 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1661"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1662 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1662"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1727 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1727"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1690 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1690"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0369-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1142 vom 2026-02-03",
"url": "https://errata.build.resf.org/RLSA-2026:1142"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1886 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1886"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1148 vom 2026-02-03",
"url": "https://errata.build.resf.org/RLSA-2026:1148"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1690 vom 2026-02-03",
"url": "http://linux.oracle.com/errata/ELSA-2026-1690.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1662 vom 2026-02-03",
"url": "http://linux.oracle.com/errata/ELSA-2026-1662.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1946 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1946"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1909 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1909"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1143 vom 2026-02-05",
"url": "https://errata.build.resf.org/RLSA-2026:1143"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20228-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20220-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2264 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2264"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1690 vom 2026-02-08",
"url": "https://errata.build.resf.org/RLSA-2026:1690"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2212 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2212"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2282 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2282"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2026-007 vom 2026-02-09",
"url": "https://docs.cloud.google.com/support/bulletins#gcp-2026-007"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6126 vom 2026-02-09",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2352 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2352"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50100 vom 2026-02-10",
"url": "http://linux.oracle.com/errata/ELSA-2026-50100.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2378 vom 2026-02-10",
"url": "https://access.redhat.com/errata/RHSA-2026:2378"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0411-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2212 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2212.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2282 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2282.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2490 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2490"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2264 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2264.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1662 vom 2026-02-11",
"url": "https://errata.build.resf.org/RLSA-2026:1662"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1661 vom 2026-02-11",
"url": "https://errata.build.resf.org/RLSA-2026:1661"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2535 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2535"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2583 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2583"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2577 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2577"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2573 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2573"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2560 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2560"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-1 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8030-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2594 vom 2026-02-12",
"url": "https://access.redhat.com/errata/RHSA-2026:2594"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2664 vom 2026-02-12",
"url": "https://access.redhat.com/errata/RHSA-2026:2664"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2282 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2282"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2212 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2212"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2264 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2264"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2722 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2722"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2721 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2721"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2721 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-2721.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2761 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2761"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2720 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2720"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2766 vom 2026-02-17",
"url": "https://access.redhat.com/errata/RHSA-2026:2766"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2759 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2759"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2722 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-2722.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50113 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-50113.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8048-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8048-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2720 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-2720.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-3 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2821 vom 2026-02-17",
"url": "https://access.redhat.com/errata/RHSA-2026:2821"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-4 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-2 vom 2026-02-18",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-3 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2026-118 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2026-118.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-6 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-6"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-112 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-1 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-3 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8029-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3268 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3268"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-2 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-8 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2722 vom 2026-02-24",
"url": "https://errata.build.resf.org/RLSA-2026:2722"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2721 vom 2026-02-24",
"url": "https://errata.build.resf.org/RLSA-2026:2721"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3277 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3277"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3267 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3267"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3293 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3293"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3360 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3360"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3358 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3358"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3375 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3375"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3388 vom 2026-02-26",
"url": "https://access.redhat.com/errata/RHSA-2026:3388"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2720 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:2720"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2821 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:2821"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50134 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-50134.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50133 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-50133.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2026-03-02T23:00:00.000+00:00",
"generator": {
"date": "2026-03-03T09:32:31.623+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2756",
"initial_release_date": "2025-12-07T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-12-09T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Debian und Oracle Linux aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE, Red Hat und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE, Rocky Enterprise Software Foundation, Red Hat, Oracle Linux und openSUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat, Rocky Enterprise Software Foundation und SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-08T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat, Google, Debian und Oracle Linux aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat, Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Oracle Linux, Ubuntu und Red Hat aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat, SUSE, Ubuntu und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "39"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "azl3",
"product": {
"name": "Microsoft Azure Linux azl3",
"product_id": "T049210",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_linux:azl3"
}
}
}
],
"category": "product_name",
"name": "Azure Linux"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp AFF",
"product": {
"name": "NetApp AFF",
"product_id": "T020536",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:aff:-"
}
}
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T049184",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50583",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50583"
},
{
"cve": "CVE-2022-50614",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50614"
},
{
"cve": "CVE-2022-50615",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50615"
},
{
"cve": "CVE-2022-50616",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50616"
},
{
"cve": "CVE-2022-50617",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50617"
},
{
"cve": "CVE-2022-50618",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50618"
},
{
"cve": "CVE-2022-50619",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50619"
},
{
"cve": "CVE-2022-50620",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50620"
},
{
"cve": "CVE-2022-50621",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50621"
},
{
"cve": "CVE-2022-50622",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50622"
},
{
"cve": "CVE-2022-50623",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50623"
},
{
"cve": "CVE-2022-50624",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50624"
},
{
"cve": "CVE-2022-50625",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50625"
},
{
"cve": "CVE-2022-50626",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50626"
},
{
"cve": "CVE-2022-50627",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50627"
},
{
"cve": "CVE-2022-50628",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50628"
},
{
"cve": "CVE-2022-50629",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50629"
},
{
"cve": "CVE-2022-50630",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2022-50630"
},
{
"cve": "CVE-2023-53742",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53742"
},
{
"cve": "CVE-2023-53743",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53743"
},
{
"cve": "CVE-2023-53744",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53744"
},
{
"cve": "CVE-2023-53745",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53745"
},
{
"cve": "CVE-2023-53746",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53746"
},
{
"cve": "CVE-2023-53747",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53747"
},
{
"cve": "CVE-2023-53748",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53748"
},
{
"cve": "CVE-2023-53749",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53749"
},
{
"cve": "CVE-2023-53750",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53750"
},
{
"cve": "CVE-2023-53751",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53751"
},
{
"cve": "CVE-2023-53752",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53752"
},
{
"cve": "CVE-2023-53753",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53753"
},
{
"cve": "CVE-2023-53754",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53754"
},
{
"cve": "CVE-2023-53755",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53755"
},
{
"cve": "CVE-2023-53756",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53756"
},
{
"cve": "CVE-2023-53757",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53757"
},
{
"cve": "CVE-2023-53758",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53758"
},
{
"cve": "CVE-2023-53759",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53759"
},
{
"cve": "CVE-2023-53760",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53760"
},
{
"cve": "CVE-2023-53761",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53761"
},
{
"cve": "CVE-2023-53762",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53762"
},
{
"cve": "CVE-2023-53763",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53763"
},
{
"cve": "CVE-2023-53764",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53764"
},
{
"cve": "CVE-2023-53765",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53765"
},
{
"cve": "CVE-2023-53766",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53766"
},
{
"cve": "CVE-2023-53767",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53767"
},
{
"cve": "CVE-2023-53768",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53768"
},
{
"cve": "CVE-2023-53769",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2023-53769"
},
{
"cve": "CVE-2025-40267",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40267"
},
{
"cve": "CVE-2025-40268",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40268"
},
{
"cve": "CVE-2025-40269",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40269"
},
{
"cve": "CVE-2025-40270",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40270"
},
{
"cve": "CVE-2025-40271",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40271"
},
{
"cve": "CVE-2025-40272",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40272"
},
{
"cve": "CVE-2025-40273",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40273"
},
{
"cve": "CVE-2025-40274",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40274"
},
{
"cve": "CVE-2025-40275",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40275"
},
{
"cve": "CVE-2025-40276",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40276"
},
{
"cve": "CVE-2025-40277",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40277"
},
{
"cve": "CVE-2025-40278",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40278"
},
{
"cve": "CVE-2025-40279",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40279"
},
{
"cve": "CVE-2025-40280",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40280"
},
{
"cve": "CVE-2025-40281",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40281"
},
{
"cve": "CVE-2025-40282",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40282"
},
{
"cve": "CVE-2025-40283",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40283"
},
{
"cve": "CVE-2025-40284",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40284"
},
{
"cve": "CVE-2025-40285",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40285"
},
{
"cve": "CVE-2025-40286",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40286"
},
{
"cve": "CVE-2025-40287",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40287"
},
{
"cve": "CVE-2025-40288",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40288"
},
{
"cve": "CVE-2025-40289",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40289"
},
{
"cve": "CVE-2025-40290",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40290"
},
{
"cve": "CVE-2025-40291",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40291"
},
{
"cve": "CVE-2025-40292",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40292"
},
{
"cve": "CVE-2025-40293",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40293"
},
{
"cve": "CVE-2025-40294",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40294"
},
{
"cve": "CVE-2025-40295",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40295"
},
{
"cve": "CVE-2025-40296",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40296"
},
{
"cve": "CVE-2025-40297",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40297"
},
{
"cve": "CVE-2025-40298",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40298"
},
{
"cve": "CVE-2025-40299",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40299"
},
{
"cve": "CVE-2025-40301",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40301"
},
{
"cve": "CVE-2025-40302",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40302"
},
{
"cve": "CVE-2025-40303",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40303"
},
{
"cve": "CVE-2025-40304",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40304"
},
{
"cve": "CVE-2025-40305",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40305"
},
{
"cve": "CVE-2025-40306",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40306"
},
{
"cve": "CVE-2025-40307",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40307"
},
{
"cve": "CVE-2025-40308",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40308"
},
{
"cve": "CVE-2025-40309",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40309"
},
{
"cve": "CVE-2025-40310",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40310"
},
{
"cve": "CVE-2025-40311",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40311"
},
{
"cve": "CVE-2025-40312",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40312"
},
{
"cve": "CVE-2025-40313",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40313"
},
{
"cve": "CVE-2025-40314",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40314"
},
{
"cve": "CVE-2025-40315",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40315"
},
{
"cve": "CVE-2025-40316",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40316"
},
{
"cve": "CVE-2025-40317",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40317"
},
{
"cve": "CVE-2025-40318",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40318"
},
{
"cve": "CVE-2025-40319",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40319"
},
{
"cve": "CVE-2025-40320",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40320"
},
{
"cve": "CVE-2025-40321",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40321"
},
{
"cve": "CVE-2025-40322",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40322"
},
{
"cve": "CVE-2025-40323",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40323"
},
{
"cve": "CVE-2025-40324",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40324"
},
{
"cve": "CVE-2025-40326",
"product_status": {
"known_affected": [
"67646",
"T049184",
"T011540",
"T004914",
"T032255",
"2951",
"T002207",
"T020536",
"T000126",
"T027843",
"398363",
"T049210",
"1607324"
]
},
"release_date": "2025-12-07T23:00:00.000+00:00",
"title": "CVE-2025-40326"
}
]
}
GHSA-48MQ-8MRG-R5QQ
Vulnerability from github – Published: 2025-12-08 03:31 – Updated: 2025-12-08 03:31In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to invalidate dcc->f2fs_issue_discard in error path
Syzbot reports a NULL pointer dereference issue as below:
__refcount_add include/linux/refcount.h:193 [inline] __refcount_inc include/linux/refcount.h:250 [inline] refcount_inc include/linux/refcount.h:267 [inline] get_task_struct include/linux/sched/task.h:110 [inline] kthread_stop+0x34/0x1c0 kernel/kthread.c:703 f2fs_stop_discard_thread+0x3c/0x5c fs/f2fs/segment.c:1638 kill_f2fs_super+0x5c/0x194 fs/f2fs/super.c:4522 deactivate_locked_super+0x70/0xe8 fs/super.c:332 deactivate_super+0xd0/0xd4 fs/super.c:363 cleanup_mnt+0x1f8/0x234 fs/namespace.c:1186 __cleanup_mnt+0x20/0x30 fs/namespace.c:1193 task_work_run+0xc4/0x14c kernel/task_work.c:177 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0x26c/0xbe0 kernel/exit.c:795 do_group_exit+0x60/0xe8 kernel/exit.c:925 __do_sys_exit_group kernel/exit.c:936 [inline] __se_sys_exit_group kernel/exit.c:934 [inline] __wake_up_parent+0x0/0x40 kernel/exit.c:934 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581
The root cause of this issue is in error path of f2fs_start_discard_thread(), it missed to invalidate dcc->f2fs_issue_discard, later kthread_stop() may access invalid pointer.
{
"affected": [],
"aliases": [
"CVE-2022-50620"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-08T02:15:47Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to invalidate dcc-\u003ef2fs_issue_discard in error path\n\nSyzbot reports a NULL pointer dereference issue as below:\n\n __refcount_add include/linux/refcount.h:193 [inline]\n __refcount_inc include/linux/refcount.h:250 [inline]\n refcount_inc include/linux/refcount.h:267 [inline]\n get_task_struct include/linux/sched/task.h:110 [inline]\n kthread_stop+0x34/0x1c0 kernel/kthread.c:703\n f2fs_stop_discard_thread+0x3c/0x5c fs/f2fs/segment.c:1638\n kill_f2fs_super+0x5c/0x194 fs/f2fs/super.c:4522\n deactivate_locked_super+0x70/0xe8 fs/super.c:332\n deactivate_super+0xd0/0xd4 fs/super.c:363\n cleanup_mnt+0x1f8/0x234 fs/namespace.c:1186\n __cleanup_mnt+0x20/0x30 fs/namespace.c:1193\n task_work_run+0xc4/0x14c kernel/task_work.c:177\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0x26c/0xbe0 kernel/exit.c:795\n do_group_exit+0x60/0xe8 kernel/exit.c:925\n __do_sys_exit_group kernel/exit.c:936 [inline]\n __se_sys_exit_group kernel/exit.c:934 [inline]\n __wake_up_parent+0x0/0x40 kernel/exit.c:934\n __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]\n invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]\n el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142\n do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206\n el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636\n el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654\n el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581\n\nThe root cause of this issue is in error path of f2fs_start_discard_thread(),\nit missed to invalidate dcc-\u003ef2fs_issue_discard, later kthread_stop() may\naccess invalid pointer.",
"id": "GHSA-48mq-8mrg-r5qq",
"modified": "2025-12-08T03:31:02Z",
"published": "2025-12-08T03:31:02Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50620"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/865bb7b5a7deeb0e5afbd82381d52d38825dc64d"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/91586ce0d39a05f88795aa8814fb99b1387236b3"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a3e517a6ba695d683ee63615e1ea6e6b4c7d2732"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ae6c960a82c52c3bda5adc82d90643d6c12d308e"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2022-50620
Vulnerability from fkie_nvd - Published: 2025-12-08 02:15 - Updated: 2025-12-08 18:26| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to invalidate dcc-\u003ef2fs_issue_discard in error path\n\nSyzbot reports a NULL pointer dereference issue as below:\n\n __refcount_add include/linux/refcount.h:193 [inline]\n __refcount_inc include/linux/refcount.h:250 [inline]\n refcount_inc include/linux/refcount.h:267 [inline]\n get_task_struct include/linux/sched/task.h:110 [inline]\n kthread_stop+0x34/0x1c0 kernel/kthread.c:703\n f2fs_stop_discard_thread+0x3c/0x5c fs/f2fs/segment.c:1638\n kill_f2fs_super+0x5c/0x194 fs/f2fs/super.c:4522\n deactivate_locked_super+0x70/0xe8 fs/super.c:332\n deactivate_super+0xd0/0xd4 fs/super.c:363\n cleanup_mnt+0x1f8/0x234 fs/namespace.c:1186\n __cleanup_mnt+0x20/0x30 fs/namespace.c:1193\n task_work_run+0xc4/0x14c kernel/task_work.c:177\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0x26c/0xbe0 kernel/exit.c:795\n do_group_exit+0x60/0xe8 kernel/exit.c:925\n __do_sys_exit_group kernel/exit.c:936 [inline]\n __se_sys_exit_group kernel/exit.c:934 [inline]\n __wake_up_parent+0x0/0x40 kernel/exit.c:934\n __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]\n invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]\n el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142\n do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206\n el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636\n el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654\n el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581\n\nThe root cause of this issue is in error path of f2fs_start_discard_thread(),\nit missed to invalidate dcc-\u003ef2fs_issue_discard, later kthread_stop() may\naccess invalid pointer."
}
],
"id": "CVE-2022-50620",
"lastModified": "2025-12-08T18:26:19.900",
"metrics": {},
"published": "2025-12-08T02:15:47.870",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/865bb7b5a7deeb0e5afbd82381d52d38825dc64d"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/91586ce0d39a05f88795aa8814fb99b1387236b3"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/a3e517a6ba695d683ee63615e1ea6e6b4c7d2732"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/ae6c960a82c52c3bda5adc82d90643d6c12d308e"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.