EulerOS 2.0 SP12 : kernel (EulerOS-SA-2026-1397)

high Nessus Plugin ID 302373

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-cork.(CVE-2025-39913)

md: fix rcu protection in md_wakeup_thread(CVE-2025-68374)

usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer(CVE-2025-68331)

fs: dlm: fix invalid derefence of sb_lvbptr(CVE-2022-50516)

net: atlantic: fix fragment overflow handling in RX path(CVE-2025-68301)

netfilter: nf_reject: don't leak dst refcount for loopback packets(CVE-2025-38732)

net: ipv6: fix field-spanning memcpy warning in AH output(CVE-2025-40363)

net/mlx5e: Remove skb secpath if xfrm state is not found(CVE-2025-38590)

fs: quota: create dedicated workqueue for quota_release_work(CVE-2025-40196)

Squashfs: fix uninit-value in squashfs_get_parent(CVE-2025-40049)

scsi: lpfc: Fix buffer free/clear order in deferred receive path(CVE-2025-39841)

media: imon: make send_packet() more robust(CVE-2025-68194)

libceph: fix potential use-after-free in have_mon_and_osd_map()(CVE-2025-68285)

pid: Add a judgment for ns null in pid_nr_ns(CVE-2025-40178)

scsi: qla2xxx: Clear cmds after chip reset(CVE-2025-68745)

ACPI: video: Fix use-after-free in acpi_video_switch_brightness()(CVE-2025-40211)

tty: n_gsm: fix deadlock and link starvation in outgoing data path(CVE-2022-50116)

nexthop: Forbid FDB status change while nexthop is in a group(CVE-2025-39980)

icmp6: Fix null-ptr-deref of ip6_null_entry-rt6i_idev in icmp6_dev().(CVE-2023-53343)

i40e: remove read access to debugfs files(CVE-2025-39901)

raw: Fix NULL deref in raw_get_next().(CVE-2023-53198)

NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid(CVE-2025-68349)

sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto(CVE-2025-40281)

RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device(CVE-2023-53393)

netfilter: nft_objref: validate objref and objrefmap expressions(CVE-2025-40206)

cifs: fix session state check in reconnect to avoid use-after-free issue(CVE-2023-53794)

cifs: parse_dfs_referrals: prevent oob on malformed input(CVE-2025-40099)

crypto: af_alg - Set merge to zero early in af_alg_sendmsg(CVE-2025-39931)

nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails.(CVE-2025-38400)

fs: Prevent file descriptor table allocations exceeding INT_MAX(CVE-2025-39756)

mtd: core: fix possible resource leak in init_mtd()(CVE-2022-50304)

ipv4: start using dst_dev_rcu()(CVE-2025-40074)

bpf: Reject narrower access to pointer ctx fields(CVE-2025-38591)

RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish()(CVE-2023-53335)

bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}(CVE-2025-40183)

Squashfs: reject negative file sizes in squashfs_read_inode()(CVE-2025-40200)

nvme-multipath: fix lockdep WARN due to partition scan work(CVE-2025-68218)

fbdev: fix potential buffer overflow in do_register_framebuffer()(CVE-2025-38702)

PCI/AER: Fix NULL pointer access by aer_info(CVE-2025-68309)

x86/apic: Don't disable x2APIC if locked(CVE-2022-50720)

netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm(CVE-2025-39894)

fuse: fix livelock in synchronous file put from fuseblk workers(CVE-2025-40220)

md/raid1: Fix stack memory use after return in raid1_reshape(CVE-2025-38445)

iommu/amd: Avoid stack buffer overflow from kernel cmdline(CVE-2025-38676)

ext4: fix off-by-one errors in fast-commit block filling(CVE-2022-50428)

Squashfs: check return result of sb_min_blocksize(CVE-2025-38415)

ext4: refresh inline data size before write operations(CVE-2025-68264)

bpf: Sync pending IRQ work before freeing ring buffer(CVE-2025-40319)

block: avoid possible overflow for chunk_sectors check in blk_stack_limits()(CVE-2025-39795)

xfrm: Zero padding when dumping algos and encap(CVE-2023-53684)

crypto: hisilicon/qm - request reserved interrupt for virtual function(CVE-2025-40136)

scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show()(CVE-2025-68229)

nbd: defer config unlock in nbd_genl_connect(CVE-2025-68366)

virtiofs: add filesystem context source name check(CVE-2025-37773)

net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast(CVE-2025-40140)

page_pool: always add GFP_NOWARN for ATOMIC allocations(CVE-2025-68321)

i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path(CVE-2025-39911)

drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE(CVE-2025-40277)

qed: allow sleep in qed_mcp_trace_dump()(CVE-2023-53509)

IB/mad: Don't call to function that might sleep while in atomic context(CVE-2022-50472)

net: openvswitch: remove never-working support for setting nsh fields(CVE-2025-40254)

md/raid0, raid10: Don't set discard sectors for request queue(CVE-2022-50583)

futex: Don't leak robust_list pointer on exec race(CVE-2025-40341)

x86/MCE: Always save CS register on AMD Zen IF Poison errors(CVE-2023-53438)

ksm: use range-walk function to jump over holes in scan_get_next_rmap_item(CVE-2025-68211)

tcp_metrics: use dst_dev_net_rcu()(CVE-2025-40075)

net/ip6_tunnel: Prevent perpetual tunnel growth(CVE-2025-40173)

fbdev: bitblit: bound-check glyph index in bit_putcs*(CVE-2025-40322)

xfs: do not propagate ENODATA disk errors into xattr code(CVE-2025-39835)

scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write(CVE-2023-53282)

smb: client: fix race with concurrent opens in rename(2)(CVE-2025-39825)

PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type(CVE-2025-23161)

tipc: Fix use-after-free in tipc_mon_reinit_self().(CVE-2025-40280)

usbnet: Fix using smp_processor_id() in preemptible code warnings(CVE-2025-40164)

mm/hugetlb: fix folio is still mapped when deleted(CVE-2025-40006)

binfmt_misc: restore write access before closing files opened by open_exec()(CVE-2025-68239)

scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT(CVE-2022-49534)

smb: client: Fix refcount leak for cifs_sb_tlink(CVE-2025-40103)

KVM: x86: use array_index_nospec with indices that come from guest(CVE-2025-39823)

bpf: Fix invalid prog-stats access when update_effective_progs fails(CVE-2025-68742)

of: check previous kernel's ima-kexec-buffer against memory bounds(CVE-2022-50159)

media: tuner: xc5000: Fix use-after-free in xc5000_release(CVE-2025-39994)

i40e: fix idx validation in i40e_validate_queue_map(CVE-2025-39972)

net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()(CVE-2025-40252)

__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock(CVE-2025-38058)

ipv6: prevent infinite loop in rt6_nlmsg_size()(CVE-2025-38588)

vsock: Ignore signal/timeout on connect() if already established(CVE-2025-40248)

cifs: fix mid leak during reconnection after timeout threshold(CVE-2023-53597)

ixgbevf: fix mailbox API compatibility by negotiating supported features(CVE-2025-40104)

iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry()(CVE-2023-53476)

usb: storage: sddr55: Reject out-of-bound new_pba(CVE-2025-40345)

drm/vmwgfx: Fix Use-after-free in validation(CVE-2025-40111)

sctp: initialize more fields in sctp_v6_from_sk()(CVE-2025-39812)

mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race(CVE-2025-38085)

media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()(CVE-2025-38694)

crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id(CVE-2025-68724)

netdevsim: fix memory leak in nsim_drv_probe() when nsim_dev_resources_register() failed(CVE-2022-50500)

net: bridge: fix soft lockup in br_multicast_query_expired()(CVE-2025-39773)

cifs: fix small mempool leak in SMB2_negotiate()(CVE-2022-49938)

blk-mq: fix NULL dereference on q-elevator in blk_mq_elv_switch_none(CVE-2023-53292)

ipv6: reject malicious packets in ipv6_gso_segment()(CVE-2025-38572)

pinctrl: check the return value of pinmux_ops::get_function_name()(CVE-2025-40030)

of: overlay: Call of_changeset_init() early(CVE-2023-53856)

macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse(CVE-2025-68367)

fs/proc: fix uaf in proc_readdir_de()(CVE-2025-40271)

ipv6/sit: use DEV_STATS_INC() to avoid data-races(CVE-2022-50764)

sctp: linearize cloned gso packets in sctp_rcv(CVE-2025-38718)

timers: Fix NULL function pointer race in timer_shutdown_sync()(CVE-2025-68214)

ARM: 9317/1: kexec: Make smp stop calls asynchronous(CVE-2023-53712)

media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()(CVE-2025-39713)

drm/vmwgfx: Fix a null-ptr access in the cursor snooper(CVE-2025-40110)

sctp: Fix MAC comparison to be constant-time(CVE-2025-40204)

scsi: st: Fix array overflow in st_setup()(CVE-2025-37857)

ceph: fix potential use-after-free bug when trimming caps(CVE-2023-53867)

sctp: avoid NULL dereference when chunk data buffer is missing(CVE-2025-40240)

x86/fpu: Ensure XFD state on signal delivery(CVE-2025-68171)

mm/compaction: fix UBSAN shift-out-of-bounds warning(CVE-2025-21815)

netfilter: xt_nfacct: don't assume acct name is null-terminated(CVE-2025-38639)

usb: typec: ucsi: displayport: Fix NULL pointer access(CVE-2025-37994)

NFSD: free copynotify stateid in nfs4_free_ol_stateid()(CVE-2025-40273)

RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction(CVE-2025-38161)

scsi: target: Fix multiple LUN_RESET handling(CVE-2023-53586)

ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr(CVE-2025-68183)

bpf: Add preempt_count_{sub,add} into btf id deny list(CVE-2023-54086)

tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().(CVE-2025-40186)

bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls(CVE-2025-38608)

smb: client: fix memory leak in cifs_construct_tcon()(CVE-2025-68295)

bpf: Fix stackmap overflow check in __bpf_get_stackid()(CVE-2025-68378)

usb: early: xhci-dbc: Fix a potential out-of-bound memory access(CVE-2023-53840)

scsi: libiscsi: Initialize iscsi_conn-dd_data only if memory is allocated(CVE-2025-38700)

usbnet: Prevents free active kevent(CVE-2025-68312)

media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove(CVE-2025-39996)

xfrm: delete x-tunnel as we delete x(CVE-2025-40215)

arch_topology: Fix incorrect error check in topology_parse_cpu_capacity()(CVE-2025-40346)

eventpoll: Fix semi-unbounded recursion(CVE-2025-38614)

smb3: fix for slab out of bounds on mount to ksmbd(CVE-2025-38728)

nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()(CVE-2025-38724)

tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()(CVE-2025-68188)

software node: Correct a OOB check in software_node_get_reference_args()(CVE-2025-38342)

jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted(CVE-2025-68337)

be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site.(CVE-2025-40264)

nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request(CVE-2025-38430)

net: dlink: handle copy_thresh allocation failure(CVE-2025-40053)

net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer(CVE-2025-39937)

nfs4_setup_readdir(): insufficient locking for -d_parent-d_inode dereferencing(CVE-2025-68185)

dm-stripe: fix a possible integer overflow(CVE-2025-39940)

netfilter: ctnetlink: fix refcount leak on table dump(CVE-2025-38721)

RDMA/rxe: Fix null deref on srq-rq.queue after resize failure(CVE-2025-68379)

usb: typec: ucsi: displayport: Fix deadlock(CVE-2025-37967)

netdevsim: fix memory leak in nsim_bus_dev_new()(CVE-2022-50772)

ceph: fix race condition validating r_parent before applying state(CVE-2025-39927)

bnxt_en: Fix memory corruption when FW resources change during ifdown(CVE-2025-39810)

virtio_net: Fix error unwinding of XDP initialization(CVE-2023-53499)

virtio: break and reset virtio devices on device_shutdown()(CVE-2025-38064)

NFS: Fix a race when updating an existing write(CVE-2025-39697)

nvme-fc: use lock accessing port_state and rport state(CVE-2025-40342)

net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM(CVE-2025-39770)

NFSD: fix race between nfsd registration and exports_proc(CVE-2025-38232)

net: netpoll: fix incorrect refcount handling causing incorrect cleanup(CVE-2025-68245)

bpf: Fix issue in verifying allow_ptr_leaks(CVE-2023-54181)

cifs: Fix connections leak when tlink setup failed(CVE-2022-49822)

cifs: avoid NULL pointer dereference in dbg call(CVE-2025-37844)

objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds()(CVE-2025-37937)

bpf: Explicitly check accesses to bpf_sock_addr(CVE-2025-40078)

nvmet-fc: avoid scheduling association deletion twice(CVE-2025-40343)

md/raid1,raid10: don't ignore IO flags(CVE-2025-22125)

KVM: x86/mmu: Treat NX as a valid SPTE bit for NPT(CVE-2022-50224)

vfio/type1: prevent underflow of locked_vm via exec()(CVE-2023-53171)

RDMA/bnxt_re: Prevent handling any completions after qp destroy(CVE-2023-54048)

ipv6: fix possible infinite loop in fib6_info_uses_dev()(CVE-2025-38587)

mm: hugetlb: avoid soft lockup when mprotect to large memory area(CVE-2025-40153)

net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup(CVE-2025-68192)

tcp: Clear tcp_sk(sk)-fastopen_rsk in tcp_disconnect().(CVE-2025-39955)

udp_tunnel: use netdev_warn() instead of netdev_WARN()(CVE-2025-68191)

mm/vmscan: don't try to reclaim hwpoison folio(CVE-2025-37834)

ima: Handle error code returned by ima_filter_rule_match()(CVE-2025-68740)

bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log(CVE-2023-54145)

net/mlx5e: Move representor neigh cleanup to profile cleanup_tx(CVE-2023-54148)

dma-buf: insert memory barrier before updating num_fences(CVE-2025-38095)

bpf: Do not let BPF test infra emit invalid GSO types to stack(CVE-2025-68725)

ext4: guard against EA inode refcount underflow in xattr update(CVE-2025-40190)

iavf: use internal state to free traffic IRQs(CVE-2023-53850)

genirq/msi: Store the IOMMU IOVA directly in msi_desc instead of iommu_cookie(CVE-2025-38062)

mm/vmscan: fix hwpoisoned large folio handling in shrink_folio_list(CVE-2025-39725)

nbd: restrict sockets to TCP and UDP(CVE-2025-40080)

crypto: hisilicon/qm - set NULL to qm-debug.qm_diff_regs(CVE-2025-40062)

libceph: replace BUG_ON with bounds check for map-max_osd(CVE-2025-68283)

ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe(CVE-2025-68241)

net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()(CVE-2025-40187)

fbcon: Set fb_display[i]-mode to NULL when the mode is released(CVE-2025-40323)

net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error(CVE-2025-21924)

HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version()(CVE-2025-39808)

ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock()(CVE-2025-68261)

ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()(CVE-2025-40198)

scsi: sg: Do not sleep in atomic context(CVE-2025-40259)

drm/scheduler: fix fence ref counting(CVE-2022-49829)

nvmet-fc: move lsop put work to nvmet_fc_ls_req_op(CVE-2025-40171)

PCI: Fix reference leak in pci_register_host_bridge()(CVE-2025-37836)

scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()(CVE-2025-40115)

Drivers: hv: vmbus: Don't dereference ACPI root object handle(CVE-2023-53647)

tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().(CVE-2025-40149)

NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()(CVE-2025-39730)

vxlan: Annotate FDB data races(CVE-2025-38037)

iio: common: st_sensors: Fix use of uninitialize device structs(CVE-2025-38531)

usb: storage: Fix memory leak in USB bulk transport(CVE-2025-68288)

cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()(CVE-2025-40194)

cifs: prevent NULL pointer dereference in UTF16 conversion(CVE-2025-39838)

scsi: target: target_core_configfs: Add length check to avoid buffer overflow(CVE-2025-39998)

netfilter: nft_ct: add seqadj extension for natted connections(CVE-2025-68206)

mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory(CVE-2025-39883)

regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex(CVE-2025-68354)

bpf: Enforce expected_attach_type for tailcall compatibility(CVE-2025-40123)

media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID(CVE-2025-40016)

scsi: qla4xxx: Prevent a potential error pointer dereference(CVE-2025-39676)

block: fix resource leak in blk_register_queue() error path(CVE-2025-37980)

blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx(CVE-2025-40125)

NFSD: Fix crash in nfsd4_read_release()(CVE-2025-40324)

RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug(CVE-2025-38024)

vsock: Fix transport_* TOCTOU(CVE-2025-38461)

net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree(CVE-2025-38468)

e1000: fix OOB in e1000_tbi_should_accept()(CVE-2025-71093)

mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats(CVE-2025-68800)

iavf: Fix reset error handling(CVE-2022-50053)

net/mlx5: Handle pairing of E-switch via uplink un/load APIs(CVE-2023-53347)

vsock: Fix transport_{g2h,h2g} TOCTOU(CVE-2025-38462)

x86/fpu: Drop fpregs lock before inheriting FPU permissions(CVE-2022-49783)

fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds(CVE-2025-40304)

net: phy: mscc: Fix memory leak when using one step timestamping(CVE-2025-38148)

RDMA/hns: Fix double destruction of rsv_qp(CVE-2025-38582)

mlxsw: spectrum_router: Fix neighbour use-after-free(CVE-2025-68801)

net_sched: sch_sfq: reject invalid perturb period(CVE-2025-38193)

iavf: fix off-by-one issues in iavf_config_rss_reg()(CVE-2025-71087)

RDMA/rxe: Fix incomplete state save in rxe_requester(CVE-2023-53539)

Tenable has extracted the preceding description block directly from the EulerOS kernel security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel packages.

See Also

http://www.nessus.org/u?37e33626

Plugin Details

Severity: High

ID: 302373

File Name: EulerOS_SA-2026-1397.nasl

Version: 1.1

Type: local

Published: 3/16/2026

Updated: 3/16/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-40149

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:kernel-tools-libs, p-cpe:/a:huawei:euleros:bpftool, p-cpe:/a:huawei:euleros:kernel-tools, p-cpe:/a:huawei:euleros:kernel, p-cpe:/a:huawei:euleros:python3-perf, p-cpe:/a:huawei:euleros:kernel-abi-stablelists, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/16/2026

Vulnerability Publication Date: 7/21/2021

Reference Information

CVE: CVE-2022-49534, CVE-2022-49783, CVE-2022-49822, CVE-2022-49829, CVE-2022-49938, CVE-2022-50053, CVE-2022-50116, CVE-2022-50159, CVE-2022-50224, CVE-2022-50304, CVE-2022-50428, CVE-2022-50472, CVE-2022-50500, CVE-2022-50516, CVE-2022-50583, CVE-2022-50720, CVE-2022-50764, CVE-2022-50772, CVE-2023-53171, CVE-2023-53198, CVE-2023-53282, CVE-2023-53292, CVE-2023-53335, CVE-2023-53343, CVE-2023-53347, CVE-2023-53393, CVE-2023-53438, CVE-2023-53476, CVE-2023-53499, CVE-2023-53509, CVE-2023-53539, CVE-2023-53586, CVE-2023-53597, CVE-2023-53647, CVE-2023-53684, CVE-2023-53712, CVE-2023-53794, CVE-2023-53840, CVE-2023-53850, CVE-2023-53856, CVE-2023-53867, CVE-2023-54048, CVE-2023-54086, CVE-2023-54145, CVE-2023-54148, CVE-2023-54181, CVE-2025-21815, CVE-2025-21924, CVE-2025-22125, CVE-2025-23161, CVE-2025-37773, CVE-2025-37834, CVE-2025-37836, CVE-2025-37844, CVE-2025-37857, CVE-2025-37937, CVE-2025-37967, CVE-2025-37980, CVE-2025-37994, CVE-2025-38024, CVE-2025-38037, CVE-2025-38058, CVE-2025-38062, CVE-2025-38064, CVE-2025-38085, CVE-2025-38095, CVE-2025-38148, CVE-2025-38161, CVE-2025-38193, CVE-2025-38232, CVE-2025-38342, CVE-2025-38400, CVE-2025-38415, CVE-2025-38430, CVE-2025-38445, CVE-2025-38461, CVE-2025-38462, CVE-2025-38468, CVE-2025-38531, CVE-2025-38572, CVE-2025-38582, CVE-2025-38587, CVE-2025-38588, CVE-2025-38590, CVE-2025-38591, CVE-2025-38608, CVE-2025-38614, CVE-2025-38639, CVE-2025-38676, CVE-2025-38694, CVE-2025-38700, CVE-2025-38702, CVE-2025-38718, CVE-2025-38721, CVE-2025-38724, CVE-2025-38728, CVE-2025-38732, CVE-2025-39676, CVE-2025-39697, CVE-2025-39713, CVE-2025-39725, CVE-2025-39730, CVE-2025-39756, CVE-2025-39770, CVE-2025-39773, CVE-2025-39795, CVE-2025-39808, CVE-2025-39810, CVE-2025-39812, CVE-2025-39823, CVE-2025-39825, CVE-2025-39835, CVE-2025-39838, CVE-2025-39841, CVE-2025-39883, CVE-2025-39894, CVE-2025-39901, CVE-2025-39911, CVE-2025-39913, CVE-2025-39927, CVE-2025-39931, CVE-2025-39937, CVE-2025-39940, CVE-2025-39955, CVE-2025-39972, CVE-2025-39980, CVE-2025-39994, CVE-2025-39996, CVE-2025-39998, CVE-2025-40006, CVE-2025-40016, CVE-2025-40030, CVE-2025-40049, CVE-2025-40053, CVE-2025-40062, CVE-2025-40074, CVE-2025-40075, CVE-2025-40078, CVE-2025-40080, CVE-2025-40099, CVE-2025-40103, CVE-2025-40104, CVE-2025-40110, CVE-2025-40111, CVE-2025-40115, CVE-2025-40123, CVE-2025-40125, CVE-2025-40136, CVE-2025-40140, CVE-2025-40149, CVE-2025-40153, CVE-2025-40164, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178, CVE-2025-40183, CVE-2025-40186, CVE-2025-40187, CVE-2025-40190, CVE-2025-40194, CVE-2025-40196, CVE-2025-40198, CVE-2025-40200, CVE-2025-40204, CVE-2025-40206, CVE-2025-40211, CVE-2025-40215, CVE-2025-40220, CVE-2025-40240, CVE-2025-40248, CVE-2025-40252, CVE-2025-40254, CVE-2025-40259, CVE-2025-40264, CVE-2025-40271, CVE-2025-40273, CVE-2025-40277, CVE-2025-40280, CVE-2025-40281, CVE-2025-40304, CVE-2025-40319, CVE-2025-40322, CVE-2025-40323, CVE-2025-40324, CVE-2025-40341, CVE-2025-40342, CVE-2025-40343, CVE-2025-40345, CVE-2025-40346, CVE-2025-40363, CVE-2025-68171, CVE-2025-68183, CVE-2025-68185, CVE-2025-68188, CVE-2025-68191, CVE-2025-68192, CVE-2025-68194, CVE-2025-68206, CVE-2025-68211, CVE-2025-68214, CVE-2025-68218, CVE-2025-68229, CVE-2025-68239, CVE-2025-68241, CVE-2025-68245, CVE-2025-68261, CVE-2025-68264, CVE-2025-68283, CVE-2025-68285, CVE-2025-68288, CVE-2025-68295, CVE-2025-68301, CVE-2025-68309, CVE-2025-68312, CVE-2025-68321, CVE-2025-68331, CVE-2025-68337, CVE-2025-68349, CVE-2025-68354, CVE-2025-68366, CVE-2025-68367, CVE-2025-68374, CVE-2025-68378, CVE-2025-68379, CVE-2025-68724, CVE-2025-68725, CVE-2025-68740, CVE-2025-68742, CVE-2025-68745, CVE-2025-68800, CVE-2025-68801, CVE-2025-71087, CVE-2025-71093