EulerOS 2.0 SP11 : kernel (EulerOS-SA-2026-1610)

high Nessus Plugin ID 302584

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.(CVE-2024-36357)

bpf: Fix oob access in cgroup local storage(CVE-2025-38502)

vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects(CVE-2025-39850)

tracing: Fix reading strings from synthetic events(CVE-2022-50255)

x86/mce: Work around an erratum on fast string copy instructions(CVE-2022-49124)

serial: 8250: fix panic due to PSLVERR(CVE-2025-39724)

fbcon: fix integer overflow in fbcon_do_set_font(CVE-2025-39967)

i40e: add max boundary check for VF filters(CVE-2025-39968)

scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id()(CVE-2023-53530)

scsi: qla2xxx: Fix premature hw access after PCI error(CVE-2022-49157)

vxlan: Fix NPD when refreshing an FDB entry with a nexthop object(CVE-2025-39851)

bpf, cpumap: Make sure kthread is running before map update returns(CVE-2023-53577)

scsi: qla4xxx: Add length check when parsing nlattrs(CVE-2023-53456)

bnxt: avoid overflow in bnxt_get_nvram_directory()(CVE-2023-53661)

scsi: ses: Fix slab-out-of-bounds in ses_intf_remove()(CVE-2023-53521)

pNFS: Fix uninited ptr deref in block/scsi layout(CVE-2025-38691)

udf: Fix uninitialized array access for some pathnames(CVE-2023-53165)

scsi: qla2xxx: Pointer may be dereferenced(CVE-2023-53150)

firewire: net: fix use after free in fwnet_finish_incoming_packet()(CVE-2023-53432)

i40e: fix MMIO write access to an invalid page in i40e_clear_hw(CVE-2025-38200)

RDMA/mlx5: Initialize obj_event-obj_sub_list before xa_insert(CVE-2025-38387)

usb: net: sierra: check for no status endpoint(CVE-2025-38474)

hv_netvsc: Fix panic during namespace deletion with VF(CVE-2025-38683)

ext4: improve error handling from ext4_dirhash()(CVE-2023-53473)

benet: fix BUG when creating VFs(CVE-2025-38569)

mm/slub: avoid accessing metadata when pointer is invalid in object_err()(CVE-2025-39902)

xfrm: Duplicate SPI Handling(CVE-2025-39797)

i40e: fix validation of VF state in get resources(CVE-2025-39969)

i40e: fix input validation logic for action_meta(CVE-2025-39970)

cnic: Fix use-after-free bugs in cnic_delete_task(CVE-2025-39945)

net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb(CVE-2023-53548)

bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT(CVE-2025-38439)

blk-mq: avoid double -queue_rq() because of early timeout(CVE-2022-50554)

NFSD: Define a proc_layoutcommit for the FlexFiles layout type(CVE-2025-40087)

tracing: dynevent: Add a missing lockdown check on dynevent(CVE-2025-40021)

ppp: fix memory leak in pad_compress_skb(CVE-2025-39847)

i40e: Fix potential invalid access when MAC list is empty(CVE-2025-39853)

IB/hfi1: Fix possible panic during hotplug remove(CVE-2023-53488)

vfs: Don't leak disconnected dentries on umount(CVE-2025-40105)

In kernel/trace/trace_kprobe.c at line 1308, the kprobe_perf_func function attempts to access the call- perf_events pointer, but due to the race condition, this pointer may not have been properly initialized.(CVE-2025-40042)

perf: arm_spe: Prevent overflow in PERF_IDX2OFF()(CVE-2025-40081)

crypto: essiv - Check ssize for decryption and in-place encryption(CVE-2025-40019)

loop: Avoid updating block size under exclusive owner(CVE-2025-38709)

usb: xhci: Apply the link chain quirk on NEC isoc endpoints(CVE-2025-22022)

nfsd: put dl_stid if fail to queue dl_recall(CVE-2025-22025)

PCI/ASPM: Fix link state exit during switch upstream function removal(CVE-2024-58093)

KVM: arm64: Prevent access to vCPU events before init(CVE-2025-40102)

HID: ignore non-functional sensor in HP 5MP Camera(CVE-2025-21992)

partitions: mac: fix handling of bogus partition table(CVE-2025-21772)

fs: udf: fix OOB read in lengthAllocDescs handling(CVE-2025-40044)

acpi: nfit: fix narrowing conversion in acpi_nfit_ctl(CVE-2025-22044)

crypto: rng - Ensure set_ent is always present(CVE-2025-40109)

scsi: qla2xxx: Fix memory leak in qla2x00_probe_one()(CVE-2023-53696)

drm/hisilicon/hibmc: fix the hibmc loaded failed bug(CVE-2025-39772)

uio_hv_generic: Let userspace take care of interrupt mask(CVE-2025-40048)

KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O(CVE-2025-40026)

ext4: detect invalid INLINE_DATA + EXTENTS flag combination(CVE-2025-40167)

scsi: ses: Fix possible desc_ptr out-of-bounds accesses(CVE-2023-53675)

fs: quota: create dedicated workqueue for quota_release_work(CVE-2025-40196)

crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg(CVE-2025-39964)

mtd: core: fix possible resource leak in init_mtd()(CVE-2022-50304)

RDMA/mlx5: Return the firmware result upon destroying QP/RQ(CVE-2023-53286)

bnxt_en: Fix memory corruption when FW resources change during ifdown(CVE-2025-39810)

RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish()(CVE-2023-53335)

fs: dlm: fix invalid derefence of sb_lvbptr(CVE-2022-50516)

scsi: mpt3sas: Fix a memory leak(CVE-2023-53512)

ext4: fix off-by-one errors in fast-commit block filling(CVE-2022-50428)

KVM: x86: Reset IRTE to host control if *new* route isn't postable(CVE-2025-37885)

PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type(CVE-2025-23161)

scsi: st: Fix array overflow in st_setup()(CVE-2025-37857)

isofs: Prevent the use of too small fid(CVE-2025-37780)

md/raid1,raid10: don't ignore IO flags(CVE-2025-22125)

virtiofs: add filesystem context source name check(CVE-2025-37773)

vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint(CVE-2025-22083)

crypto: af_alg - Set merge to zero early in af_alg_sendmsg(CVE-2025-39931)

modpost: fix off by one in is_executable_section()(CVE-2023-53397)

scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()(CVE-2025-40115)

net: bridge: fix soft lockup in br_multicast_query_expired()(CVE-2025-39773)

arm64: csum: Fix OoB access in IP checksum code for negative lengths(CVE-2023-53726)

x86/MCE: Always save CS register on AMD Zen IF Poison errors(CVE-2023-53438)

PCI: Fix reference leak in pci_register_host_bridge()(CVE-2025-37836)

cacheinfo: Fix shared_cpu_map to handle shared caches at different levels(CVE-2023-53254)

NFS: Fix the setting of capabilities when automounting a new filesystem(CVE-2025-39798)

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access(CVE-2024-21823)

mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory(CVE-2025-39883)

virtio_net: Fix error unwinding of XDP initialization(CVE-2023-53499)

RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device(CVE-2023-53393)

gfs2: No more self recovery(CVE-2025-38659)

scsi: target: Fix WRITE_SAME No Data Buffer crash(CVE-2022-21546)

cifs: Fix connections leak when tlink setup failed(CVE-2022-49822)

cifs: avoid NULL pointer dereference in dbg call(CVE-2025-37844)

smb3: fix for slab out of bounds on mount to ksmbd(CVE-2025-38728)

ceph: fix race condition validating r_parent before applying state(CVE-2025-39927)

cifs: fix small mempool leak in SMB2_negotiate()(CVE-2022-49938)

NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()(CVE-2025-39730)

smb: client: fix use-after-free in cifs_oplock_break(CVE-2025-38527)

scsi: qla2xxx: Fix potential NULL pointer dereference(CVE-2023-53451)

objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds()(CVE-2025-37937)

scsi: libiscsi: Initialize iscsi_conn-dd_data only if memory is allocated(CVE-2025-38700)

block: fix resource leak in blk_register_queue() error path(CVE-2025-37980)

scsi: target: Fix multiple LUN_RESET handling(CVE-2023-53586)

md/raid1: Fix stack memory use after return in raid1_reshape(CVE-2025-38445)

blk-mq: fix NULL dereference on q-elevator in blk_mq_elv_switch_none(CVE-2023-53292)

scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses(CVE-2023-7324)

nbd: restrict sockets to TCP and UDP(CVE-2025-40080)

scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()(CVE-2023-53676)

mm: hugetlb: avoid soft lockup when mprotect to large memory area(CVE-2025-40153)

fbdev: fix potential buffer overflow in do_register_framebuffer()(CVE-2025-38702)

net: ena: fix shift-out-of-bounds in exponential backoff(CVE-2023-53272)

software node: Correct a OOB check in software_node_get_reference_args()(CVE-2025-38342)

virtio: break and reset virtio devices on device_shutdown()(CVE-2025-38064)

net/sched: sch_qfq: Fix race condition on qfq_aggregate(CVE-2025-38477)

netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX(CVE-2025-38201)

qed: allow sleep in qed_mcp_trace_dump()(CVE-2023-53509)

vsock: Fix transport_* TOCTOU(CVE-2025-38461)

ice: Fix a null pointer dereference in ice_copy_and_init_pkg()(CVE-2025-38664)

tcp_metrics: use dst_dev_net_rcu()(CVE-2025-40075)

netfilter: nf_tables: reject duplicate device on updates(CVE-2025-38678)

ipvs: Defer ip_vs_ftp unregister during netns cleanup(CVE-2025-40018)

net/packet: fix a race in packet_set_ring() and packet_notifier()(CVE-2025-38617)

xfrm: Zero padding when dumping algos and encap(CVE-2023-53684)

ipv4: start using dst_dev_rcu()(CVE-2025-40074)

IB/mad: Don't call to function that might sleep while in atomic context(CVE-2022-50472)

iavf: Fix reset error handling(CVE-2022-50053)

RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug(CVE-2025-38024)

RDMA/bnxt_re: wraparound mbox producer index(CVE-2023-53201)

net/mlx5e: Check for NOT_READY flag state after locking(CVE-2023-53581)

i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path(CVE-2025-39911)

RDMA/rxe: Fix incomplete state save in rxe_requester(CVE-2023-53539)

net_sched: sch_sfq: reject invalid perturb period(CVE-2025-38193)

netfilter: conntrack: fix wrong ct-timeout value(CVE-2023-53635)

net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree(CVE-2025-38468)

vsock: Fix transport_{g2h,h2g} TOCTOU(CVE-2025-38462)

media: tuner: xc5000: Fix use-after-free in xc5000_release(CVE-2025-39994)

mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race(CVE-2025-38085)

media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()(CVE-2025-38694)

cifs: prevent NULL pointer dereference in UTF16 conversion(CVE-2025-39838)

sctp: linearize cloned gso packets in sctp_rcv(CVE-2025-38718)

mm/vmscan: don't try to reclaim hwpoison folio(CVE-2025-37834)

tun: Fix memory leak for detached NAPI queue.(CVE-2023-53685)

iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry()(CVE-2023-53476)

smb: client: fix race with concurrent opens in rename(2)(CVE-2025-39825)

Squashfs: check return result of sb_min_blocksize(CVE-2025-38415)

HID: multitouch: Correct devm device reference for hidinput input_dev name(CVE-2023-53454)

genirq/msi: Store the IOMMU IOVA directly in msi_desc instead of iommu_cookie(CVE-2025-38062)

pinctrl: check the return value of pinmux_ops::get_function_name()(CVE-2025-40030)

dm-stripe: fix a possible integer overflow(CVE-2025-39940)

scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write(CVE-2023-53282)

drm/vmwgfx: Fix a null-ptr access in the cursor snooper(CVE-2025-40110)

fs: Prevent file descriptor table allocations exceeding INT_MAX(CVE-2025-39756)

ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()(CVE-2025-40198)

tty: n_gsm: fix deadlock and link starvation in outgoing data path(CVE-2022-50116)

sctp: Fix MAC comparison to be constant-time(CVE-2025-40204)

tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().(CVE-2025-40186)

scsi: storvsc: Fix handling of virtual Fibre Channel timeouts(CVE-2023-53245)

media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()(CVE-2025-39713)

media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove(CVE-2025-39996)

nubus: Partially revert proc_create_single_data() conversion(CVE-2023-53217)

scsi: qla2xxx: Fix deletion race condition(CVE-2023-53615)

Squashfs: fix uninit-value in squashfs_get_parent(CVE-2025-40049)

RDMA/hns: Fix double destruction of rsv_qp(CVE-2025-38582)

cifs: parse_dfs_referrals: prevent oob on malformed input(CVE-2025-40099)

net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error(CVE-2025-21924)

net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer(CVE-2025-39937)

bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls(CVE-2025-38608)

ACPI: CPPC: Make rmw_lock a raw_spin_lock(CVE-2024-50249)

ACPI: video: Fix use-after-free in acpi_video_switch_brightness()(CVE-2025-40211)

smb: client: Fix refcount leak for cifs_sb_tlink(CVE-2025-40103)

nfsd: decrease sc_count directly if fail to queue dl_recall(CVE-2025-37871)

iommu/amd: Avoid stack buffer overflow from kernel cmdline(CVE-2025-38676)

crypto: hisilicon/qm - set NULL to qm-debug.qm_diff_regs(CVE-2025-40062)

dma-buf: insert memory barrier before updating num_fences(CVE-2025-38095)

mm/hugetlb: fix folio is still mapped when deleted(CVE-2025-40006)

ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered(CVE-2025-39763)

crypto: hisilicon/qm - request reserved interrupt for virtual function(CVE-2025-40136)

gfs2: Fix possible data races in gfs2_show_options()(CVE-2023-53622)

mm/vmscan: fix hwpoisoned large folio handling in shrink_folio_list(CVE-2025-39725)

fs/proc: fix uaf in proc_readdir_de()(CVE-2025-40271)

powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe()(CVE-2022-50635)

be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site.(CVE-2025-40264)

fuse: fix livelock in synchronous file put from fuseblk workers(CVE-2025-40220)

sctp: avoid NULL dereference when chunk data buffer is missing(CVE-2025-40240)

tipc: Fix use-after-free in tipc_mon_reinit_self().(CVE-2025-40280)

sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto(CVE-2025-40281)

scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show()(CVE-2025-68229)

libceph: fix potential use-after-free in have_mon_and_osd_map()(CVE-2025-68285)

RDMA/core: Fix 'KASAN: slab-use-after-free Read in ib_register_device' problem(CVE-2025-38022)

usbnet: Fix using smp_processor_id() in preemptible code warnings(CVE-2025-40164)

scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT(CVE-2022-49534)

NFSD: fix race between nfsd registration and exports_proc(CVE-2025-38232)

scsi: target: target_core_configfs: Add length check to avoid buffer overflow(CVE-2025-39998)

nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()(CVE-2025-38724)

nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request(CVE-2025-38430)

HID: core: Harden s32ton() against conversion to 0 bits(CVE-2025-38556)

iavf: Fix out-of-bounds when setting channels on remove(CVE-2023-53659)

start_kernel: Add __no_stack_protector function attribute(CVE-2023-53491)

efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare(CVE-2025-39817)

drm/scheduler: fix fence ref counting(CVE-2022-49829)

scsi: qla2xxx: Wait for io return on terminate rport(CVE-2023-53322)

scsi: lpfc: Fix buffer free/clear order in deferred receive path(CVE-2025-39841)

tcp: Clear tcp_sk(sk)-fastopen_rsk in tcp_disconnect().(CVE-2025-39955)

icmp6: Fix null-ptr-deref of ip6_null_entry-rt6i_idev in icmp6_dev().(CVE-2023-53343)

cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()(CVE-2025-40194)

i40e: remove read access to debugfs files(CVE-2025-39901)

nexthop: Forbid FDB status change while nexthop is in a group(CVE-2025-39980)

netdevsim: fix memory leak in nsim_drv_probe() when nsim_dev_resources_register() failed(CVE-2022-50500)

nfsd: call op_release, even when op_func returns an error(CVE-2023-53241)

media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID(CVE-2025-40016)

igb: Fix igb_down hung on surprise removal(CVE-2023-53148)

__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock(CVE-2025-38058)

ext4: guard against EA inode refcount underflow in xattr update(CVE-2025-40190)

ipv6: reject malicious packets in ipv6_gso_segment()(CVE-2025-38572)

scsi: core: Fix possible memory leak if device_add() fails(CVE-2023-53174)

md/raid10: fix wrong setting of max_corr_read_errors(CVE-2023-53313)

lwt: Fix return values of BPF xmit ops(CVE-2023-53338)

netfilter: ctnetlink: fix refcount leak on table dump(CVE-2025-38721)

netfilter: ctnetlink: remove refcounting in expectation dumpers(CVE-2025-39764)

netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm(CVE-2025-39894)

blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx(CVE-2025-40125)

cifs: Release folio lock on fscache read hit.(CVE-2023-53593)

io_uring: wait interruptibly for request completions on exit(CVE-2023-53461)

net: dlink: handle copy_thresh allocation failure(CVE-2025-40053)

net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast(CVE-2025-40140)

i40e: fix idx validation in i40e_validate_queue_map(CVE-2025-39972)

net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM(CVE-2025-39770)

ipv6: use RCU in ip6_xmit()(CVE-2025-40135)

pstore/ram: Check start of empty przs during init(CVE-2023-53331)

ipv6: use RCU in ip6_output()(CVE-2025-40158)

net: use dst_dev_rcu() in sk_setup_caps()(CVE-2025-40170)

KVM: x86: use array_index_nospec with indices that come from guest(CVE-2025-39823)

vxlan: Annotate FDB data races(CVE-2025-38037)

drm/vmwgfx: Fix Use-after-free in validation(CVE-2025-40111)

cifs: fix mid leak during reconnection after timeout threshold(CVE-2023-53597)

xfs: do not propagate ENODATA disk errors into xattr code(CVE-2025-39835)

of: check previous kernel's ima-kexec-buffer against memory bounds(CVE-2022-50159)

Squashfs: reject negative file sizes in squashfs_read_inode()(CVE-2025-40200)

skmsg: Fix wrong last sg check in sk_msg_recvmsg()(CVE-2022-49973)

mm/smaps: fix race between smaps_hugetlb_range and migration(CVE-2025-39754)

Drivers: hv: vmbus: Don't dereference ACPI root object handle(CVE-2023-53647)

scsi: qla4xxx: Prevent a potential error pointer dereference(CVE-2025-39676)

Tenable has extracted the preceding description block directly from the EulerOS kernel security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel packages.

See Also

http://www.nessus.org/u?881edd78

Plugin Details

Severity: High

ID: 302584

File Name: EulerOS_SA-2026-1610.nasl

Version: 1.1

Type: local

Published: 3/16/2026

Updated: 3/16/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-39967

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:kernel-tools-libs, p-cpe:/a:huawei:euleros:bpftool, p-cpe:/a:huawei:euleros:kernel-tools, p-cpe:/a:huawei:euleros:kernel, p-cpe:/a:huawei:euleros:python3-perf, p-cpe:/a:huawei:euleros:kernel-abi-stablelists, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/17/2026

Vulnerability Publication Date: 7/21/2021

Reference Information

CVE: CVE-2022-21546, CVE-2022-49124, CVE-2022-49157, CVE-2022-49534, CVE-2022-49822, CVE-2022-49829, CVE-2022-49938, CVE-2022-49973, CVE-2022-50053, CVE-2022-50116, CVE-2022-50159, CVE-2022-50255, CVE-2022-50304, CVE-2022-50428, CVE-2022-50472, CVE-2022-50500, CVE-2022-50516, CVE-2022-50554, CVE-2022-50635, CVE-2023-53148, CVE-2023-53150, CVE-2023-53165, CVE-2023-53174, CVE-2023-53201, CVE-2023-53217, CVE-2023-53241, CVE-2023-53245, CVE-2023-53254, CVE-2023-53272, CVE-2023-53282, CVE-2023-53286, CVE-2023-53292, CVE-2023-53313, CVE-2023-53322, CVE-2023-53331, CVE-2023-53335, CVE-2023-53338, CVE-2023-53343, CVE-2023-53393, CVE-2023-53397, CVE-2023-53432, CVE-2023-53438, CVE-2023-53451, CVE-2023-53454, CVE-2023-53456, CVE-2023-53461, CVE-2023-53473, CVE-2023-53476, CVE-2023-53488, CVE-2023-53491, CVE-2023-53499, CVE-2023-53509, CVE-2023-53512, CVE-2023-53521, CVE-2023-53530, CVE-2023-53539, CVE-2023-53548, CVE-2023-53577, CVE-2023-53581, CVE-2023-53586, CVE-2023-53593, CVE-2023-53597, CVE-2023-53615, CVE-2023-53622, CVE-2023-53635, CVE-2023-53647, CVE-2023-53659, CVE-2023-53661, CVE-2023-53675, CVE-2023-53676, CVE-2023-53684, CVE-2023-53685, CVE-2023-53696, CVE-2023-53726, CVE-2023-7324, CVE-2024-21823, CVE-2024-36357, CVE-2024-50249, CVE-2024-58093, CVE-2025-21772, CVE-2025-21924, CVE-2025-21992, CVE-2025-22022, CVE-2025-22025, CVE-2025-22044, CVE-2025-22083, CVE-2025-22125, CVE-2025-23161, CVE-2025-37773, CVE-2025-37780, CVE-2025-37834, CVE-2025-37836, CVE-2025-37844, CVE-2025-37857, CVE-2025-37871, CVE-2025-37885, CVE-2025-37937, CVE-2025-37980, CVE-2025-38022, CVE-2025-38024, CVE-2025-38037, CVE-2025-38058, CVE-2025-38062, CVE-2025-38064, CVE-2025-38085, CVE-2025-38095, CVE-2025-38193, CVE-2025-38200, CVE-2025-38201, CVE-2025-38232, CVE-2025-38342, CVE-2025-38387, CVE-2025-38415, CVE-2025-38430, CVE-2025-38439, CVE-2025-38445, CVE-2025-38461, CVE-2025-38462, CVE-2025-38468, CVE-2025-38474, CVE-2025-38477, CVE-2025-38502, CVE-2025-38527, CVE-2025-38556, CVE-2025-38569, CVE-2025-38572, CVE-2025-38582, CVE-2025-38608, CVE-2025-38617, CVE-2025-38659, CVE-2025-38664, CVE-2025-38676, CVE-2025-38678, CVE-2025-38683, CVE-2025-38691, CVE-2025-38694, CVE-2025-38700, CVE-2025-38702, CVE-2025-38709, CVE-2025-38718, CVE-2025-38721, CVE-2025-38724, CVE-2025-38728, CVE-2025-39676, CVE-2025-39713, CVE-2025-39724, CVE-2025-39725, CVE-2025-39730, CVE-2025-39754, CVE-2025-39756, CVE-2025-39763, CVE-2025-39764, CVE-2025-39770, CVE-2025-39772, CVE-2025-39773, CVE-2025-39797, CVE-2025-39798, CVE-2025-39810, CVE-2025-39817, CVE-2025-39823, CVE-2025-39825, CVE-2025-39835, CVE-2025-39838, CVE-2025-39841, CVE-2025-39847, CVE-2025-39850, CVE-2025-39851, CVE-2025-39853, CVE-2025-39883, CVE-2025-39894, CVE-2025-39901, CVE-2025-39902, CVE-2025-39911, CVE-2025-39927, CVE-2025-39931, CVE-2025-39937, CVE-2025-39940, CVE-2025-39945, CVE-2025-39955, CVE-2025-39964, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39972, CVE-2025-39980, CVE-2025-39994, CVE-2025-39996, CVE-2025-39998, CVE-2025-40006, CVE-2025-40016, CVE-2025-40018, CVE-2025-40019, CVE-2025-40021, CVE-2025-40026, CVE-2025-40030, CVE-2025-40042, CVE-2025-40044, CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40062, CVE-2025-40074, CVE-2025-40075, CVE-2025-40080, CVE-2025-40081, CVE-2025-40087, CVE-2025-40099, CVE-2025-40102, CVE-2025-40103, CVE-2025-40105, CVE-2025-40109, CVE-2025-40110, CVE-2025-40111, CVE-2025-40115, CVE-2025-40125, CVE-2025-40135, CVE-2025-40136, CVE-2025-40140, CVE-2025-40153, CVE-2025-40158, CVE-2025-40164, CVE-2025-40167, CVE-2025-40170, CVE-2025-40186, CVE-2025-40190, CVE-2025-40194, CVE-2025-40196, CVE-2025-40198, CVE-2025-40200, CVE-2025-40204, CVE-2025-40211, CVE-2025-40220, CVE-2025-40240, CVE-2025-40264, CVE-2025-40271, CVE-2025-40280, CVE-2025-40281, CVE-2025-68229, CVE-2025-68285