Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-50338 (GCVE-0-2022-50338)
Vulnerability from cvelistv5
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/android/binder_alloc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "27a594bc7a7c8238d239e3cdbcf2edfa3bbe9a1b", "status": "affected", "version": "dd2283f2605e3b3e9c61bcae844b34f2afa4813f", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/android/binder_alloc.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.20" }, { "lessThan": "4.20", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.224", "versionType": "semver" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.4.224", "versionStartIncluding": "4.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix UAF of alloc-\u003evma in race with munmap()\n\nIn commit 720c24192404 (\"ANDROID: binder: change down_write to\ndown_read\") binder assumed the mmap read lock is sufficient to protect\nalloc-\u003evma inside binder_update_page_range(). This used to be accurate\nuntil commit dd2283f2605e (\"mm: mmap: zap pages with read mmap_sem in\nmunmap\"), which now downgrades the mmap_lock after detaching the vma\nfrom the rbtree in munmap(). Then it proceeds to teardown and free the\nvma with only the read lock held.\n\nThis means that accesses to alloc-\u003evma in binder_update_page_range() now\nwill race with vm_area_free() in munmap() and can cause a UAF as shown\nin the following KASAN trace:\n\n ==================================================================\n BUG: KASAN: use-after-free in vm_insert_page+0x7c/0x1f0\n Read of size 8 at addr ffff16204ad00600 by task server/558\n\n CPU: 3 PID: 558 Comm: server Not tainted 5.10.150-00001-gdc8dcf942daa #1\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n dump_backtrace+0x0/0x2a0\n show_stack+0x18/0x2c\n dump_stack+0xf8/0x164\n print_address_description.constprop.0+0x9c/0x538\n kasan_report+0x120/0x200\n __asan_load8+0xa0/0xc4\n vm_insert_page+0x7c/0x1f0\n binder_update_page_range+0x278/0x50c\n binder_alloc_new_buf+0x3f0/0xba0\n binder_transaction+0x64c/0x3040\n binder_thread_write+0x924/0x2020\n binder_ioctl+0x1610/0x2e5c\n __arm64_sys_ioctl+0xd4/0x120\n el0_svc_common.constprop.0+0xac/0x270\n do_el0_svc+0x38/0xa0\n el0_svc+0x1c/0x2c\n el0_sync_handler+0xe8/0x114\n el0_sync+0x180/0x1c0\n\n Allocated by task 559:\n kasan_save_stack+0x38/0x6c\n __kasan_kmalloc.constprop.0+0xe4/0xf0\n kasan_slab_alloc+0x18/0x2c\n kmem_cache_alloc+0x1b0/0x2d0\n vm_area_alloc+0x28/0x94\n mmap_region+0x378/0x920\n do_mmap+0x3f0/0x600\n vm_mmap_pgoff+0x150/0x17c\n ksys_mmap_pgoff+0x284/0x2dc\n __arm64_sys_mmap+0x84/0xa4\n el0_svc_common.constprop.0+0xac/0x270\n do_el0_svc+0x38/0xa0\n el0_svc+0x1c/0x2c\n el0_sync_handler+0xe8/0x114\n el0_sync+0x180/0x1c0\n\n Freed by task 560:\n kasan_save_stack+0x38/0x6c\n kasan_set_track+0x28/0x40\n kasan_set_free_info+0x24/0x4c\n __kasan_slab_free+0x100/0x164\n kasan_slab_free+0x14/0x20\n kmem_cache_free+0xc4/0x34c\n vm_area_free+0x1c/0x2c\n remove_vma+0x7c/0x94\n __do_munmap+0x358/0x710\n __vm_munmap+0xbc/0x130\n __arm64_sys_munmap+0x4c/0x64\n el0_svc_common.constprop.0+0xac/0x270\n do_el0_svc+0x38/0xa0\n el0_svc+0x1c/0x2c\n el0_sync_handler+0xe8/0x114\n el0_sync+0x180/0x1c0\n\n [...]\n ==================================================================\n\nTo prevent the race above, revert back to taking the mmap write lock\ninside binder_update_page_range(). One might expect an increase of mmap\nlock contention. However, binder already serializes these calls via top\nlevel alloc-\u003emutex. Also, there was no performance impact shown when\nrunning the binder benchmark tests.\n\nNote this patch is specific to stable branches 5.4 and 5.10. Since in\nnewer kernel releases binder no longer caches a pointer to the vma.\nInstead, it has been refactored to use vma_lookup() which avoids the\nissue described here. This switch was introduced in commit a43cfc87caaf\n(\"android: binder: stop saving a pointer to the VMA\")." } ], "providerMetadata": { "dateUpdated": "2025-09-15T14:49:54.384Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/27a594bc7a7c8238d239e3cdbcf2edfa3bbe9a1b" } ], "title": "binder: fix UAF of alloc-\u003evma in race with munmap()", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2022-50338", "datePublished": "2025-09-15T14:49:54.384Z", "dateReserved": "2025-09-15T14:18:36.817Z", "dateUpdated": "2025-09-15T14:49:54.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-50338\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-15T15:15:46.160\",\"lastModified\":\"2025-09-15T15:22:27.090\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbinder: fix UAF of alloc-\u003evma in race with munmap()\\n\\nIn commit 720c24192404 (\\\"ANDROID: binder: change down_write to\\ndown_read\\\") binder assumed the mmap read lock is sufficient to protect\\nalloc-\u003evma inside binder_update_page_range(). This used to be accurate\\nuntil commit dd2283f2605e (\\\"mm: mmap: zap pages with read mmap_sem in\\nmunmap\\\"), which now downgrades the mmap_lock after detaching the vma\\nfrom the rbtree in munmap(). Then it proceeds to teardown and free the\\nvma with only the read lock held.\\n\\nThis means that accesses to alloc-\u003evma in binder_update_page_range() now\\nwill race with vm_area_free() in munmap() and can cause a UAF as shown\\nin the following KASAN trace:\\n\\n ==================================================================\\n BUG: KASAN: use-after-free in vm_insert_page+0x7c/0x1f0\\n Read of size 8 at addr ffff16204ad00600 by task server/558\\n\\n CPU: 3 PID: 558 Comm: server Not tainted 5.10.150-00001-gdc8dcf942daa #1\\n Hardware name: linux,dummy-virt (DT)\\n Call trace:\\n dump_backtrace+0x0/0x2a0\\n show_stack+0x18/0x2c\\n dump_stack+0xf8/0x164\\n print_address_description.constprop.0+0x9c/0x538\\n kasan_report+0x120/0x200\\n __asan_load8+0xa0/0xc4\\n vm_insert_page+0x7c/0x1f0\\n binder_update_page_range+0x278/0x50c\\n binder_alloc_new_buf+0x3f0/0xba0\\n binder_transaction+0x64c/0x3040\\n binder_thread_write+0x924/0x2020\\n binder_ioctl+0x1610/0x2e5c\\n __arm64_sys_ioctl+0xd4/0x120\\n el0_svc_common.constprop.0+0xac/0x270\\n do_el0_svc+0x38/0xa0\\n el0_svc+0x1c/0x2c\\n el0_sync_handler+0xe8/0x114\\n el0_sync+0x180/0x1c0\\n\\n Allocated by task 559:\\n kasan_save_stack+0x38/0x6c\\n __kasan_kmalloc.constprop.0+0xe4/0xf0\\n kasan_slab_alloc+0x18/0x2c\\n kmem_cache_alloc+0x1b0/0x2d0\\n vm_area_alloc+0x28/0x94\\n mmap_region+0x378/0x920\\n do_mmap+0x3f0/0x600\\n vm_mmap_pgoff+0x150/0x17c\\n ksys_mmap_pgoff+0x284/0x2dc\\n __arm64_sys_mmap+0x84/0xa4\\n el0_svc_common.constprop.0+0xac/0x270\\n do_el0_svc+0x38/0xa0\\n el0_svc+0x1c/0x2c\\n el0_sync_handler+0xe8/0x114\\n el0_sync+0x180/0x1c0\\n\\n Freed by task 560:\\n kasan_save_stack+0x38/0x6c\\n kasan_set_track+0x28/0x40\\n kasan_set_free_info+0x24/0x4c\\n __kasan_slab_free+0x100/0x164\\n kasan_slab_free+0x14/0x20\\n kmem_cache_free+0xc4/0x34c\\n vm_area_free+0x1c/0x2c\\n remove_vma+0x7c/0x94\\n __do_munmap+0x358/0x710\\n __vm_munmap+0xbc/0x130\\n __arm64_sys_munmap+0x4c/0x64\\n el0_svc_common.constprop.0+0xac/0x270\\n do_el0_svc+0x38/0xa0\\n el0_svc+0x1c/0x2c\\n el0_sync_handler+0xe8/0x114\\n el0_sync+0x180/0x1c0\\n\\n [...]\\n ==================================================================\\n\\nTo prevent the race above, revert back to taking the mmap write lock\\ninside binder_update_page_range(). One might expect an increase of mmap\\nlock contention. However, binder already serializes these calls via top\\nlevel alloc-\u003emutex. Also, there was no performance impact shown when\\nrunning the binder benchmark tests.\\n\\nNote this patch is specific to stable branches 5.4 and 5.10. Since in\\nnewer kernel releases binder no longer caches a pointer to the vma.\\nInstead, it has been refactored to use vma_lookup() which avoids the\\nissue described here. This switch was introduced in commit a43cfc87caaf\\n(\\\"android: binder: stop saving a pointer to the VMA\\\").\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/27a594bc7a7c8238d239e3cdbcf2edfa3bbe9a1b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
fkie_cve-2022-50338
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix UAF of alloc-\u003evma in race with munmap()\n\nIn commit 720c24192404 (\"ANDROID: binder: change down_write to\ndown_read\") binder assumed the mmap read lock is sufficient to protect\nalloc-\u003evma inside binder_update_page_range(). This used to be accurate\nuntil commit dd2283f2605e (\"mm: mmap: zap pages with read mmap_sem in\nmunmap\"), which now downgrades the mmap_lock after detaching the vma\nfrom the rbtree in munmap(). Then it proceeds to teardown and free the\nvma with only the read lock held.\n\nThis means that accesses to alloc-\u003evma in binder_update_page_range() now\nwill race with vm_area_free() in munmap() and can cause a UAF as shown\nin the following KASAN trace:\n\n ==================================================================\n BUG: KASAN: use-after-free in vm_insert_page+0x7c/0x1f0\n Read of size 8 at addr ffff16204ad00600 by task server/558\n\n CPU: 3 PID: 558 Comm: server Not tainted 5.10.150-00001-gdc8dcf942daa #1\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n dump_backtrace+0x0/0x2a0\n show_stack+0x18/0x2c\n dump_stack+0xf8/0x164\n print_address_description.constprop.0+0x9c/0x538\n kasan_report+0x120/0x200\n __asan_load8+0xa0/0xc4\n vm_insert_page+0x7c/0x1f0\n binder_update_page_range+0x278/0x50c\n binder_alloc_new_buf+0x3f0/0xba0\n binder_transaction+0x64c/0x3040\n binder_thread_write+0x924/0x2020\n binder_ioctl+0x1610/0x2e5c\n __arm64_sys_ioctl+0xd4/0x120\n el0_svc_common.constprop.0+0xac/0x270\n do_el0_svc+0x38/0xa0\n el0_svc+0x1c/0x2c\n el0_sync_handler+0xe8/0x114\n el0_sync+0x180/0x1c0\n\n Allocated by task 559:\n kasan_save_stack+0x38/0x6c\n __kasan_kmalloc.constprop.0+0xe4/0xf0\n kasan_slab_alloc+0x18/0x2c\n kmem_cache_alloc+0x1b0/0x2d0\n vm_area_alloc+0x28/0x94\n mmap_region+0x378/0x920\n do_mmap+0x3f0/0x600\n vm_mmap_pgoff+0x150/0x17c\n ksys_mmap_pgoff+0x284/0x2dc\n __arm64_sys_mmap+0x84/0xa4\n el0_svc_common.constprop.0+0xac/0x270\n do_el0_svc+0x38/0xa0\n el0_svc+0x1c/0x2c\n el0_sync_handler+0xe8/0x114\n el0_sync+0x180/0x1c0\n\n Freed by task 560:\n kasan_save_stack+0x38/0x6c\n kasan_set_track+0x28/0x40\n kasan_set_free_info+0x24/0x4c\n __kasan_slab_free+0x100/0x164\n kasan_slab_free+0x14/0x20\n kmem_cache_free+0xc4/0x34c\n vm_area_free+0x1c/0x2c\n remove_vma+0x7c/0x94\n __do_munmap+0x358/0x710\n __vm_munmap+0xbc/0x130\n __arm64_sys_munmap+0x4c/0x64\n el0_svc_common.constprop.0+0xac/0x270\n do_el0_svc+0x38/0xa0\n el0_svc+0x1c/0x2c\n el0_sync_handler+0xe8/0x114\n el0_sync+0x180/0x1c0\n\n [...]\n ==================================================================\n\nTo prevent the race above, revert back to taking the mmap write lock\ninside binder_update_page_range(). One might expect an increase of mmap\nlock contention. However, binder already serializes these calls via top\nlevel alloc-\u003emutex. Also, there was no performance impact shown when\nrunning the binder benchmark tests.\n\nNote this patch is specific to stable branches 5.4 and 5.10. Since in\nnewer kernel releases binder no longer caches a pointer to the vma.\nInstead, it has been refactored to use vma_lookup() which avoids the\nissue described here. This switch was introduced in commit a43cfc87caaf\n(\"android: binder: stop saving a pointer to the VMA\")." } ], "id": "CVE-2022-50338", "lastModified": "2025-09-15T15:22:27.090", "metrics": {}, "published": "2025-09-15T15:15:46.160", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/27a594bc7a7c8238d239e3cdbcf2edfa3bbe9a1b" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
ghsa-67wm-vqh6-323h
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
binder: fix UAF of alloc->vma in race with munmap()
In commit 720c24192404 ("ANDROID: binder: change down_write to down_read") binder assumed the mmap read lock is sufficient to protect alloc->vma inside binder_update_page_range(). This used to be accurate until commit dd2283f2605e ("mm: mmap: zap pages with read mmap_sem in munmap"), which now downgrades the mmap_lock after detaching the vma from the rbtree in munmap(). Then it proceeds to teardown and free the vma with only the read lock held.
This means that accesses to alloc->vma in binder_update_page_range() now will race with vm_area_free() in munmap() and can cause a UAF as shown in the following KASAN trace:
================================================================== BUG: KASAN: use-after-free in vm_insert_page+0x7c/0x1f0 Read of size 8 at addr ffff16204ad00600 by task server/558
CPU: 3 PID: 558 Comm: server Not tainted 5.10.150-00001-gdc8dcf942daa #1 Hardware name: linux,dummy-virt (DT) Call trace: dump_backtrace+0x0/0x2a0 show_stack+0x18/0x2c dump_stack+0xf8/0x164 print_address_description.constprop.0+0x9c/0x538 kasan_report+0x120/0x200 __asan_load8+0xa0/0xc4 vm_insert_page+0x7c/0x1f0 binder_update_page_range+0x278/0x50c binder_alloc_new_buf+0x3f0/0xba0 binder_transaction+0x64c/0x3040 binder_thread_write+0x924/0x2020 binder_ioctl+0x1610/0x2e5c __arm64_sys_ioctl+0xd4/0x120 el0_svc_common.constprop.0+0xac/0x270 do_el0_svc+0x38/0xa0 el0_svc+0x1c/0x2c el0_sync_handler+0xe8/0x114 el0_sync+0x180/0x1c0
Allocated by task 559: kasan_save_stack+0x38/0x6c __kasan_kmalloc.constprop.0+0xe4/0xf0 kasan_slab_alloc+0x18/0x2c kmem_cache_alloc+0x1b0/0x2d0 vm_area_alloc+0x28/0x94 mmap_region+0x378/0x920 do_mmap+0x3f0/0x600 vm_mmap_pgoff+0x150/0x17c ksys_mmap_pgoff+0x284/0x2dc __arm64_sys_mmap+0x84/0xa4 el0_svc_common.constprop.0+0xac/0x270 do_el0_svc+0x38/0xa0 el0_svc+0x1c/0x2c el0_sync_handler+0xe8/0x114 el0_sync+0x180/0x1c0
Freed by task 560: kasan_save_stack+0x38/0x6c kasan_set_track+0x28/0x40 kasan_set_free_info+0x24/0x4c __kasan_slab_free+0x100/0x164 kasan_slab_free+0x14/0x20 kmem_cache_free+0xc4/0x34c vm_area_free+0x1c/0x2c remove_vma+0x7c/0x94 __do_munmap+0x358/0x710 __vm_munmap+0xbc/0x130 __arm64_sys_munmap+0x4c/0x64 el0_svc_common.constprop.0+0xac/0x270 do_el0_svc+0x38/0xa0 el0_svc+0x1c/0x2c el0_sync_handler+0xe8/0x114 el0_sync+0x180/0x1c0
[...] ==================================================================
To prevent the race above, revert back to taking the mmap write lock inside binder_update_page_range(). One might expect an increase of mmap lock contention. However, binder already serializes these calls via top level alloc->mutex. Also, there was no performance impact shown when running the binder benchmark tests.
Note this patch is specific to stable branches 5.4 and 5.10. Since in newer kernel releases binder no longer caches a pointer to the vma. Instead, it has been refactored to use vma_lookup() which avoids the issue described here. This switch was introduced in commit a43cfc87caaf ("android: binder: stop saving a pointer to the VMA").
{ "affected": [], "aliases": [ "CVE-2022-50338" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-09-15T15:15:46Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix UAF of alloc-\u003evma in race with munmap()\n\nIn commit 720c24192404 (\"ANDROID: binder: change down_write to\ndown_read\") binder assumed the mmap read lock is sufficient to protect\nalloc-\u003evma inside binder_update_page_range(). This used to be accurate\nuntil commit dd2283f2605e (\"mm: mmap: zap pages with read mmap_sem in\nmunmap\"), which now downgrades the mmap_lock after detaching the vma\nfrom the rbtree in munmap(). Then it proceeds to teardown and free the\nvma with only the read lock held.\n\nThis means that accesses to alloc-\u003evma in binder_update_page_range() now\nwill race with vm_area_free() in munmap() and can cause a UAF as shown\nin the following KASAN trace:\n\n ==================================================================\n BUG: KASAN: use-after-free in vm_insert_page+0x7c/0x1f0\n Read of size 8 at addr ffff16204ad00600 by task server/558\n\n CPU: 3 PID: 558 Comm: server Not tainted 5.10.150-00001-gdc8dcf942daa #1\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n dump_backtrace+0x0/0x2a0\n show_stack+0x18/0x2c\n dump_stack+0xf8/0x164\n print_address_description.constprop.0+0x9c/0x538\n kasan_report+0x120/0x200\n __asan_load8+0xa0/0xc4\n vm_insert_page+0x7c/0x1f0\n binder_update_page_range+0x278/0x50c\n binder_alloc_new_buf+0x3f0/0xba0\n binder_transaction+0x64c/0x3040\n binder_thread_write+0x924/0x2020\n binder_ioctl+0x1610/0x2e5c\n __arm64_sys_ioctl+0xd4/0x120\n el0_svc_common.constprop.0+0xac/0x270\n do_el0_svc+0x38/0xa0\n el0_svc+0x1c/0x2c\n el0_sync_handler+0xe8/0x114\n el0_sync+0x180/0x1c0\n\n Allocated by task 559:\n kasan_save_stack+0x38/0x6c\n __kasan_kmalloc.constprop.0+0xe4/0xf0\n kasan_slab_alloc+0x18/0x2c\n kmem_cache_alloc+0x1b0/0x2d0\n vm_area_alloc+0x28/0x94\n mmap_region+0x378/0x920\n do_mmap+0x3f0/0x600\n vm_mmap_pgoff+0x150/0x17c\n ksys_mmap_pgoff+0x284/0x2dc\n __arm64_sys_mmap+0x84/0xa4\n el0_svc_common.constprop.0+0xac/0x270\n do_el0_svc+0x38/0xa0\n el0_svc+0x1c/0x2c\n el0_sync_handler+0xe8/0x114\n el0_sync+0x180/0x1c0\n\n Freed by task 560:\n kasan_save_stack+0x38/0x6c\n kasan_set_track+0x28/0x40\n kasan_set_free_info+0x24/0x4c\n __kasan_slab_free+0x100/0x164\n kasan_slab_free+0x14/0x20\n kmem_cache_free+0xc4/0x34c\n vm_area_free+0x1c/0x2c\n remove_vma+0x7c/0x94\n __do_munmap+0x358/0x710\n __vm_munmap+0xbc/0x130\n __arm64_sys_munmap+0x4c/0x64\n el0_svc_common.constprop.0+0xac/0x270\n do_el0_svc+0x38/0xa0\n el0_svc+0x1c/0x2c\n el0_sync_handler+0xe8/0x114\n el0_sync+0x180/0x1c0\n\n [...]\n ==================================================================\n\nTo prevent the race above, revert back to taking the mmap write lock\ninside binder_update_page_range(). One might expect an increase of mmap\nlock contention. However, binder already serializes these calls via top\nlevel alloc-\u003emutex. Also, there was no performance impact shown when\nrunning the binder benchmark tests.\n\nNote this patch is specific to stable branches 5.4 and 5.10. Since in\nnewer kernel releases binder no longer caches a pointer to the vma.\nInstead, it has been refactored to use vma_lookup() which avoids the\nissue described here. This switch was introduced in commit a43cfc87caaf\n(\"android: binder: stop saving a pointer to the VMA\").", "id": "GHSA-67wm-vqh6-323h", "modified": "2025-09-15T15:31:28Z", "published": "2025-09-15T15:31:28Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50338" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/27a594bc7a7c8238d239e3cdbcf2edfa3bbe9a1b" } ], "schema_version": "1.4.0", "severity": [] }
wid-sec-w-2025-2053
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht n\u00e4her beschriebene Auswirkungen zu erzielen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-2053 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2053.json" }, { "category": "self", "summary": "WID-SEC-2025-2053 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2053" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50234", "url": "https://lore.kernel.org/linux-cve-announce/2025091545-CVE-2022-50234-bd01@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50235", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50235-a5c0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50236", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50236-dc41@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50239", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50239-3908@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50240", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50240-6e40@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50241", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50241-0f92@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50242", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50242-9a25@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50243", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50243-4311@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50244", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50244-4e09@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50245", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50245-57e4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50246", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50246-d173@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50247", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50247-1ab7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50248", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50248-edcb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50249", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50249-bfbe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50250", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50250-1be1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50251", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50251-c216@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50252", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50252-5c96@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50253", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50253-1ed7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50254", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50254-c910@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50255", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50255-c5ec@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50256", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50256-069f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50257", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50257-648e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50258", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50258-1497@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50259", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50259-6276@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50260", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50260-a136@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50261", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50261-9892@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50262", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2022-50262-0645@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50263", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2022-50263-040c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50264", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50264-3988@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50265", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50265-509d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50266", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50266-9532@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50267", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50267-2de9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50268", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50268-bcdf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50269", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50269-24d9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50270", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50270-5b28@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50271", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50271-2175@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50272", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50272-4120@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50273", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50273-5521@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50274", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50274-ad8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50275", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50275-2ef2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50276", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50276-e9a6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50277", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50277-085f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50278", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50278-fcc9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50279", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50279-412b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50280", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50280-762f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50281", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50281-f141@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50282", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50282-322d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50283", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50283-d21e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50284", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50284-b5c2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50285", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50285-955c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50286", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50286-b313@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50287", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50287-a3ce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50288", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50288-3421@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50289", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50289-1532@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50290", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50290-a7af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50291", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50291-82e7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50292", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50292-cb74@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50293", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50293-2dbe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50294", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50294-7c87@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50295", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50295-8141@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50296", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50296-7d7e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50297", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50297-974e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50298", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50298-06f8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50299", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50299-9449@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50300", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50300-203c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50301", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50301-c26c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50302", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50302-89ee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50303", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50303-7759@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50304", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50304-4b20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50305", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50305-8aba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50306", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50306-c1da@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50307", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50307-3240@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50308", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50308-8b1d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50309", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50309-f82b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50310", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50310-aa10@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50311", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50311-0c21@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50312", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50312-105d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50313", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50313-2fa9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50314", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50314-9a10@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50315", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50315-a3b8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50316", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50316-6e9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50317", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50317-6b3b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50318", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50318-6f5e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50319", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50319-6747@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50320", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50320-5ffa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50321", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50321-bba8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50322", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50322-079d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50323", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50323-a29f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50324", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50324-e9d8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50325", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50325-d6bb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50326", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50326-7ffc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50327", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50327-5d27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50328", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50328-f996@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50329", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50329-58ac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50330", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50330-cd49@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50331", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50331-53e1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50332", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50332-a052@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50333", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50333-d81f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50334", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50334-488d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50335", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50335-141b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50336", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50336-0b7e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50337", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50337-42aa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50338", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50338-506b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53147", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2023-53147-8f20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53148", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53148-e1b8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53149", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53149-2f0a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53150", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53150-29b0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53151", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53151-263e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53152", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53152-130d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53153", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53153-d85c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53163", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53163-860f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53164", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53164-3a5d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53165", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53165-a7c4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53166", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53166-12e5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53167", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53167-3fb7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53168", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53168-7628@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53169", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53169-0678@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53170", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53170-d187@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53171", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53171-be9f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53172", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53172-3f93@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53173", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53173-4180@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53174", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53174-ed92@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53175", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53175-66fa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53176", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53176-4194@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53177", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53177-9a91@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53178", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53178-9d27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53179", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53179-eb55@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53180", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53180-5e16@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53181", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53181-608c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53182", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53182-dcdb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53183", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53183-b15d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53184", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53184-3b7a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53185", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53185-2f8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53186", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53186-25a4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53187", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53187-fb77@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53188", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53188-373f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53189", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53189-19c2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53190", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53190-0dfe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53191", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53191-7baa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53192", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53192-5ca6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53193", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53193-74f6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53194", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53194-1804@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53195", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53195-a853@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53196", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53196-c59a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53197", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53197-1f23@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53198", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53198-094a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53199", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53199-8a8c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53200", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53200-a0c8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53201", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53201-baf1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53202", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53202-5e01@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53203", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53203-4a9c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53204", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53204-3e15@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53205", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53205-9a2b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53206", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53206-33fc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53207", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53207-5025@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53208", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53208-b31d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53209", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53209-ed9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53210", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53210-0e06@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53211", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53211-6015@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53212", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53212-fdd4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53213", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53213-dfc5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53214", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53214-87f5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53215", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53215-8895@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53216", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53216-7693@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53217", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53217-0de0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53218", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53218-0fca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53219", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53219-bd20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53220", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53220-e514@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53221", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53221-c23e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53222", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53222-c1a9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53223", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53223-ee66@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53224", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53224-190d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53225", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53225-5ed5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53226", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53226-a44a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53227", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53227-6a15@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53228", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53228-441c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53229", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53229-a0ef@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53230", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53230-6c94@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53231", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53231-7743@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53232", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53232-39fa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53233", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53233-8c6b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53234", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53234-5a07@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53235", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53235-1104@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53236", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53236-49ad@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53237", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53237-7d1b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53238", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53238-f8a7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53239", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53239-9ea0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53240", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53240-c379@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53241", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53241-c75a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53242", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53242-b7c5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53243", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53243-bac7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53244", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53244-197d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53245", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53245-256b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53246", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53246-a539@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53247", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53247-60a0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53248", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53248-aa39@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53249", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53249-aab7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53250", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53250-05ea@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53251", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53251-8d43@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53252", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53252-3a4f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53253", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53253-c59c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53254", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53254-0aa0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53255", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53255-ba5b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53256", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53256-d5af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53257", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53257-6162@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53258", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53258-35f0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53259", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53259-5409@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53260", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53260-2323@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53261", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53261-6a1a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53262", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53262-822a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39800", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2025-39800-6b30@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39801", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39801-00f9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39802", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39802-fba9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39803", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39803-eb8e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39804", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39804-bf3b@gregkh/" }, { "category": "external", "summary": "Debian Security Advisory DSA-6009 vom 2025-09-23", "url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-6008 vom 2025-09-23", "url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-22T22:00:00.000+00:00", "generator": { "date": "2025-09-23T04:57:08.189+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-2053", "initial_release_date": "2025-09-15T22:00:00.000+00:00", "revision_history": [ { "date": "2025-09-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-09-16T22:00:00.000+00:00", "number": "2", "summary": "Referenz(en) aufgenommen: EUVD-2023-59886, EUVD-2023-59887, EUVD-2023-59888, EUVD-2023-59889, EUVD-2023-59890, EUVD-2023-59891, EUVD-2023-59892, EUVD-2023-59913, EUVD-2023-59923" }, { "date": "2025-09-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T028463", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:unspecified" } } } ], "category": "vendor", "name": "Open Source" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-50234", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50234" }, { "cve": "CVE-2022-50235", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50235" }, { "cve": "CVE-2022-50236", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50236" }, { "cve": "CVE-2022-50239", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50239" }, { "cve": "CVE-2022-50240", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50240" }, { "cve": "CVE-2022-50241", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50241" }, { "cve": "CVE-2022-50242", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50242" }, { "cve": "CVE-2022-50243", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50243" }, { "cve": "CVE-2022-50244", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50244" }, { "cve": "CVE-2022-50245", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50245" }, { "cve": "CVE-2022-50246", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50246" }, { "cve": "CVE-2022-50247", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50247" }, { "cve": "CVE-2022-50248", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50248" }, { "cve": "CVE-2022-50249", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50249" }, { "cve": "CVE-2022-50250", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50250" }, { "cve": "CVE-2022-50251", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50251" }, { "cve": "CVE-2022-50252", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50252" }, { "cve": "CVE-2022-50253", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50253" }, { "cve": "CVE-2022-50254", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50254" }, { "cve": "CVE-2022-50255", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50255" }, { "cve": "CVE-2022-50256", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50256" }, { "cve": "CVE-2022-50257", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50257" }, { "cve": "CVE-2022-50258", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50258" }, { "cve": "CVE-2022-50259", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50259" }, { "cve": "CVE-2022-50260", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50260" }, { "cve": "CVE-2022-50261", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50261" }, { "cve": "CVE-2022-50262", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50262" }, { "cve": "CVE-2022-50263", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50263" }, { "cve": "CVE-2022-50264", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50264" }, { "cve": "CVE-2022-50265", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50265" }, { "cve": "CVE-2022-50266", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50266" }, { "cve": "CVE-2022-50267", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50267" }, { "cve": "CVE-2022-50268", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50268" }, { "cve": "CVE-2022-50269", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50269" }, { "cve": "CVE-2022-50270", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50270" }, { "cve": "CVE-2022-50271", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50271" }, { "cve": "CVE-2022-50272", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50272" }, { "cve": "CVE-2022-50273", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50273" }, { "cve": "CVE-2022-50274", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50274" }, { "cve": "CVE-2022-50275", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50275" }, { "cve": "CVE-2022-50276", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50276" }, { "cve": "CVE-2022-50277", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50277" }, { "cve": "CVE-2022-50278", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50278" }, { "cve": "CVE-2022-50279", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50279" }, { "cve": "CVE-2022-50280", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50280" }, { "cve": "CVE-2022-50281", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50281" }, { "cve": "CVE-2022-50282", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50282" }, { "cve": "CVE-2022-50283", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50283" }, { "cve": "CVE-2022-50284", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50284" }, { "cve": "CVE-2022-50285", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50285" }, { "cve": "CVE-2022-50286", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50286" }, { "cve": "CVE-2022-50287", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50287" }, { "cve": "CVE-2022-50288", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50288" }, { "cve": "CVE-2022-50289", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50289" }, { "cve": "CVE-2022-50290", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50290" }, { "cve": "CVE-2022-50291", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50291" }, { "cve": "CVE-2022-50292", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50292" }, { "cve": "CVE-2022-50293", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50293" }, { "cve": "CVE-2022-50294", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50294" }, { "cve": "CVE-2022-50295", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50295" }, { "cve": "CVE-2022-50296", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50296" }, { "cve": "CVE-2022-50297", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50297" }, { "cve": "CVE-2022-50298", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50298" }, { "cve": "CVE-2022-50299", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50299" }, { "cve": "CVE-2022-50300", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50300" }, { "cve": "CVE-2022-50301", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50301" }, { "cve": "CVE-2022-50302", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50302" }, { "cve": "CVE-2022-50303", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50303" }, { "cve": "CVE-2022-50304", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50304" }, { "cve": "CVE-2022-50305", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50305" }, { "cve": "CVE-2022-50306", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50306" }, { "cve": "CVE-2022-50307", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50307" }, { "cve": "CVE-2022-50308", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50308" }, { "cve": "CVE-2022-50309", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50309" }, { "cve": "CVE-2022-50310", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50310" }, { "cve": "CVE-2022-50311", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50311" }, { "cve": "CVE-2022-50312", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50312" }, { "cve": "CVE-2022-50313", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50313" }, { "cve": "CVE-2022-50314", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50314" }, { "cve": "CVE-2022-50315", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50315" }, { "cve": "CVE-2022-50316", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50316" }, { "cve": "CVE-2022-50317", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50317" }, { "cve": "CVE-2022-50318", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50318" }, { "cve": "CVE-2022-50319", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50319" }, { "cve": "CVE-2022-50320", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50320" }, { "cve": "CVE-2022-50321", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50321" }, { "cve": "CVE-2022-50322", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50322" }, { "cve": "CVE-2022-50323", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50323" }, { "cve": "CVE-2022-50324", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50324" }, { "cve": "CVE-2022-50325", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50325" }, { "cve": "CVE-2022-50326", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50326" }, { "cve": "CVE-2022-50327", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50327" }, { "cve": "CVE-2022-50328", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50328" }, { "cve": "CVE-2022-50329", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50329" }, { "cve": "CVE-2022-50330", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50330" }, { "cve": "CVE-2022-50331", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50331" }, { "cve": "CVE-2022-50332", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50332" }, { "cve": "CVE-2022-50333", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50333" }, { "cve": "CVE-2022-50334", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50334" }, { "cve": "CVE-2022-50335", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50335" }, { "cve": "CVE-2022-50336", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50336" }, { "cve": "CVE-2022-50337", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50337" }, { "cve": "CVE-2022-50338", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50338" }, { "cve": "CVE-2023-3772", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-3772" }, { "cve": "CVE-2023-53147", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53147" }, { "cve": "CVE-2023-53148", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53148" }, { "cve": "CVE-2023-53149", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53149" }, { "cve": "CVE-2023-53150", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53150" }, { "cve": "CVE-2023-53151", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53151" }, { "cve": "CVE-2023-53152", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53152" }, { "cve": "CVE-2023-53153", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53153" }, { "cve": "CVE-2023-53163", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53163" }, { "cve": "CVE-2023-53164", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53164" }, { "cve": "CVE-2023-53165", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53165" }, { "cve": "CVE-2023-53166", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53166" }, { "cve": "CVE-2023-53167", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53167" }, { "cve": "CVE-2023-53168", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53168" }, { "cve": "CVE-2023-53169", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53169" }, { "cve": "CVE-2023-53170", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53170" }, { "cve": "CVE-2023-53171", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53171" }, { "cve": "CVE-2023-53172", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53172" }, { "cve": "CVE-2023-53173", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53173" }, { "cve": "CVE-2023-53174", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53174" }, { "cve": "CVE-2023-53175", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53175" }, { "cve": "CVE-2023-53176", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53176" }, { "cve": "CVE-2023-53177", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53177" }, { "cve": "CVE-2023-53178", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53178" }, { "cve": "CVE-2023-53179", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53179" }, { "cve": "CVE-2023-53180", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53180" }, { "cve": "CVE-2023-53181", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53181" }, { "cve": "CVE-2023-53182", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53182" }, { "cve": "CVE-2023-53183", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53183" }, { "cve": "CVE-2023-53184", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53184" }, { "cve": "CVE-2023-53185", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53185" }, { "cve": "CVE-2023-53186", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53186" }, { "cve": "CVE-2023-53187", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53187" }, { "cve": "CVE-2023-53188", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53188" }, { "cve": "CVE-2023-53189", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53189" }, { "cve": "CVE-2023-53190", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53190" }, { "cve": "CVE-2023-53191", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53191" }, { "cve": "CVE-2023-53192", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53192" }, { "cve": "CVE-2023-53193", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53193" }, { "cve": "CVE-2023-53194", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53194" }, { "cve": "CVE-2023-53195", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53195" }, { "cve": "CVE-2023-53196", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53196" }, { "cve": "CVE-2023-53197", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53197" }, { "cve": "CVE-2023-53198", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53198" }, { "cve": "CVE-2023-53199", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53199" }, { "cve": "CVE-2023-53200", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53200" }, { "cve": "CVE-2023-53201", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53201" }, { "cve": "CVE-2023-53202", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53202" }, { "cve": "CVE-2023-53203", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53203" }, { "cve": "CVE-2023-53204", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53204" }, { "cve": "CVE-2023-53205", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53205" }, { "cve": "CVE-2023-53206", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53206" }, { "cve": "CVE-2023-53207", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53207" }, { "cve": "CVE-2023-53208", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53208" }, { "cve": "CVE-2023-53209", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53209" }, { "cve": "CVE-2023-53210", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53210" }, { "cve": "CVE-2023-53211", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53211" }, { "cve": "CVE-2023-53212", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53212" }, { "cve": "CVE-2023-53213", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53213" }, { "cve": "CVE-2023-53214", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53214" }, { "cve": "CVE-2023-53215", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53215" }, { "cve": "CVE-2023-53216", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53216" }, { "cve": "CVE-2023-53217", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53217" }, { "cve": "CVE-2023-53218", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53218" }, { "cve": "CVE-2023-53219", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53219" }, { "cve": "CVE-2023-53220", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53220" }, { "cve": "CVE-2023-53221", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53221" }, { "cve": "CVE-2023-53222", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53222" }, { "cve": "CVE-2023-53223", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53223" }, { "cve": "CVE-2023-53224", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53224" }, { "cve": "CVE-2023-53225", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53225" }, { "cve": "CVE-2023-53226", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53226" }, { "cve": "CVE-2023-53227", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53227" }, { "cve": "CVE-2023-53228", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53228" }, { "cve": "CVE-2023-53229", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53229" }, { "cve": "CVE-2023-53230", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53230" }, { "cve": "CVE-2023-53231", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53231" }, { "cve": "CVE-2023-53232", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53232" }, { "cve": "CVE-2023-53233", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53233" }, { "cve": "CVE-2023-53234", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53234" }, { "cve": "CVE-2023-53235", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53235" }, { "cve": "CVE-2023-53236", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53236" }, { "cve": "CVE-2023-53237", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53237" }, { "cve": "CVE-2023-53238", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53238" }, { "cve": "CVE-2023-53239", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53239" }, { "cve": "CVE-2023-53240", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53240" }, { "cve": "CVE-2023-53241", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53241" }, { "cve": "CVE-2023-53242", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53242" }, { "cve": "CVE-2023-53243", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53243" }, { "cve": "CVE-2023-53244", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53244" }, { "cve": "CVE-2023-53245", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53245" }, { "cve": "CVE-2023-53246", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53246" }, { "cve": "CVE-2023-53247", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53247" }, { "cve": "CVE-2023-53248", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53248" }, { "cve": "CVE-2023-53249", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53249" }, { "cve": "CVE-2023-53250", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53250" }, { "cve": "CVE-2023-53251", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53251" }, { "cve": "CVE-2023-53252", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53252" }, { "cve": "CVE-2023-53253", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53253" }, { "cve": "CVE-2023-53254", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53254" }, { "cve": "CVE-2023-53255", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53255" }, { "cve": "CVE-2023-53256", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53256" }, { "cve": "CVE-2023-53257", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53257" }, { "cve": "CVE-2023-53258", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53258" }, { "cve": "CVE-2023-53259", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53259" }, { "cve": "CVE-2023-53260", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53260" }, { "cve": "CVE-2023-53261", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53261" }, { "cve": "CVE-2023-53262", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53262" }, { "cve": "CVE-2023-53263", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53263" }, { "cve": "CVE-2023-53264", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53264" }, { "cve": "CVE-2023-53265", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53265" }, { "cve": "CVE-2023-53266", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53266" }, { "cve": "CVE-2023-53267", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53267" }, { "cve": "CVE-2023-53268", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53268" }, { "cve": "CVE-2023-53269", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53269" }, { "cve": "CVE-2023-53270", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53270" }, { "cve": "CVE-2023-53271", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53271" }, { "cve": "CVE-2023-53272", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53272" }, { "cve": "CVE-2023-53273", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53273" }, { "cve": "CVE-2023-53274", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53274" }, { "cve": "CVE-2023-53275", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53275" }, { "cve": "CVE-2023-53276", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53276" }, { "cve": "CVE-2023-53277", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53277" }, { "cve": "CVE-2023-53278", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53278" }, { "cve": "CVE-2023-53279", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53279" }, { "cve": "CVE-2023-53280", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53280" }, { "cve": "CVE-2023-53281", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53281" }, { "cve": "CVE-2023-53282", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53282" }, { "cve": "CVE-2023-53283", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53283" }, { "cve": "CVE-2023-53284", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53284" }, { "cve": "CVE-2023-53285", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53285" }, { "cve": "CVE-2023-53286", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53286" }, { "cve": "CVE-2023-53287", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53287" }, { "cve": "CVE-2023-53288", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53288" }, { "cve": "CVE-2023-53289", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53289" }, { "cve": "CVE-2023-53290", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53290" }, { "cve": "CVE-2023-53291", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53291" }, { "cve": "CVE-2023-53292", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53292" }, { "cve": "CVE-2023-53293", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53293" }, { "cve": "CVE-2023-53294", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53294" }, { "cve": "CVE-2023-53295", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53295" }, { "cve": "CVE-2023-53296", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53296" }, { "cve": "CVE-2023-53297", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53297" }, { "cve": "CVE-2023-53298", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53298" }, { "cve": "CVE-2023-53299", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53299" }, { "cve": "CVE-2023-53300", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53300" }, { "cve": "CVE-2023-53301", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53301" }, { "cve": "CVE-2023-53302", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53302" }, { "cve": "CVE-2023-53303", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53303" }, { "cve": "CVE-2025-39800", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39800" }, { "cve": "CVE-2025-39801", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39801" }, { "cve": "CVE-2025-39802", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39802" }, { "cve": "CVE-2025-39803", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39803" }, { "cve": "CVE-2025-39804", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39804" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.