Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-50370 (GCVE-0-2022-50370)
Vulnerability from cvelistv5
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/i2c/busses/i2c-designware-core.h", "drivers/i2c/busses/i2c-designware-master.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "7fa5304c4b5b425d4a0b3acf10139a7f6108a85f", "status": "affected", "version": "c7b79a75287141cef5bbaeaf1c942269c08cd52e", "versionType": "git" }, { "lessThan": "a206f7fbe9589c60fafad12884628c909ecb042f", "status": "affected", "version": "c7b79a75287141cef5bbaeaf1c942269c08cd52e", "versionType": "git" }, { "lessThan": "aa59ac81e859006d3a1df035a19b3f2089110f93", "status": "affected", "version": "c7b79a75287141cef5bbaeaf1c942269c08cd52e", "versionType": "git" }, { "lessThan": "301c8f5c32c8fb79c67539bc23972dc3ef48024c", "status": "affected", "version": "c7b79a75287141cef5bbaeaf1c942269c08cd52e", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/i2c/busses/i2c-designware-core.h", "drivers/i2c/busses/i2c-designware-master.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.12" }, { "lessThan": "5.12", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.75", "versionType": "semver" }, { "lessThanOrEqual": "5.19.*", "status": "unaffected", "version": "5.19.17", "versionType": "semver" }, { "lessThanOrEqual": "6.0.*", "status": "unaffected", "version": "6.0.3", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.1", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.75", "versionStartIncluding": "5.12", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.19.17", "versionStartIncluding": "5.12", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.0.3", "versionStartIncluding": "5.12", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1", "versionStartIncluding": "5.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: designware: Fix handling of real but unexpected device interrupts\n\nCommit c7b79a752871 (\"mfd: intel-lpss: Add Intel Alder Lake PCH-S PCI\nIDs\") caused a regression on certain Gigabyte motherboards for Intel\nAlder Lake-S where system crashes to NULL pointer dereference in\ni2c_dw_xfer_msg() when system resumes from S3 sleep state (\"deep\").\n\nI was able to debug the issue on Gigabyte Z690 AORUS ELITE and made\nfollowing notes:\n\n- Issue happens when resuming from S3 but not when resuming from\n \"s2idle\"\n- PCI device 00:15.0 == i2c_designware.0 is already in D0 state when\n system enters into pci_pm_resume_noirq() while all other i2c_designware\n PCI devices are in D3. Devices were runtime suspended and in D3 prior\n entering into suspend\n- Interrupt comes after pci_pm_resume_noirq() when device interrupts are\n re-enabled\n- According to register dump the interrupt really comes from the\n i2c_designware.0. Controller is enabled, I2C target address register\n points to a one detectable I2C device address 0x60 and the\n DW_IC_RAW_INTR_STAT register START_DET, STOP_DET, ACTIVITY and\n TX_EMPTY bits are set indicating completed I2C transaction.\n\nMy guess is that the firmware uses this controller to communicate with\nan on-board I2C device during resume but does not disable the controller\nbefore giving control to an operating system.\n\nI was told the UEFI update fixes this but never the less it revealed the\ndriver is not ready to handle TX_EMPTY (or RX_FULL) interrupt when device\nis supposed to be idle and state variables are not set (especially the\ndev-\u003emsgs pointer which may point to NULL or stale old data).\n\nIntroduce a new software status flag STATUS_ACTIVE indicating when the\ncontroller is active in driver point of view. Now treat all interrupts\nthat occur when is not set as unexpected and mask all interrupts from\nthe controller." } ], "providerMetadata": { "dateUpdated": "2025-09-17T14:56:26.015Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/7fa5304c4b5b425d4a0b3acf10139a7f6108a85f" }, { "url": "https://git.kernel.org/stable/c/a206f7fbe9589c60fafad12884628c909ecb042f" }, { "url": "https://git.kernel.org/stable/c/aa59ac81e859006d3a1df035a19b3f2089110f93" }, { "url": "https://git.kernel.org/stable/c/301c8f5c32c8fb79c67539bc23972dc3ef48024c" } ], "title": "i2c: designware: Fix handling of real but unexpected device interrupts", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2022-50370", "datePublished": "2025-09-17T14:56:26.015Z", "dateReserved": "2025-09-17T14:53:06.995Z", "dateUpdated": "2025-09-17T14:56:26.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-50370\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-17T15:15:35.950\",\"lastModified\":\"2025-09-18T13:43:34.310\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ni2c: designware: Fix handling of real but unexpected device interrupts\\n\\nCommit c7b79a752871 (\\\"mfd: intel-lpss: Add Intel Alder Lake PCH-S PCI\\nIDs\\\") caused a regression on certain Gigabyte motherboards for Intel\\nAlder Lake-S where system crashes to NULL pointer dereference in\\ni2c_dw_xfer_msg() when system resumes from S3 sleep state (\\\"deep\\\").\\n\\nI was able to debug the issue on Gigabyte Z690 AORUS ELITE and made\\nfollowing notes:\\n\\n- Issue happens when resuming from S3 but not when resuming from\\n \\\"s2idle\\\"\\n- PCI device 00:15.0 == i2c_designware.0 is already in D0 state when\\n system enters into pci_pm_resume_noirq() while all other i2c_designware\\n PCI devices are in D3. Devices were runtime suspended and in D3 prior\\n entering into suspend\\n- Interrupt comes after pci_pm_resume_noirq() when device interrupts are\\n re-enabled\\n- According to register dump the interrupt really comes from the\\n i2c_designware.0. Controller is enabled, I2C target address register\\n points to a one detectable I2C device address 0x60 and the\\n DW_IC_RAW_INTR_STAT register START_DET, STOP_DET, ACTIVITY and\\n TX_EMPTY bits are set indicating completed I2C transaction.\\n\\nMy guess is that the firmware uses this controller to communicate with\\nan on-board I2C device during resume but does not disable the controller\\nbefore giving control to an operating system.\\n\\nI was told the UEFI update fixes this but never the less it revealed the\\ndriver is not ready to handle TX_EMPTY (or RX_FULL) interrupt when device\\nis supposed to be idle and state variables are not set (especially the\\ndev-\u003emsgs pointer which may point to NULL or stale old data).\\n\\nIntroduce a new software status flag STATUS_ACTIVE indicating when the\\ncontroller is active in driver point of view. Now treat all interrupts\\nthat occur when is not set as unexpected and mask all interrupts from\\nthe controller.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/301c8f5c32c8fb79c67539bc23972dc3ef48024c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7fa5304c4b5b425d4a0b3acf10139a7f6108a85f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a206f7fbe9589c60fafad12884628c909ecb042f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/aa59ac81e859006d3a1df035a19b3f2089110f93\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
wid-sec-w-2025-2087
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht n\u00e4her beschriebene Auswirkungen zu erzielen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-2087 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2087.json" }, { "category": "self", "summary": "WID-SEC-2025-2087 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2087" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50353", "url": "https://lore.kernel.org/linux-cve-announce/2025091711-CVE-2022-50353-2f1e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50354", "url": "https://lore.kernel.org/linux-cve-announce/2025091714-CVE-2022-50354-45cc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50355", "url": "https://lore.kernel.org/linux-cve-announce/2025091714-CVE-2022-50355-11ce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50356", "url": "https://lore.kernel.org/linux-cve-announce/2025091714-CVE-2022-50356-fe76@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50357", "url": "https://lore.kernel.org/linux-cve-announce/2025091714-CVE-2022-50357-4ae9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50358", "url": "https://lore.kernel.org/linux-cve-announce/2025091714-CVE-2022-50358-6a86@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50359", "url": "https://lore.kernel.org/linux-cve-announce/2025091714-CVE-2022-50359-e9fb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50360", "url": "https://lore.kernel.org/linux-cve-announce/2025091715-CVE-2022-50360-00c7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50361", "url": "https://lore.kernel.org/linux-cve-announce/2025091715-CVE-2022-50361-60ad@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50362", "url": "https://lore.kernel.org/linux-cve-announce/2025091715-CVE-2022-50362-3640@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50363", "url": "https://lore.kernel.org/linux-cve-announce/2025091715-CVE-2022-50363-7e9b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50364", "url": "https://lore.kernel.org/linux-cve-announce/2025091715-CVE-2022-50364-b594@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50365", "url": "https://lore.kernel.org/linux-cve-announce/2025091716-CVE-2022-50365-9a71@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50366", "url": "https://lore.kernel.org/linux-cve-announce/2025091716-CVE-2022-50366-0f75@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50367", "url": "https://lore.kernel.org/linux-cve-announce/2025091716-CVE-2022-50367-651c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50368", "url": "https://lore.kernel.org/linux-cve-announce/2025091716-CVE-2022-50368-ae84@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50369", "url": "https://lore.kernel.org/linux-cve-announce/2025091716-CVE-2022-50369-bc92@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50370", "url": "https://lore.kernel.org/linux-cve-announce/2025091716-CVE-2022-50370-7271@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50371", "url": "https://lore.kernel.org/linux-cve-announce/2025091717-CVE-2022-50371-593f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50372", "url": "https://lore.kernel.org/linux-cve-announce/2025091717-CVE-2022-50372-e3b5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50373", "url": "https://lore.kernel.org/linux-cve-announce/2025091717-CVE-2022-50373-ce58@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50374", "url": "https://lore.kernel.org/linux-cve-announce/2025091717-CVE-2022-50374-6da4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53335", "url": "https://lore.kernel.org/linux-cve-announce/2025091717-CVE-2023-53335-1e5d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53336", "url": "https://lore.kernel.org/linux-cve-announce/2025091718-CVE-2023-53336-0abd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53337", "url": "https://lore.kernel.org/linux-cve-announce/2025091718-CVE-2023-53337-ac33@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53338", "url": "https://lore.kernel.org/linux-cve-announce/2025091718-CVE-2023-53338-8224@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53339", "url": "https://lore.kernel.org/linux-cve-announce/2025091718-CVE-2023-53339-437d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53340", "url": "https://lore.kernel.org/linux-cve-announce/2025091718-CVE-2023-53340-c694@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53341", "url": "https://lore.kernel.org/linux-cve-announce/2025091718-CVE-2023-53341-896e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53342", "url": "https://lore.kernel.org/linux-cve-announce/2025091719-CVE-2023-53342-8505@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53343", "url": "https://lore.kernel.org/linux-cve-announce/2025091719-CVE-2023-53343-880b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53344", "url": "https://lore.kernel.org/linux-cve-announce/2025091719-CVE-2023-53344-b8a4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53345", "url": "https://lore.kernel.org/linux-cve-announce/2025091719-CVE-2023-53345-0807@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53346", "url": "https://lore.kernel.org/linux-cve-announce/2025091719-CVE-2023-53346-2268@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53347", "url": "https://lore.kernel.org/linux-cve-announce/2025091719-CVE-2023-53347-ed20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53348", "url": "https://lore.kernel.org/linux-cve-announce/2025091720-CVE-2023-53348-513e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53349", "url": "https://lore.kernel.org/linux-cve-announce/2025091720-CVE-2023-53349-deef@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53350", "url": "https://lore.kernel.org/linux-cve-announce/2025091720-CVE-2023-53350-86b6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53351", "url": "https://lore.kernel.org/linux-cve-announce/2025091720-CVE-2023-53351-7b67@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53352", "url": "https://lore.kernel.org/linux-cve-announce/2025091720-CVE-2023-53352-9be5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53353", "url": "https://lore.kernel.org/linux-cve-announce/2025091720-CVE-2023-53353-2611@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53354", "url": "https://lore.kernel.org/linux-cve-announce/2025091721-CVE-2023-53354-771f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53355", "url": "https://lore.kernel.org/linux-cve-announce/2025091721-CVE-2023-53355-823c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53356", "url": "https://lore.kernel.org/linux-cve-announce/2025091721-CVE-2023-53356-5383@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53357", "url": "https://lore.kernel.org/linux-cve-announce/2025091721-CVE-2023-53357-15aa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53358", "url": "https://lore.kernel.org/linux-cve-announce/2025091721-CVE-2023-53358-29d3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53359", "url": "https://lore.kernel.org/linux-cve-announce/2025091722-CVE-2023-53359-0569@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53360", "url": "https://lore.kernel.org/linux-cve-announce/2025091722-CVE-2023-53360-a553@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53361", "url": "https://lore.kernel.org/linux-cve-announce/2025091722-CVE-2023-53361-922a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53362", "url": "https://lore.kernel.org/linux-cve-announce/2025091722-CVE-2023-53362-740e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53363", "url": "https://lore.kernel.org/linux-cve-announce/2025091722-CVE-2023-53363-4ac2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53364", "url": "https://lore.kernel.org/linux-cve-announce/2025091722-CVE-2023-53364-8e1b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53365", "url": "https://lore.kernel.org/linux-cve-announce/2025091723-CVE-2023-53365-acb1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53366", "url": "https://lore.kernel.org/linux-cve-announce/2025091723-CVE-2023-53366-c8e7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53367", "url": "https://lore.kernel.org/linux-cve-announce/2025091723-CVE-2023-53367-ccb9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53368", "url": "https://lore.kernel.org/linux-cve-announce/2025091723-CVE-2023-53368-3371@gregkh/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-3038 vom 2025-10-15", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3038.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-10-15T22:00:00.000+00:00", "generator": { "date": "2025-10-16T09:43:29.247+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-2087", "initial_release_date": "2025-09-17T22:00:00.000+00:00", "revision_history": [ { "date": "2025-09-17T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-10-14T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-10-15T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T028463", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:unspecified" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-50353", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50353" }, { "cve": "CVE-2022-50354", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50354" }, { "cve": "CVE-2022-50355", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50355" }, { "cve": "CVE-2022-50356", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50356" }, { "cve": "CVE-2022-50357", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50357" }, { "cve": "CVE-2022-50358", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50358" }, { "cve": "CVE-2022-50359", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50359" }, { "cve": "CVE-2022-50360", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50360" }, { "cve": "CVE-2022-50361", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50361" }, { "cve": "CVE-2022-50362", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50362" }, { "cve": "CVE-2022-50363", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50363" }, { "cve": "CVE-2022-50364", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50364" }, { "cve": "CVE-2022-50365", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50365" }, { "cve": "CVE-2022-50366", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50366" }, { "cve": "CVE-2022-50367", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50367" }, { "cve": "CVE-2022-50368", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50368" }, { "cve": "CVE-2022-50369", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50369" }, { "cve": "CVE-2022-50370", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50370" }, { "cve": "CVE-2022-50371", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50371" }, { "cve": "CVE-2022-50372", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50372" }, { "cve": "CVE-2022-50373", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50373" }, { "cve": "CVE-2022-50374", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2022-50374" }, { "cve": "CVE-2023-53335", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53335" }, { "cve": "CVE-2023-53336", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53336" }, { "cve": "CVE-2023-53337", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53337" }, { "cve": "CVE-2023-53338", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53338" }, { "cve": "CVE-2023-53339", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53339" }, { "cve": "CVE-2023-53340", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53340" }, { "cve": "CVE-2023-53341", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53341" }, { "cve": "CVE-2023-53342", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53342" }, { "cve": "CVE-2023-53343", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53343" }, { "cve": "CVE-2023-53344", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53344" }, { "cve": "CVE-2023-53345", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53345" }, { "cve": "CVE-2023-53346", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53346" }, { "cve": "CVE-2023-53347", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53347" }, { "cve": "CVE-2023-53348", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53348" }, { "cve": "CVE-2023-53349", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53349" }, { "cve": "CVE-2023-53350", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53350" }, { "cve": "CVE-2023-53351", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53351" }, { "cve": "CVE-2023-53352", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53352" }, { "cve": "CVE-2023-53353", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53353" }, { "cve": "CVE-2023-53354", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53354" }, { "cve": "CVE-2023-53355", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53355" }, { "cve": "CVE-2023-53356", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53356" }, { "cve": "CVE-2023-53357", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53357" }, { "cve": "CVE-2023-53358", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53358" }, { "cve": "CVE-2023-53359", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53359" }, { "cve": "CVE-2023-53360", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53360" }, { "cve": "CVE-2023-53361", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53361" }, { "cve": "CVE-2023-53362", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53362" }, { "cve": "CVE-2023-53363", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53363" }, { "cve": "CVE-2023-53364", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53364" }, { "cve": "CVE-2023-53365", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53365" }, { "cve": "CVE-2023-53366", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53366" }, { "cve": "CVE-2023-53367", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53367" }, { "cve": "CVE-2023-53368", "product_status": { "known_affected": [ "T028463", "T002207", "398363" ] }, "release_date": "2025-09-17T22:00:00.000+00:00", "title": "CVE-2023-53368" } ] }
CERTFR-2025-AVI-0895
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
SUSE | Confidential Computing Module | Confidential Computing Module 15-SP6 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
SUSE | Basesystem Module | Basesystem Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP7 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
SUSE | Legacy Module | Legacy Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
SUSE | SUSE Enterprise Storage | SUSE Enterprise Storage 7.1 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
SUSE | Development Tools Module | Development Tools Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
SUSE | Basesystem Module | Basesystem Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP6 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
SUSE | Legacy Module | Legacy Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 | ||
SUSE | Development Tools Module | Development Tools Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SUSE Linux Enterprise High Performance Computing 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Confidential Computing Module 15-SP6", "product": { "name": "Confidential Computing Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP5", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP7", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.2", "product": { "name": "SUSE Manager Retail Branch Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 12 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP4", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.2", "product": { "name": "SUSE Manager Proxy", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 12-SP5", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP6", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP7", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP6", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP7", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.2", "product": { "name": "SUSE Manager Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP6", "product": { "name": "Legacy Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP5", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP6", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP6", "product": { "name": "Development Tools Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP7", "product": { "name": "SUSE Linux Enterprise Workstation Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP4", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP3", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.2", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP7", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP7", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP6", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP3", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP6", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP7", "product": { "name": "Legacy Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP7", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP6", "product": { "name": "SUSE Linux Enterprise Workstation Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP7", "product": { "name": "Development Tools Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP6", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP4", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-53443", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53443" }, { "name": "CVE-2023-53453", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53453" }, { "name": "CVE-2022-50378", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50378" }, { "name": "CVE-2025-38380", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38380" }, { "name": "CVE-2022-50291", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50291" }, { "name": "CVE-2023-53247", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53247" }, { "name": "CVE-2022-50433", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50433" }, { "name": "CVE-2022-50356", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50356" }, { "name": "CVE-2023-53473", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53473" }, { "name": "CVE-2022-49138", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49138" }, { "name": "CVE-2022-50425", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50425" }, { "name": "CVE-2025-38201", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38201" }, { "name": "CVE-2022-50367", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50367" }, { "name": "CVE-2025-39808", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39808" }, { "name": "CVE-2023-53347", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53347" }, { "name": "CVE-2023-53475", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53475" }, { "name": "CVE-2025-38520", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38520" }, { "name": "CVE-2023-53312", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53312" }, { "name": "CVE-2025-38588", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38588" }, { "name": "CVE-2023-53311", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53311" }, { "name": "CVE-2025-38574", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38574" }, { "name": "CVE-2022-50398", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50398" }, { "name": "CVE-2023-53393", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53393" }, { "name": "CVE-2023-53480", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53480" }, { "name": "CVE-2023-53303", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53303" }, { "name": "CVE-2023-28328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28328" }, { "name": "CVE-2025-39757", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39757" }, { "name": "CVE-2022-50469", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50469" }, { "name": "CVE-2022-50429", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50429" }, { "name": "CVE-2023-53193", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53193" }, { "name": "CVE-2023-53150", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53150" }, { "name": "CVE-2023-53321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53321" }, { "name": "CVE-2025-39772", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39772" }, { "name": "CVE-2023-53317", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53317" }, { "name": "CVE-2023-53176", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53176" }, { "name": "CVE-2023-53362", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53362" }, { "name": "CVE-2022-50298", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50298" }, { "name": "CVE-2025-38601", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38601" }, { "name": "CVE-2025-39826", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39826" }, { "name": "CVE-2022-50288", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50288" }, { "name": "CVE-2025-38515", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38515" }, { "name": "CVE-2025-38645", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38645" }, { "name": "CVE-2023-5633", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5633" }, { "name": "CVE-2025-38444", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38444" }, { "name": "CVE-2023-53349", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53349" }, { "name": "CVE-2025-39685", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39685" }, { "name": "CVE-2025-38660", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38660" }, { "name": "CVE-2025-39761", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39761" }, { "name": "CVE-2023-53405", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53405" }, { "name": "CVE-2023-53185", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53185" }, { "name": "CVE-2023-53320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53320" }, { "name": "CVE-2023-53359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53359" }, { "name": "CVE-2022-50466", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50466" }, { "name": "CVE-2023-53509", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53509" }, { "name": "CVE-2023-53421", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53421" }, { "name": "CVE-2023-53441", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53441" }, { "name": "CVE-2023-53199", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53199" }, { "name": "CVE-2025-39764", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39764" }, { "name": "CVE-2023-53245", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53245" }, { "name": "CVE-2023-53415", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53415" }, { "name": "CVE-2025-38624", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38624" }, { "name": "CVE-2024-53194", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53194" }, { "name": "CVE-2025-39827", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39827" }, { "name": "CVE-2022-50255", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50255" }, { "name": "CVE-2025-39746", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39746" }, { "name": "CVE-2023-53461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53461" }, { "name": "CVE-2025-38208", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38208" }, { "name": "CVE-2023-53531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53531" }, { "name": "CVE-2025-39889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39889" }, { "name": "CVE-2025-38524", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38524" }, { "name": "CVE-2025-38466", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38466" }, { "name": "CVE-2023-53258", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53258" }, { "name": "CVE-2023-53429", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53429" }, { "name": "CVE-2023-53449", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53449" }, { "name": "CVE-2025-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38595" }, { "name": "CVE-2023-53451", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53451" }, { "name": "CVE-2023-53325", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53325" }, { "name": "CVE-2022-50368", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50368" }, { "name": "CVE-2023-53511", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53511" }, { "name": "CVE-2025-38216", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38216" }, { "name": "CVE-2022-50349", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50349" }, { "name": "CVE-2023-53394", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53394" }, { "name": "CVE-2023-53494", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53494" }, { "name": "CVE-2025-39925", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39925" }, { "name": "CVE-2025-39811", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39811" }, { "name": "CVE-2022-50358", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50358" }, { "name": "CVE-2025-38646", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38646" }, { "name": "CVE-2025-38491", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38491" }, { "name": "CVE-2025-38408", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38408" }, { "name": "CVE-2022-50386", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50386" }, { "name": "CVE-2025-38644", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38644" }, { "name": "CVE-2025-38692", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38692" }, { "name": "CVE-2022-50244", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50244" }, { "name": "CVE-2025-38563", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38563" }, { "name": "CVE-2023-53209", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53209" }, { "name": "CVE-2025-39701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39701" }, { "name": "CVE-2023-53222", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53222" }, { "name": "CVE-2023-53264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53264" }, { "name": "CVE-2022-50323", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50323" }, { "name": "CVE-2025-38591", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38591" }, { "name": "CVE-2022-50441", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50441" }, { "name": "CVE-2025-38609", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38609" }, { "name": "CVE-2023-53519", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53519" }, { "name": "CVE-2022-50294", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50294" }, { "name": "CVE-2023-53447", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53447" }, { "name": "CVE-2023-53472", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53472" }, { "name": "CVE-2022-50242", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50242" }, { "name": "CVE-2023-53248", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53248" }, { "name": "CVE-2025-22023", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22023" }, { "name": "CVE-2025-38500", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38500" }, { "name": "CVE-2025-39709", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39709" }, { "name": "CVE-2023-53217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53217" }, { "name": "CVE-2023-53390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53390" }, { "name": "CVE-2023-53491", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53491" }, { "name": "CVE-2025-39787", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39787" }, { "name": "CVE-2025-39920", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39920" }, { "name": "CVE-2022-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50379" }, { "name": "CVE-2022-50257", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50257" }, { "name": "CVE-2023-53354", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53354" }, { "name": "CVE-2023-53504", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53504" }, { "name": "CVE-2025-38734", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38734" }, { "name": "CVE-2025-38571", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38571" }, { "name": "CVE-2022-50301", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50301" }, { "name": "CVE-2022-50432", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50432" }, { "name": "CVE-2023-53340", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53340" }, { "name": "CVE-2025-38695", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38695" }, { "name": "CVE-2023-52923", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52923" }, { "name": "CVE-2023-53323", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53323" }, { "name": "CVE-2025-39749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39749" }, { "name": "CVE-2022-50304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50304" }, { "name": "CVE-2024-26661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26661" }, { "name": "CVE-2023-53189", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53189" }, { "name": "CVE-2023-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53427" }, { "name": "CVE-2023-53498", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53498" }, { "name": "CVE-2023-4130", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4130" }, { "name": "CVE-2023-53242", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53242" }, { "name": "CVE-2022-50395", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50395" }, { "name": "CVE-2023-53309", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53309" }, { "name": "CVE-2025-39923", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39923" }, { "name": "CVE-2025-38445", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38445" }, { "name": "CVE-2025-38456", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38456" }, { "name": "CVE-2025-38538", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38538" }, { "name": "CVE-2022-50456", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50456" }, { "name": "CVE-2025-39751", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39751" }, { "name": "CVE-2024-58238", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58238" }, { "name": "CVE-2023-53425", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53425" }, { "name": "CVE-2022-50458", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50458" }, { "name": "CVE-2022-50321", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50321" }, { "name": "CVE-2023-53235", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53235" }, { "name": "CVE-2025-38565", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38565" }, { "name": "CVE-2022-50439", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50439" }, { "name": "CVE-2025-38710", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38710" }, { "name": "CVE-2023-53304", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53304" }, { "name": "CVE-2025-39681", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39681" }, { "name": "CVE-2023-53216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53216" }, { "name": "CVE-2025-39770", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39770" }, { "name": "CVE-2023-53339", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53339" }, { "name": "CVE-2023-53239", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53239" }, { "name": "CVE-2023-53280", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53280" }, { "name": "CVE-2025-38705", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38705" }, { "name": "CVE-2023-53179", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53179" }, { "name": "CVE-2022-50434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50434" }, { "name": "CVE-2025-38706", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38706" }, { "name": "CVE-2022-50234", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50234" }, { "name": "CVE-2025-39750", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39750" }, { "name": "CVE-2025-38587", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38587" }, { "name": "CVE-2023-53520", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53520" }, { "name": "CVE-2022-50353", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50353" }, { "name": "CVE-2023-53493", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53493" }, { "name": "CVE-2022-49975", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49975" }, { "name": "CVE-2022-50404", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50404" }, { "name": "CVE-2023-53492", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53492" }, { "name": "CVE-2023-31248", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31248" }, { "name": "CVE-2022-50360", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50360" }, { "name": "CVE-2023-53388", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53388" }, { "name": "CVE-2025-39853", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39853" }, { "name": "CVE-2025-38555", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38555" }, { "name": "CVE-2023-53221", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53221" }, { "name": "CVE-2022-50264", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50264" }, { "name": "CVE-2025-39871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39871" }, { "name": "CVE-2025-39857", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39857" }, { "name": "CVE-2022-50452", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50452" }, { "name": "CVE-2022-50320", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50320" }, { "name": "CVE-2025-38590", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38590" }, { "name": "CVE-2025-38709", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38709" }, { "name": "CVE-2022-50286", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50286" }, { "name": "CVE-2022-50449", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50449" }, { "name": "CVE-2023-53431", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53431" }, { "name": "CVE-2022-50324", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50324" }, { "name": "CVE-2024-58090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58090" }, { "name": "CVE-2023-53462", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53462" }, { "name": "CVE-2025-39865", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39865" }, { "name": "CVE-2025-39816", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39816" }, { "name": "CVE-2025-38584", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38584" }, { "name": "CVE-2025-39675", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39675" }, { "name": "CVE-2025-39679", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39679" }, { "name": "CVE-2025-38527", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38527" }, { "name": "CVE-2025-37958", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37958" }, { "name": "CVE-2022-50447", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50447" }, { "name": "CVE-2022-50251", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50251" }, { "name": "CVE-2025-39763", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39763" }, { "name": "CVE-2023-53148", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53148" }, { "name": "CVE-2025-38693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38693" }, { "name": "CVE-2025-38679", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38679" }, { "name": "CVE-2025-38459", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38459" }, { "name": "CVE-2022-50373", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50373" }, { "name": "CVE-2023-53505", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53505" }, { "name": "CVE-2025-38685", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38685" }, { "name": "CVE-2022-50269", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50269" }, { "name": "CVE-2023-53275", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53275" }, { "name": "CVE-2022-50437", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50437" }, { "name": "CVE-2022-50391", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50391" }, { "name": "CVE-2023-53476", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53476" }, { "name": "CVE-2025-38184", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38184" }, { "name": "CVE-2023-53468", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53468" }, { "name": "CVE-2022-50261", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50261" }, { "name": "CVE-2022-50351", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50351" }, { "name": "CVE-2022-50272", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50272" }, { "name": "CVE-2022-50331", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50331" }, { "name": "CVE-2025-39838", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39838" }, { "name": "CVE-2025-39823", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39823" }, { "name": "CVE-2025-38234", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38234" }, { "name": "CVE-2024-50154", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50154" }, { "name": "CVE-2025-38634", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38634" }, { "name": "CVE-2023-53183", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53183" }, { "name": "CVE-2023-53195", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53195" }, { "name": "CVE-2023-53232", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53232" }, { "name": "CVE-2025-39864", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39864" }, { "name": "CVE-2025-38458", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38458" }, { "name": "CVE-2025-39730", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39730" }, { "name": "CVE-2025-38011", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38011" }, { "name": "CVE-2022-50268", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50268" }, { "name": "CVE-2022-36280", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36280" }, { "name": "CVE-2023-53319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53319" }, { "name": "CVE-2022-50444", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50444" }, { "name": "CVE-2025-39824", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39824" }, { "name": "CVE-2023-53515", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53515" }, { "name": "CVE-2023-53420", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53420" }, { "name": "CVE-2023-53424", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53424" }, { "name": "CVE-2025-38464", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38464" }, { "name": "CVE-2023-53241", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53241" }, { "name": "CVE-2023-53305", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53305" }, { "name": "CVE-2023-42753", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42753" }, { "name": "CVE-2025-38702", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38702" }, { "name": "CVE-2023-53177", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53177" }, { "name": "CVE-2023-53381", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53381" }, { "name": "CVE-2023-53369", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53369" }, { "name": "CVE-2025-38724", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38724" }, { "name": "CVE-2022-50419", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50419" }, { "name": "CVE-2025-38582", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38582" }, { "name": "CVE-2023-53332", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53332" }, { "name": "CVE-2025-38543", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38543" }, { "name": "CVE-2025-38698", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38698" }, { "name": "CVE-2023-53328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53328" }, { "name": "CVE-2022-50289", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50289" }, { "name": "CVE-2022-50329", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50329" }, { "name": "CVE-2025-39842", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39842" }, { "name": "CVE-2025-39739", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39739" }, { "name": "CVE-2023-53165", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53165" }, { "name": "CVE-2023-53270", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53270" }, { "name": "CVE-2025-38419", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38419" }, { "name": "CVE-2025-38533", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38533" }, { "name": "CVE-2023-53284", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53284" }, { "name": "CVE-2022-50265", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50265" }, { "name": "CVE-2025-38537", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38537" }, { "name": "CVE-2025-39849", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39849" }, { "name": "CVE-2025-38546", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38546" }, { "name": "CVE-2022-50409", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50409" }, { "name": "CVE-2022-50453", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50453" }, { "name": "CVE-2023-53512", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53512" }, { "name": "CVE-2022-50418", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50418" }, { "name": "CVE-2023-53438", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53438" }, { "name": "CVE-2023-53238", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53238" }, { "name": "CVE-2025-21791", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791" }, { "name": "CVE-2025-39861", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39861" }, { "name": "CVE-2022-50253", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50253" }, { "name": "CVE-2022-50405", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50405" }, { "name": "CVE-2025-38251", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38251" }, { "name": "CVE-2023-53378", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53378" }, { "name": "CVE-2025-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38597" }, { "name": "CVE-2025-39743", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39743" }, { "name": "CVE-2025-39718", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39718" }, { "name": "CVE-2022-50333", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50333" }, { "name": "CVE-2025-38712", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38712" }, { "name": "CVE-2025-38732", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38732" }, { "name": "CVE-2025-39773", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39773" }, { "name": "CVE-2023-53360", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53360" }, { "name": "CVE-2025-39885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39885" }, { "name": "CVE-2023-53336", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53336" }, { "name": "CVE-2023-53426", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53426" }, { "name": "CVE-2023-53370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53370" }, { "name": "CVE-2022-50330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50330" }, { "name": "CVE-2023-53223", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53223" }, { "name": "CVE-2022-2602", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2602" }, { "name": "CVE-2025-38632", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38632" }, { "name": "CVE-2022-50309", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50309" }, { "name": "CVE-2025-38548", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38548" }, { "name": "CVE-2023-53448", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53448" }, { "name": "CVE-2023-53308", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53308" }, { "name": "CVE-2023-53374", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53374" }, { "name": "CVE-2023-53384", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53384" }, { "name": "CVE-2025-38014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38014" }, { "name": "CVE-2022-50297", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50297" }, { "name": "CVE-2025-38727", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38727" }, { "name": "CVE-2025-38465", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38465" }, { "name": "CVE-2022-50435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50435" }, { "name": "CVE-2025-38513", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38513" }, { "name": "CVE-2022-50411", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50411" }, { "name": "CVE-2022-50465", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50465" }, { "name": "CVE-2022-50346", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50346" }, { "name": "CVE-2025-38670", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38670" }, { "name": "CVE-2025-39732", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39732" }, { "name": "CVE-2023-53458", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53458" }, { "name": "CVE-2022-50393", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50393" }, { "name": "CVE-2023-53367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53367" }, { "name": "CVE-2025-38602", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38602" }, { "name": "CVE-2022-50417", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50417" }, { "name": "CVE-2023-53326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53326" }, { "name": "CVE-2025-38441", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38441" }, { "name": "CVE-2023-53457", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53457" }, { "name": "CVE-2025-39845", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39845" }, { "name": "CVE-2023-53230", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53230" }, { "name": "CVE-2023-53397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53397" }, { "name": "CVE-2023-53171", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53171" }, { "name": "CVE-2025-38568", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38568" }, { "name": "CVE-2023-53489", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53489" }, { "name": "CVE-2022-50370", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50370" }, { "name": "CVE-2025-38583", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38583" }, { "name": "CVE-2023-53516", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53516" }, { "name": "CVE-2023-53474", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53474" }, { "name": "CVE-2025-38499", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38499" }, { "name": "CVE-2025-38735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38735" }, { "name": "CVE-2022-50247", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50247" }, { "name": "CVE-2025-38402", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38402" }, { "name": "CVE-2022-50325", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50325" }, { "name": "CVE-2022-50355", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50355" }, { "name": "CVE-2023-53400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53400" }, { "name": "CVE-2022-50292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50292" }, { "name": "CVE-2023-53287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53287" }, { "name": "CVE-2025-38616", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38616" }, { "name": "CVE-2025-37738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738" }, { "name": "CVE-2022-50406", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50406" }, { "name": "CVE-2025-38119", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38119" }, { "name": "CVE-2025-38245", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38245" }, { "name": "CVE-2025-38656", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38656" }, { "name": "CVE-2022-50454", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50454" }, { "name": "CVE-2023-53350", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53350" }, { "name": "CVE-2025-38614", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38614" }, { "name": "CVE-2022-50354", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50354" }, { "name": "CVE-2022-50249", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50249" }, { "name": "CVE-2023-53237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53237" }, { "name": "CVE-2025-38664", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38664" }, { "name": "CVE-2023-53454", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53454" }, { "name": "CVE-2023-53471", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53471" }, { "name": "CVE-2023-53182", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53182" }, { "name": "CVE-2025-38541", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38541" }, { "name": "CVE-2023-53416", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53416" }, { "name": "CVE-2022-50344", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50344" }, { "name": "CVE-2023-53322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53322" }, { "name": "CVE-2023-53220", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53220" }, { "name": "CVE-2023-53272", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53272" }, { "name": "CVE-2022-50388", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50388" }, { "name": "CVE-2023-53178", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53178" }, { "name": "CVE-2023-53210", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53210" }, { "name": "CVE-2025-38694", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38694" }, { "name": "CVE-2021-4460", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4460" }, { "name": "CVE-2023-3772", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3772" }, { "name": "CVE-2023-53259", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53259" }, { "name": "CVE-2025-38676", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38676" }, { "name": "CVE-2025-38530", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38530" }, { "name": "CVE-2024-26583", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26583" }, { "name": "CVE-2022-50318", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50318" }, { "name": "CVE-2023-53413", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53413" }, { "name": "CVE-2022-50389", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50389" }, { "name": "CVE-2023-53528", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53528" }, { "name": "CVE-2023-53524", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53524" }, { "name": "CVE-2023-53496", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53496" }, { "name": "CVE-2025-38729", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38729" }, { "name": "CVE-2023-53257", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53257" }, { "name": "CVE-2022-50390", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50390" }, { "name": "CVE-2023-53523", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53523" }, { "name": "CVE-2022-50359", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50359" }, { "name": "CVE-2023-53357", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53357" }, { "name": "CVE-2025-38681", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38681" }, { "name": "CVE-2025-38593", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38593" }, { "name": "CVE-2022-50285", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50285" }, { "name": "CVE-2022-2978", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2978" }, { "name": "CVE-2025-38687", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38687" }, { "name": "CVE-2022-49980", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49980" }, { "name": "CVE-2023-53335", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53335" }, { "name": "CVE-2023-53488", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53488" }, { "name": "CVE-2023-53464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53464" }, { "name": "CVE-2025-38111", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38111" }, { "name": "CVE-2023-53334", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53334" }, { "name": "CVE-2022-43945", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43945" }, { "name": "CVE-2023-53356", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53356" }, { "name": "CVE-2025-38529", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38529" }, { "name": "CVE-2023-53510", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53510" }, { "name": "CVE-2023-53151", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53151" }, { "name": "CVE-2025-38715", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38715" }, { "name": "CVE-2025-38089", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38089" }, { "name": "CVE-2022-50352", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50352" }, { "name": "CVE-2025-38608", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38608" }, { "name": "CVE-2025-38650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38650" }, { "name": "CVE-2025-39710", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39710" }, { "name": "CVE-2023-53215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53215" }, { "name": "CVE-2022-50342", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50342" }, { "name": "CVE-2023-53288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53288" }, { "name": "CVE-2024-26584", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26584" }, { "name": "CVE-2023-53406", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53406" }, { "name": "CVE-2025-38621", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38621" }, { "name": "CVE-2023-53352", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53352" }, { "name": "CVE-2025-38160", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38160" }, { "name": "CVE-2023-1380", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1380" }, { "name": "CVE-2023-53291", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53291" }, { "name": "CVE-2022-50408", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50408" }, { "name": "CVE-2025-38528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38528" }, { "name": "CVE-2022-50399", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50399" }, { "name": "CVE-2022-50372", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50372" }, { "name": "CVE-2025-39834", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39834" }, { "name": "CVE-2022-50431", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50431" }, { "name": "CVE-2022-50357", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50357" }, { "name": "CVE-2023-53263", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53263" }, { "name": "CVE-2023-53527", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53527" }, { "name": "CVE-2022-50303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50303" }, { "name": "CVE-2025-38713", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38713" }, { "name": "CVE-2023-53404", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53404" }, { "name": "CVE-2025-38556", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38556" }, { "name": "CVE-2025-38678", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38678" }, { "name": "CVE-2023-53344", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53344" }, { "name": "CVE-2023-53324", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53324" }, { "name": "CVE-2023-53465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53465" }, { "name": "CVE-2022-50468", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50468" }, { "name": "CVE-2025-39810", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39810" }, { "name": "CVE-2025-39782", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39782" }, { "name": "CVE-2025-38075", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38075" }, { "name": "CVE-2025-37885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885" }, { "name": "CVE-2023-53368", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53368" }, { "name": "CVE-2025-38697", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38697" }, { "name": "CVE-2022-50282", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50282" }, { "name": "CVE-2025-38691", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38691" }, { "name": "CVE-2023-53276", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53276" }, { "name": "CVE-2025-39759", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39759" }, { "name": "CVE-2025-38617", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38617" }, { "name": "CVE-2025-38639", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38639" }, { "name": "CVE-2025-38628", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38628" }, { "name": "CVE-2023-53518", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53518" }, { "name": "CVE-2025-38612", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38612" }, { "name": "CVE-2022-50250", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50250" }, { "name": "CVE-2023-53466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53466" }, { "name": "CVE-2023-53168", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53168" }, { "name": "CVE-2025-39860", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39860" }, { "name": "CVE-2025-21692", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21692" }, { "name": "CVE-2022-50347", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50347" }, { "name": "CVE-2025-39754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39754" }, { "name": "CVE-2023-53506", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53506" }, { "name": "CVE-2025-38566", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38566" }, { "name": "CVE-2025-39721", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39721" }, { "name": "CVE-2023-53398", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53398" }, { "name": "CVE-2025-39760", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39760" }, { "name": "CVE-2023-53149", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53149" }, { "name": "CVE-2022-50443", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50443" }, { "name": "CVE-2025-38663", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38663" }, { "name": "CVE-2023-53409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53409" }, { "name": "CVE-2023-53396", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53396" }, { "name": "CVE-2022-50260", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50260" }, { "name": "CVE-2025-39839", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39839" }, { "name": "CVE-2023-53282", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53282" }, { "name": "CVE-2025-39848", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39848" }, { "name": "CVE-2025-38722", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38722" }, { "name": "CVE-2025-39800", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39800" }, { "name": "CVE-2023-53435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53435" }, { "name": "CVE-2022-50328", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50328" }, { "name": "CVE-2023-53391", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53391" }, { "name": "CVE-2023-53487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53487" }, { "name": "CVE-2022-50267", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50267" }, { "name": "CVE-2023-53437", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53437" }, { "name": "CVE-2022-50317", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50317" }, { "name": "CVE-2025-39703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39703" }, { "name": "CVE-2023-53250", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53250" }, { "name": "CVE-2023-53338", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53338" }, { "name": "CVE-2025-38665", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38665" }, { "name": "CVE-2022-50235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50235" }, { "name": "CVE-2025-38671", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38671" }, { "name": "CVE-2023-53231", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53231" }, { "name": "CVE-2023-53206", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53206" }, { "name": "CVE-2022-50364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50364" }, { "name": "CVE-2025-38635", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38635" }, { "name": "CVE-2022-50276", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50276" }, { "name": "CVE-2023-53432", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53432" }, { "name": "CVE-2025-38488", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38488" }, { "name": "CVE-2022-50464", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50464" }, { "name": "CVE-2023-3867", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3867" }, { "name": "CVE-2022-50401", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50401" }, { "name": "CVE-2025-38540", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38540" }, { "name": "CVE-2022-50376", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50376" }, { "name": "CVE-2025-39825", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39825" }, { "name": "CVE-2023-53422", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53422" }, { "name": "CVE-2023-53383", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53383" }, { "name": "CVE-2023-53244", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53244" }, { "name": "CVE-2022-50275", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50275" }, { "name": "CVE-2023-53373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53373" }, { "name": "CVE-2022-50287", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50287" }, { "name": "CVE-2023-53375", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53375" }, { "name": "CVE-2025-39882", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39882" }, { "name": "CVE-2025-39766", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39766" }, { "name": "CVE-2025-39801", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39801" }, { "name": "CVE-2022-50308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50308" }, { "name": "CVE-2023-53530", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53530" }, { "name": "CVE-2025-38146", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38146" }, { "name": "CVE-2023-53197", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53197" }, { "name": "CVE-2025-39724", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39724" }, { "name": "CVE-2025-38510", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38510" }, { "name": "CVE-2025-39758", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39758" }, { "name": "CVE-2025-39694", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39694" }, { "name": "CVE-2025-38418", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38418" }, { "name": "CVE-2025-40300", "url": "https://www.cve.org/CVERecord?id=CVE-2025-40300" }, { "name": "CVE-2023-53401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53401" }, { "name": "CVE-2023-53229", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53229" }, { "name": "CVE-2025-39806", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39806" }, { "name": "CVE-2022-50414", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50414" }, { "name": "CVE-2023-53521", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53521" }, { "name": "CVE-2023-53479", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53479" }, { "name": "CVE-2025-38668", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38668" }, { "name": "CVE-2025-38721", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38721" }, { "name": "CVE-2023-53313", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53313" }, { "name": "CVE-2023-53395", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53395" }, { "name": "CVE-2025-39684", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39684" }, { "name": "CVE-2022-50339", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50339" }, { "name": "CVE-2022-50436", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50436" }, { "name": "CVE-2022-50271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50271" }, { "name": "CVE-2025-38526", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38526" }, { "name": "CVE-2023-53485", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53485" }, { "name": "CVE-2025-38472", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38472" }, { "name": "CVE-2025-38506", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38506" }, { "name": "CVE-2025-38703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38703" }, { "name": "CVE-2025-39870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39870" }, { "name": "CVE-2022-50241", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50241" }, { "name": "CVE-2025-39807", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39807" }, { "name": "CVE-2022-50258", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50258" }, { "name": "CVE-2025-38604", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38604" }, { "name": "CVE-2025-38623", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38623" }, { "name": "CVE-2023-53365", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53365" }, { "name": "CVE-2025-22022", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22022" }, { "name": "CVE-2025-38544", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38544" }, { "name": "CVE-2025-39922", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39922" }, { "name": "CVE-2025-39797", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39797" }, { "name": "CVE-2025-38725", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38725" }, { "name": "CVE-2023-53184", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53184" }, { "name": "CVE-2022-50365", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50365" }, { "name": "CVE-2025-38006", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38006" }, { "name": "CVE-2022-50312", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50312" }, { "name": "CVE-2023-53196", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53196" }, { "name": "CVE-2025-38125", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38125" }, { "name": "CVE-2023-53501", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53501" }, { "name": "CVE-2025-38351", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38351" }, { "name": "CVE-2025-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38477" }, { "name": "CVE-2022-50340", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50340" }, { "name": "CVE-2023-53331", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53331" }, { "name": "CVE-2024-46733", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46733" }, { "name": "CVE-2025-38683", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38683" }, { "name": "CVE-2023-53440", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53440" }, { "name": "CVE-2025-39846", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39846" }, { "name": "CVE-2022-50374", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50374" }, { "name": "CVE-2022-50375", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50375" }, { "name": "CVE-2024-58239", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58239" }, { "name": "CVE-2022-50460", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50460" }, { "name": "CVE-2023-53307", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53307" }, { "name": "CVE-2023-53152", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53152" }, { "name": "CVE-2025-38185", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38185" }, { "name": "CVE-2025-39691", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39691" }, { "name": "CVE-2025-39850", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39850" }, { "name": "CVE-2023-53442", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53442" }, { "name": "CVE-2025-39890", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39890" }, { "name": "CVE-2025-39844", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39844" }, { "name": "CVE-2025-39742", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39742" }, { "name": "CVE-2023-53286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53286" }, { "name": "CVE-2023-53207", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53207" }, { "name": "CVE-2025-38605", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38605" }, { "name": "CVE-2022-50362", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50362" }, { "name": "CVE-2023-53205", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53205" }, { "name": "CVE-2025-38263", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38263" }, { "name": "CVE-2025-38610", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38610" }, { "name": "CVE-2025-39863", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39863" }, { "name": "CVE-2023-53180", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53180" }, { "name": "CVE-2025-38560", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38560" }, { "name": "CVE-2023-53385", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53385" }, { "name": "CVE-2023-53226", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53226" }, { "name": "CVE-2023-53525", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53525" }, { "name": "CVE-2025-38701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38701" }, { "name": "CVE-2024-58240", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58240" }, { "name": "CVE-2023-53249", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53249" }, { "name": "CVE-2023-53252", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53252" }, { "name": "CVE-2023-53261", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53261" }, { "name": "CVE-2022-50396", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50396" }, { "name": "CVE-2025-39726", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39726" }, { "name": "CVE-2023-53246", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53246" }, { "name": "CVE-2024-53168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53168" }, { "name": "CVE-2023-53364", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53364" }, { "name": "CVE-2022-50423", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50423" }, { "name": "CVE-2025-38618", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38618" }, { "name": "CVE-2022-50239", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50239" }, { "name": "CVE-2023-53532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53532" }, { "name": "CVE-2022-50348", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50348" }, { "name": "CVE-2023-53508", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53508" }, { "name": "CVE-2025-38581", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38581" }, { "name": "CVE-2023-53213", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53213" }, { "name": "CVE-2023-53526", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53526" }, { "name": "CVE-2025-39891", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39891" }, { "name": "CVE-2025-39790", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39790" }, { "name": "CVE-2023-53255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53255" }, { "name": "CVE-2023-53277", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53277" }, { "name": "CVE-2025-38680", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38680" }, { "name": "CVE-2023-53379", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53379" }, { "name": "CVE-2025-38684", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38684" }, { "name": "CVE-2025-39686", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39686" }, { "name": "CVE-2025-39798", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39798" }, { "name": "CVE-2025-38730", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38730" }, { "name": "CVE-2023-4515", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4515" }, { "name": "CVE-2025-39747", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39747" }, { "name": "CVE-2023-53343", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53343" }, { "name": "CVE-2023-53299", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53299" }, { "name": "CVE-2023-53268", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53268" }, { "name": "CVE-2025-38516", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38516" }, { "name": "CVE-2023-53204", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53204" }, { "name": "CVE-2025-39714", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39714" }, { "name": "CVE-2023-53333", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53333" }, { "name": "CVE-2022-50394", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50394" }, { "name": "CVE-2023-53456", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53456" }, { "name": "CVE-2022-50266", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50266" }, { "name": "CVE-2023-53446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53446" }, { "name": "CVE-2023-53463", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53463" }, { "name": "CVE-2023-53170", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53170" }, { "name": "CVE-2023-53260", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53260" }, { "name": "CVE-2025-39854", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39854" }, { "name": "CVE-2023-53386", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53386" }, { "name": "CVE-2025-39706", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39706" }, { "name": "CVE-2025-39830", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39830" }, { "name": "CVE-2025-38576", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38576" }, { "name": "CVE-2025-39869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39869" }, { "name": "CVE-2023-53181", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53181" }, { "name": "CVE-2023-53174", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53174" }, { "name": "CVE-2025-38439", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38439" }, { "name": "CVE-2025-39719", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39719" }, { "name": "CVE-2025-39695", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39695" }, { "name": "CVE-2023-53254", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53254" }, { "name": "CVE-2022-50430", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50430" }, { "name": "CVE-2025-38553", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38553" }, { "name": "CVE-2025-38190", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38190" }, { "name": "CVE-2025-39738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39738" }, { "name": "CVE-2023-53295", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53295" }, { "name": "CVE-2023-53298", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53298" }, { "name": "CVE-2025-38205", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38205" }, { "name": "CVE-2023-53507", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53507" }, { "name": "CVE-2023-53314", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53314" }, { "name": "CVE-2023-53281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53281" }, { "name": "CVE-2023-53330", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53330" }, { "name": "CVE-2025-39705", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39705" }, { "name": "CVE-2022-50422", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50422" }, { "name": "CVE-2022-50252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50252" }, { "name": "CVE-2025-39713", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39713" }, { "name": "CVE-2023-53316", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53316" }, { "name": "CVE-2022-50412", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50412" }, { "name": "CVE-2022-50299", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50299" }, { "name": "CVE-2023-53208", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53208" }, { "name": "CVE-2025-39744", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39744" }, { "name": "CVE-2023-53315", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53315" }, { "name": "CVE-2025-38736", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38736" }, { "name": "CVE-2023-53297", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53297" }, { "name": "CVE-2023-53499", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53499" }, { "name": "CVE-2023-53234", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53234" }, { "name": "CVE-2025-21969", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969" }, { "name": "CVE-2023-53167", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53167" }, { "name": "CVE-2023-53342", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53342" }, { "name": "CVE-2025-39678", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39678" }, { "name": "CVE-2023-53414", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53414" }, { "name": "CVE-2025-38531", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38531" }, { "name": "CVE-2023-53265", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53265" }, { "name": "CVE-2025-39693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39693" }, { "name": "CVE-2022-50246", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50246" }, { "name": "CVE-2025-38503", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38503" }, { "name": "CVE-2025-38630", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38630" }, { "name": "CVE-2023-53490", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53490" }, { "name": "CVE-2023-53302", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53302" }, { "name": "CVE-2023-53482", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53482" }, { "name": "CVE-2023-53444", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53444" }, { "name": "CVE-2023-53175", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53175" }, { "name": "CVE-2022-50392", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50392" }, { "name": "CVE-2025-38585", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38585" }, { "name": "CVE-2022-50233", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50233" }, { "name": "CVE-2023-53274", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53274" }, { "name": "CVE-2025-39682", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39682" }, { "name": "CVE-2022-50410", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50410" }, { "name": "CVE-2022-50428", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50428" }, { "name": "CVE-2023-39197", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39197" }, { "name": "CVE-2025-39833", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39833" }, { "name": "CVE-2025-39832", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39832" }, { "name": "CVE-2023-53495", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53495" }, { "name": "CVE-2023-53436", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53436" }, { "name": "CVE-2022-50402", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50402" }, { "name": "CVE-2025-38643", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38643" }, { "name": "CVE-2022-50427", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50427" }, { "name": "CVE-2022-50278", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50278" }, { "name": "CVE-2023-53273", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53273" }, { "name": "CVE-2023-53377", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53377" }, { "name": "CVE-2023-53500", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53500" }, { "name": "CVE-2025-38103", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38103" }, { "name": "CVE-2025-39847", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39847" }, { "name": "CVE-2025-38514", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38514" }, { "name": "CVE-2025-38360", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38360" }, { "name": "CVE-2025-39783", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39783" }, { "name": "CVE-2025-39835", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39835" }, { "name": "CVE-2025-38255", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38255" }, { "name": "CVE-2025-38512", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38512" }, { "name": "CVE-2025-38622", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38622" }, { "name": "CVE-2022-50279", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50279" }, { "name": "CVE-2023-53243", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53243" }, { "name": "CVE-2023-53348", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53348" }, { "name": "CVE-2023-53219", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53219" }, { "name": "CVE-2022-50467", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50467" }, { "name": "CVE-2023-53428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53428" }, { "name": "CVE-2025-39677", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39677" }, { "name": "CVE-2022-50440", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50440" }, { "name": "CVE-2025-39707", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39707" }, { "name": "CVE-2022-50248", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50248" }, { "name": "CVE-2025-39907", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39907" }, { "name": "CVE-2023-53147", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53147" }, { "name": "CVE-2023-53292", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53292" }, { "name": "CVE-2025-38640", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38640" }, { "name": "CVE-2023-53371", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53371" }, { "name": "CVE-2025-38659", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38659" }, { "name": "CVE-2022-50311", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50311" }, { "name": "CVE-2024-53125", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53125" }, { "name": "CVE-2025-38572", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38572" }, { "name": "CVE-2022-50381", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50381" }, { "name": "CVE-2023-53187", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53187" }, { "name": "CVE-2025-38550", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38550" }, { "name": "CVE-2023-53201", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53201" }, { "name": "CVE-2025-39711", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39711" }, { "name": "CVE-2022-50385", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50385" }, { "name": "CVE-2025-38535", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38535" }, { "name": "CVE-2025-39873", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39873" }, { "name": "CVE-2022-50459", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50459" }, { "name": "CVE-2023-53192", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53192" }, { "name": "CVE-2022-50277", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50277" }, { "name": "CVE-2025-38714", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38714" }, { "name": "CVE-2023-53251", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53251" }, { "name": "CVE-2024-53093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53093" }, { "name": "CVE-2023-53337", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53337" }, { "name": "CVE-2023-53380", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53380" }, { "name": "CVE-2023-53452", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53452" }, { "name": "CVE-2022-50369", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50369" }, { "name": "CVE-2023-53153", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53153" } ], "initial_release_date": "2025-10-17T00:00:00", "last_revision_date": "2025-10-17T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0895", "revisions": [ { "description": "Version initiale", "revision_date": "2025-10-17T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE", "vendor_advisories": [ { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03615-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503615-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03553-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503553-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03557-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503557-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03539-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503539-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03543-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503543-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03580-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503580-1" }, { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03613-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503613-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03600-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503600-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03602-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503602-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03561-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503561-1" }, { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03614-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503614-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03567-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503567-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03554-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503554-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03576-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503576-1" }, { "published_at": "2025-10-17", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03626-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503626-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03548-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503548-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03551-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503551-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03601-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503601-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03578-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503578-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03575-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503575-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03562-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503562-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03572-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503572-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03550-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503550-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03568-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503568-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03569-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503569-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03563-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503563-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03566-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503566-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03555-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503555-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03529-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503529-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03538-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503538-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03571-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503571-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03559-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503559-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03528-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503528-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03583-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503583-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03552-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503552-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03577-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503577-1" } ] }
fkie_cve-2022-50370
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/301c8f5c32c8fb79c67539bc23972dc3ef48024c | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/7fa5304c4b5b425d4a0b3acf10139a7f6108a85f | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/a206f7fbe9589c60fafad12884628c909ecb042f | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/aa59ac81e859006d3a1df035a19b3f2089110f93 |
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: designware: Fix handling of real but unexpected device interrupts\n\nCommit c7b79a752871 (\"mfd: intel-lpss: Add Intel Alder Lake PCH-S PCI\nIDs\") caused a regression on certain Gigabyte motherboards for Intel\nAlder Lake-S where system crashes to NULL pointer dereference in\ni2c_dw_xfer_msg() when system resumes from S3 sleep state (\"deep\").\n\nI was able to debug the issue on Gigabyte Z690 AORUS ELITE and made\nfollowing notes:\n\n- Issue happens when resuming from S3 but not when resuming from\n \"s2idle\"\n- PCI device 00:15.0 == i2c_designware.0 is already in D0 state when\n system enters into pci_pm_resume_noirq() while all other i2c_designware\n PCI devices are in D3. Devices were runtime suspended and in D3 prior\n entering into suspend\n- Interrupt comes after pci_pm_resume_noirq() when device interrupts are\n re-enabled\n- According to register dump the interrupt really comes from the\n i2c_designware.0. Controller is enabled, I2C target address register\n points to a one detectable I2C device address 0x60 and the\n DW_IC_RAW_INTR_STAT register START_DET, STOP_DET, ACTIVITY and\n TX_EMPTY bits are set indicating completed I2C transaction.\n\nMy guess is that the firmware uses this controller to communicate with\nan on-board I2C device during resume but does not disable the controller\nbefore giving control to an operating system.\n\nI was told the UEFI update fixes this but never the less it revealed the\ndriver is not ready to handle TX_EMPTY (or RX_FULL) interrupt when device\nis supposed to be idle and state variables are not set (especially the\ndev-\u003emsgs pointer which may point to NULL or stale old data).\n\nIntroduce a new software status flag STATUS_ACTIVE indicating when the\ncontroller is active in driver point of view. Now treat all interrupts\nthat occur when is not set as unexpected and mask all interrupts from\nthe controller." } ], "id": "CVE-2022-50370", "lastModified": "2025-09-18T13:43:34.310", "metrics": {}, "published": "2025-09-17T15:15:35.950", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/301c8f5c32c8fb79c67539bc23972dc3ef48024c" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/7fa5304c4b5b425d4a0b3acf10139a7f6108a85f" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/a206f7fbe9589c60fafad12884628c909ecb042f" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/aa59ac81e859006d3a1df035a19b3f2089110f93" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
ghsa-589j-8g5m-4cxh
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
i2c: designware: Fix handling of real but unexpected device interrupts
Commit c7b79a752871 ("mfd: intel-lpss: Add Intel Alder Lake PCH-S PCI IDs") caused a regression on certain Gigabyte motherboards for Intel Alder Lake-S where system crashes to NULL pointer dereference in i2c_dw_xfer_msg() when system resumes from S3 sleep state ("deep").
I was able to debug the issue on Gigabyte Z690 AORUS ELITE and made following notes:
- Issue happens when resuming from S3 but not when resuming from "s2idle"
- PCI device 00:15.0 == i2c_designware.0 is already in D0 state when system enters into pci_pm_resume_noirq() while all other i2c_designware PCI devices are in D3. Devices were runtime suspended and in D3 prior entering into suspend
- Interrupt comes after pci_pm_resume_noirq() when device interrupts are re-enabled
- According to register dump the interrupt really comes from the i2c_designware.0. Controller is enabled, I2C target address register points to a one detectable I2C device address 0x60 and the DW_IC_RAW_INTR_STAT register START_DET, STOP_DET, ACTIVITY and TX_EMPTY bits are set indicating completed I2C transaction.
My guess is that the firmware uses this controller to communicate with an on-board I2C device during resume but does not disable the controller before giving control to an operating system.
I was told the UEFI update fixes this but never the less it revealed the driver is not ready to handle TX_EMPTY (or RX_FULL) interrupt when device is supposed to be idle and state variables are not set (especially the dev->msgs pointer which may point to NULL or stale old data).
Introduce a new software status flag STATUS_ACTIVE indicating when the controller is active in driver point of view. Now treat all interrupts that occur when is not set as unexpected and mask all interrupts from the controller.
{ "affected": [], "aliases": [ "CVE-2022-50370" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-09-17T15:15:35Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: designware: Fix handling of real but unexpected device interrupts\n\nCommit c7b79a752871 (\"mfd: intel-lpss: Add Intel Alder Lake PCH-S PCI\nIDs\") caused a regression on certain Gigabyte motherboards for Intel\nAlder Lake-S where system crashes to NULL pointer dereference in\ni2c_dw_xfer_msg() when system resumes from S3 sleep state (\"deep\").\n\nI was able to debug the issue on Gigabyte Z690 AORUS ELITE and made\nfollowing notes:\n\n- Issue happens when resuming from S3 but not when resuming from\n \"s2idle\"\n- PCI device 00:15.0 == i2c_designware.0 is already in D0 state when\n system enters into pci_pm_resume_noirq() while all other i2c_designware\n PCI devices are in D3. Devices were runtime suspended and in D3 prior\n entering into suspend\n- Interrupt comes after pci_pm_resume_noirq() when device interrupts are\n re-enabled\n- According to register dump the interrupt really comes from the\n i2c_designware.0. Controller is enabled, I2C target address register\n points to a one detectable I2C device address 0x60 and the\n DW_IC_RAW_INTR_STAT register START_DET, STOP_DET, ACTIVITY and\n TX_EMPTY bits are set indicating completed I2C transaction.\n\nMy guess is that the firmware uses this controller to communicate with\nan on-board I2C device during resume but does not disable the controller\nbefore giving control to an operating system.\n\nI was told the UEFI update fixes this but never the less it revealed the\ndriver is not ready to handle TX_EMPTY (or RX_FULL) interrupt when device\nis supposed to be idle and state variables are not set (especially the\ndev-\u003emsgs pointer which may point to NULL or stale old data).\n\nIntroduce a new software status flag STATUS_ACTIVE indicating when the\ncontroller is active in driver point of view. Now treat all interrupts\nthat occur when is not set as unexpected and mask all interrupts from\nthe controller.", "id": "GHSA-589j-8g5m-4cxh", "modified": "2025-09-17T15:30:38Z", "published": "2025-09-17T15:30:38Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50370" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/301c8f5c32c8fb79c67539bc23972dc3ef48024c" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/7fa5304c4b5b425d4a0b3acf10139a7f6108a85f" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/a206f7fbe9589c60fafad12884628c909ecb042f" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/aa59ac81e859006d3a1df035a19b3f2089110f93" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.