Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53383 (GCVE-0-2023-53383)
Vulnerability from cvelistv5
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "Documentation/arm64/silicon-errata.rst", "drivers/firmware/smccc/smccc.c", "drivers/firmware/smccc/soc_id.c", "drivers/irqchip/Kconfig", "drivers/irqchip/irq-gic-v3.c", "include/linux/arm-smccc.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "867a4f6cf1a8f511c06e131477988b3b3e7a0633", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" }, { "lessThan": "35727af2b15d98a2dd2811d631d3a3886111312e", "status": "affected", "version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "Documentation/arm64/silicon-errata.rst", "drivers/firmware/smccc/smccc.c", "drivers/firmware/smccc/soc_id.c", "drivers/irqchip/Kconfig", "drivers/irqchip/irq-gic-v3.c", "include/linux/arm-smccc.h" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.30", "versionType": "semver" }, { "lessThanOrEqual": "6.3.*", "status": "unaffected", "version": "6.3.4", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.4", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.30", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4\n\nThe T241 platform suffers from the T241-FABRIC-4 erratum which causes\nunexpected behavior in the GIC when multiple transactions are received\nsimultaneously from different sources. This hardware issue impacts\nNVIDIA server platforms that use more than two T241 chips\ninterconnected. Each chip has support for 320 {E}SPIs.\n\nThis issue occurs when multiple packets from different GICs are\nincorrectly interleaved at the target chip. The erratum text below\nspecifies exactly what can cause multiple transfer packets susceptible\nto interleaving and GIC state corruption. GIC state corruption can\nlead to a range of problems, including kernel panics, and unexpected\nbehavior.\n\n\u003eFrom the erratum text:\n \"In some cases, inter-socket AXI4 Stream packets with multiple\n transfers, may be interleaved by the fabric when presented to ARM\n Generic Interrupt Controller. GIC expects all transfers of a packet\n to be delivered without any interleaving.\n\n The following GICv3 commands may result in multiple transfer packets\n over inter-socket AXI4 Stream interface:\n - Register reads from GICD_I* and GICD_N*\n - Register writes to 64-bit GICD registers other than GICD_IROUTERn*\n - ITS command MOVALL\n\n Multiple commands in GICv4+ utilize multiple transfer packets,\n including VMOVP, VMOVI, VMAPP, and 64-bit register accesses.\"\n\n This issue impacts system configurations with more than 2 sockets,\n that require multi-transfer packets to be sent over inter-socket\n AXI4 Stream interface between GIC instances on different sockets.\n GICv4 cannot be supported. GICv3 SW model can only be supported\n with the workaround. Single and Dual socket configurations are not\n impacted by this issue and support GICv3 and GICv4.\"\n\n\nWriting to the chip alias region of the GICD_In{E} registers except\nGICD_ICENABLERn has an equivalent effect as writing to the global\ndistributor. The SPI interrupt deactivate path is not impacted by\nthe erratum.\n\nTo fix this problem, implement a workaround that ensures read accesses\nto the GICD_In{E} registers are directed to the chip that owns the\nSPI, and disable GICv4.x features. To simplify code changes, the\ngic_configure_irq() function uses the same alias region for both read\nand write operations to GICD_ICFGR." } ], "providerMetadata": { "dateUpdated": "2025-09-18T13:33:27.731Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0" }, { "url": "https://git.kernel.org/stable/c/867a4f6cf1a8f511c06e131477988b3b3e7a0633" }, { "url": "https://git.kernel.org/stable/c/35727af2b15d98a2dd2811d631d3a3886111312e" } ], "title": "irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2023-53383", "datePublished": "2025-09-18T13:33:27.731Z", "dateReserved": "2025-09-17T14:54:09.736Z", "dateUpdated": "2025-09-18T13:33:27.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-53383\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-18T14:15:41.310\",\"lastModified\":\"2025-09-19T16:00:27.847\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nirqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4\\n\\nThe T241 platform suffers from the T241-FABRIC-4 erratum which causes\\nunexpected behavior in the GIC when multiple transactions are received\\nsimultaneously from different sources. This hardware issue impacts\\nNVIDIA server platforms that use more than two T241 chips\\ninterconnected. Each chip has support for 320 {E}SPIs.\\n\\nThis issue occurs when multiple packets from different GICs are\\nincorrectly interleaved at the target chip. The erratum text below\\nspecifies exactly what can cause multiple transfer packets susceptible\\nto interleaving and GIC state corruption. GIC state corruption can\\nlead to a range of problems, including kernel panics, and unexpected\\nbehavior.\\n\\n\u003eFrom the erratum text:\\n \\\"In some cases, inter-socket AXI4 Stream packets with multiple\\n transfers, may be interleaved by the fabric when presented to ARM\\n Generic Interrupt Controller. GIC expects all transfers of a packet\\n to be delivered without any interleaving.\\n\\n The following GICv3 commands may result in multiple transfer packets\\n over inter-socket AXI4 Stream interface:\\n - Register reads from GICD_I* and GICD_N*\\n - Register writes to 64-bit GICD registers other than GICD_IROUTERn*\\n - ITS command MOVALL\\n\\n Multiple commands in GICv4+ utilize multiple transfer packets,\\n including VMOVP, VMOVI, VMAPP, and 64-bit register accesses.\\\"\\n\\n This issue impacts system configurations with more than 2 sockets,\\n that require multi-transfer packets to be sent over inter-socket\\n AXI4 Stream interface between GIC instances on different sockets.\\n GICv4 cannot be supported. GICv3 SW model can only be supported\\n with the workaround. Single and Dual socket configurations are not\\n impacted by this issue and support GICv3 and GICv4.\\\"\\n\\n\\nWriting to the chip alias region of the GICD_In{E} registers except\\nGICD_ICENABLERn has an equivalent effect as writing to the global\\ndistributor. The SPI interrupt deactivate path is not impacted by\\nthe erratum.\\n\\nTo fix this problem, implement a workaround that ensures read accesses\\nto the GICD_In{E} registers are directed to the chip that owns the\\nSPI, and disable GICv4.x features. To simplify code changes, the\\ngic_configure_irq() function uses the same alias region for both read\\nand write operations to GICD_ICFGR.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/35727af2b15d98a2dd2811d631d3a3886111312e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/867a4f6cf1a8f511c06e131477988b3b3e7a0633\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
CERTFR-2025-AVI-0895
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
SUSE | Confidential Computing Module | Confidential Computing Module 15-SP6 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
SUSE | Basesystem Module | Basesystem Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP7 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
SUSE | Legacy Module | Legacy Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
SUSE | SUSE Enterprise Storage | SUSE Enterprise Storage 7.1 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
SUSE | Development Tools Module | Development Tools Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
SUSE | Basesystem Module | Basesystem Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP6 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
SUSE | Legacy Module | Legacy Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 | ||
SUSE | Development Tools Module | Development Tools Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SUSE Linux Enterprise High Performance Computing 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Confidential Computing Module 15-SP6", "product": { "name": "Confidential Computing Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP5", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP7", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.2", "product": { "name": "SUSE Manager Retail Branch Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 12 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP4", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.2", "product": { "name": "SUSE Manager Proxy", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 12-SP5", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP6", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP7", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP6", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP7", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.2", "product": { "name": "SUSE Manager Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP6", "product": { "name": "Legacy Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP5", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP6", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP6", "product": { "name": "Development Tools Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP7", "product": { "name": "SUSE Linux Enterprise Workstation Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP4", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP3", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.2", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP7", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP7", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP6", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP3", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP6", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP7", "product": { "name": "Legacy Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP7", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP6", "product": { "name": "SUSE Linux Enterprise Workstation Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP7", "product": { "name": "Development Tools Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP6", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP4", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-53443", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53443" }, { "name": "CVE-2023-53453", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53453" }, { "name": "CVE-2022-50378", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50378" }, { "name": "CVE-2025-38380", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38380" }, { "name": "CVE-2022-50291", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50291" }, { "name": "CVE-2023-53247", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53247" }, { "name": "CVE-2022-50433", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50433" }, { "name": "CVE-2022-50356", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50356" }, { "name": "CVE-2023-53473", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53473" }, { "name": "CVE-2022-49138", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49138" }, { "name": "CVE-2022-50425", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50425" }, { "name": "CVE-2025-38201", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38201" }, { "name": "CVE-2022-50367", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50367" }, { "name": "CVE-2025-39808", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39808" }, { "name": "CVE-2023-53347", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53347" }, { "name": "CVE-2023-53475", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53475" }, { "name": "CVE-2025-38520", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38520" }, { "name": "CVE-2023-53312", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53312" }, { "name": "CVE-2025-38588", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38588" }, { "name": "CVE-2023-53311", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53311" }, { "name": "CVE-2025-38574", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38574" }, { "name": "CVE-2022-50398", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50398" }, { "name": "CVE-2023-53393", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53393" }, { "name": "CVE-2023-53480", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53480" }, { "name": "CVE-2023-53303", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53303" }, { "name": "CVE-2023-28328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28328" }, { "name": "CVE-2025-39757", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39757" }, { "name": "CVE-2022-50469", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50469" }, { "name": "CVE-2022-50429", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50429" }, { "name": "CVE-2023-53193", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53193" }, { "name": "CVE-2023-53150", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53150" }, { "name": "CVE-2023-53321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53321" }, { "name": "CVE-2025-39772", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39772" }, { "name": "CVE-2023-53317", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53317" }, { "name": "CVE-2023-53176", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53176" }, { "name": "CVE-2023-53362", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53362" }, { "name": "CVE-2022-50298", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50298" }, { "name": "CVE-2025-38601", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38601" }, { "name": "CVE-2025-39826", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39826" }, { "name": "CVE-2022-50288", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50288" }, { "name": "CVE-2025-38515", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38515" }, { "name": "CVE-2025-38645", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38645" }, { "name": "CVE-2023-5633", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5633" }, { "name": "CVE-2025-38444", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38444" }, { "name": "CVE-2023-53349", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53349" }, { "name": "CVE-2025-39685", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39685" }, { "name": "CVE-2025-38660", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38660" }, { "name": "CVE-2025-39761", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39761" }, { "name": "CVE-2023-53405", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53405" }, { "name": "CVE-2023-53185", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53185" }, { "name": "CVE-2023-53320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53320" }, { "name": "CVE-2023-53359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53359" }, { "name": "CVE-2022-50466", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50466" }, { "name": "CVE-2023-53509", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53509" }, { "name": "CVE-2023-53421", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53421" }, { "name": "CVE-2023-53441", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53441" }, { "name": "CVE-2023-53199", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53199" }, { "name": "CVE-2025-39764", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39764" }, { "name": "CVE-2023-53245", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53245" }, { "name": "CVE-2023-53415", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53415" }, { "name": "CVE-2025-38624", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38624" }, { "name": "CVE-2024-53194", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53194" }, { "name": "CVE-2025-39827", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39827" }, { "name": "CVE-2022-50255", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50255" }, { "name": "CVE-2025-39746", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39746" }, { "name": "CVE-2023-53461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53461" }, { "name": "CVE-2025-38208", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38208" }, { "name": "CVE-2023-53531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53531" }, { "name": "CVE-2025-39889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39889" }, { "name": "CVE-2025-38524", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38524" }, { "name": "CVE-2025-38466", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38466" }, { "name": "CVE-2023-53258", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53258" }, { "name": "CVE-2023-53429", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53429" }, { "name": "CVE-2023-53449", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53449" }, { "name": "CVE-2025-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38595" }, { "name": "CVE-2023-53451", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53451" }, { "name": "CVE-2023-53325", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53325" }, { "name": "CVE-2022-50368", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50368" }, { "name": "CVE-2023-53511", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53511" }, { "name": "CVE-2025-38216", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38216" }, { "name": "CVE-2022-50349", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50349" }, { "name": "CVE-2023-53394", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53394" }, { "name": "CVE-2023-53494", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53494" }, { "name": "CVE-2025-39925", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39925" }, { "name": "CVE-2025-39811", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39811" }, { "name": "CVE-2022-50358", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50358" }, { "name": "CVE-2025-38646", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38646" }, { "name": "CVE-2025-38491", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38491" }, { "name": "CVE-2025-38408", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38408" }, { "name": "CVE-2022-50386", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50386" }, { "name": "CVE-2025-38644", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38644" }, { "name": "CVE-2025-38692", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38692" }, { "name": "CVE-2022-50244", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50244" }, { "name": "CVE-2025-38563", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38563" }, { "name": "CVE-2023-53209", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53209" }, { "name": "CVE-2025-39701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39701" }, { "name": "CVE-2023-53222", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53222" }, { "name": "CVE-2023-53264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53264" }, { "name": "CVE-2022-50323", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50323" }, { "name": "CVE-2025-38591", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38591" }, { "name": "CVE-2022-50441", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50441" }, { "name": "CVE-2025-38609", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38609" }, { "name": "CVE-2023-53519", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53519" }, { "name": "CVE-2022-50294", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50294" }, { "name": "CVE-2023-53447", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53447" }, { "name": "CVE-2023-53472", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53472" }, { "name": "CVE-2022-50242", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50242" }, { "name": "CVE-2023-53248", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53248" }, { "name": "CVE-2025-22023", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22023" }, { "name": "CVE-2025-38500", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38500" }, { "name": "CVE-2025-39709", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39709" }, { "name": "CVE-2023-53217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53217" }, { "name": "CVE-2023-53390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53390" }, { "name": "CVE-2023-53491", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53491" }, { "name": "CVE-2025-39787", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39787" }, { "name": "CVE-2025-39920", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39920" }, { "name": "CVE-2022-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50379" }, { "name": "CVE-2022-50257", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50257" }, { "name": "CVE-2023-53354", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53354" }, { "name": "CVE-2023-53504", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53504" }, { "name": "CVE-2025-38734", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38734" }, { "name": "CVE-2025-38571", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38571" }, { "name": "CVE-2022-50301", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50301" }, { "name": "CVE-2022-50432", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50432" }, { "name": "CVE-2023-53340", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53340" }, { "name": "CVE-2025-38695", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38695" }, { "name": "CVE-2023-52923", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52923" }, { "name": "CVE-2023-53323", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53323" }, { "name": "CVE-2025-39749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39749" }, { "name": "CVE-2022-50304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50304" }, { "name": "CVE-2024-26661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26661" }, { "name": "CVE-2023-53189", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53189" }, { "name": "CVE-2023-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53427" }, { "name": "CVE-2023-53498", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53498" }, { "name": "CVE-2023-4130", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4130" }, { "name": "CVE-2023-53242", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53242" }, { "name": "CVE-2022-50395", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50395" }, { "name": "CVE-2023-53309", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53309" }, { "name": "CVE-2025-39923", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39923" }, { "name": "CVE-2025-38445", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38445" }, { "name": "CVE-2025-38456", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38456" }, { "name": "CVE-2025-38538", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38538" }, { "name": "CVE-2022-50456", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50456" }, { "name": "CVE-2025-39751", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39751" }, { "name": "CVE-2024-58238", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58238" }, { "name": "CVE-2023-53425", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53425" }, { "name": "CVE-2022-50458", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50458" }, { "name": "CVE-2022-50321", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50321" }, { "name": "CVE-2023-53235", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53235" }, { "name": "CVE-2025-38565", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38565" }, { "name": "CVE-2022-50439", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50439" }, { "name": "CVE-2025-38710", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38710" }, { "name": "CVE-2023-53304", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53304" }, { "name": "CVE-2025-39681", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39681" }, { "name": "CVE-2023-53216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53216" }, { "name": "CVE-2025-39770", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39770" }, { "name": "CVE-2023-53339", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53339" }, { "name": "CVE-2023-53239", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53239" }, { "name": "CVE-2023-53280", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53280" }, { "name": "CVE-2025-38705", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38705" }, { "name": "CVE-2023-53179", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53179" }, { "name": "CVE-2022-50434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50434" }, { "name": "CVE-2025-38706", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38706" }, { "name": "CVE-2022-50234", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50234" }, { "name": "CVE-2025-39750", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39750" }, { "name": "CVE-2025-38587", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38587" }, { "name": "CVE-2023-53520", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53520" }, { "name": "CVE-2022-50353", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50353" }, { "name": "CVE-2023-53493", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53493" }, { "name": "CVE-2022-49975", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49975" }, { "name": "CVE-2022-50404", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50404" }, { "name": "CVE-2023-53492", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53492" }, { "name": "CVE-2023-31248", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31248" }, { "name": "CVE-2022-50360", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50360" }, { "name": "CVE-2023-53388", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53388" }, { "name": "CVE-2025-39853", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39853" }, { "name": "CVE-2025-38555", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38555" }, { "name": "CVE-2023-53221", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53221" }, { "name": "CVE-2022-50264", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50264" }, { "name": "CVE-2025-39871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39871" }, { "name": "CVE-2025-39857", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39857" }, { "name": "CVE-2022-50452", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50452" }, { "name": "CVE-2022-50320", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50320" }, { "name": "CVE-2025-38590", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38590" }, { "name": "CVE-2025-38709", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38709" }, { "name": "CVE-2022-50286", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50286" }, { "name": "CVE-2022-50449", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50449" }, { "name": "CVE-2023-53431", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53431" }, { "name": "CVE-2022-50324", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50324" }, { "name": "CVE-2024-58090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58090" }, { "name": "CVE-2023-53462", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53462" }, { "name": "CVE-2025-39865", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39865" }, { "name": "CVE-2025-39816", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39816" }, { "name": "CVE-2025-38584", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38584" }, { "name": "CVE-2025-39675", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39675" }, { "name": "CVE-2025-39679", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39679" }, { "name": "CVE-2025-38527", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38527" }, { "name": "CVE-2025-37958", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37958" }, { "name": "CVE-2022-50447", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50447" }, { "name": "CVE-2022-50251", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50251" }, { "name": "CVE-2025-39763", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39763" }, { "name": "CVE-2023-53148", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53148" }, { "name": "CVE-2025-38693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38693" }, { "name": "CVE-2025-38679", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38679" }, { "name": "CVE-2025-38459", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38459" }, { "name": "CVE-2022-50373", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50373" }, { "name": "CVE-2023-53505", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53505" }, { "name": "CVE-2025-38685", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38685" }, { "name": "CVE-2022-50269", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50269" }, { "name": "CVE-2023-53275", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53275" }, { "name": "CVE-2022-50437", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50437" }, { "name": "CVE-2022-50391", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50391" }, { "name": "CVE-2023-53476", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53476" }, { "name": "CVE-2025-38184", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38184" }, { "name": "CVE-2023-53468", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53468" }, { "name": "CVE-2022-50261", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50261" }, { "name": "CVE-2022-50351", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50351" }, { "name": "CVE-2022-50272", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50272" }, { "name": "CVE-2022-50331", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50331" }, { "name": "CVE-2025-39838", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39838" }, { "name": "CVE-2025-39823", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39823" }, { "name": "CVE-2025-38234", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38234" }, { "name": "CVE-2024-50154", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50154" }, { "name": "CVE-2025-38634", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38634" }, { "name": "CVE-2023-53183", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53183" }, { "name": "CVE-2023-53195", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53195" }, { "name": "CVE-2023-53232", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53232" }, { "name": "CVE-2025-39864", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39864" }, { "name": "CVE-2025-38458", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38458" }, { "name": "CVE-2025-39730", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39730" }, { "name": "CVE-2025-38011", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38011" }, { "name": "CVE-2022-50268", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50268" }, { "name": "CVE-2022-36280", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36280" }, { "name": "CVE-2023-53319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53319" }, { "name": "CVE-2022-50444", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50444" }, { "name": "CVE-2025-39824", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39824" }, { "name": "CVE-2023-53515", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53515" }, { "name": "CVE-2023-53420", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53420" }, { "name": "CVE-2023-53424", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53424" }, { "name": "CVE-2025-38464", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38464" }, { "name": "CVE-2023-53241", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53241" }, { "name": "CVE-2023-53305", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53305" }, { "name": "CVE-2023-42753", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42753" }, { "name": "CVE-2025-38702", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38702" }, { "name": "CVE-2023-53177", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53177" }, { "name": "CVE-2023-53381", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53381" }, { "name": "CVE-2023-53369", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53369" }, { "name": "CVE-2025-38724", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38724" }, { "name": "CVE-2022-50419", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50419" }, { "name": "CVE-2025-38582", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38582" }, { "name": "CVE-2023-53332", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53332" }, { "name": "CVE-2025-38543", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38543" }, { "name": "CVE-2025-38698", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38698" }, { "name": "CVE-2023-53328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53328" }, { "name": "CVE-2022-50289", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50289" }, { "name": "CVE-2022-50329", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50329" }, { "name": "CVE-2025-39842", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39842" }, { "name": "CVE-2025-39739", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39739" }, { "name": "CVE-2023-53165", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53165" }, { "name": "CVE-2023-53270", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53270" }, { "name": "CVE-2025-38419", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38419" }, { "name": "CVE-2025-38533", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38533" }, { "name": "CVE-2023-53284", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53284" }, { "name": "CVE-2022-50265", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50265" }, { "name": "CVE-2025-38537", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38537" }, { "name": "CVE-2025-39849", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39849" }, { "name": "CVE-2025-38546", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38546" }, { "name": "CVE-2022-50409", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50409" }, { "name": "CVE-2022-50453", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50453" }, { "name": "CVE-2023-53512", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53512" }, { "name": "CVE-2022-50418", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50418" }, { "name": "CVE-2023-53438", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53438" }, { "name": "CVE-2023-53238", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53238" }, { "name": "CVE-2025-21791", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791" }, { "name": "CVE-2025-39861", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39861" }, { "name": "CVE-2022-50253", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50253" }, { "name": "CVE-2022-50405", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50405" }, { "name": "CVE-2025-38251", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38251" }, { "name": "CVE-2023-53378", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53378" }, { "name": "CVE-2025-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38597" }, { "name": "CVE-2025-39743", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39743" }, { "name": "CVE-2025-39718", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39718" }, { "name": "CVE-2022-50333", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50333" }, { "name": "CVE-2025-38712", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38712" }, { "name": "CVE-2025-38732", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38732" }, { "name": "CVE-2025-39773", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39773" }, { "name": "CVE-2023-53360", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53360" }, { "name": "CVE-2025-39885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39885" }, { "name": "CVE-2023-53336", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53336" }, { "name": "CVE-2023-53426", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53426" }, { "name": "CVE-2023-53370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53370" }, { "name": "CVE-2022-50330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50330" }, { "name": "CVE-2023-53223", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53223" }, { "name": "CVE-2022-2602", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2602" }, { "name": "CVE-2025-38632", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38632" }, { "name": "CVE-2022-50309", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50309" }, { "name": "CVE-2025-38548", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38548" }, { "name": "CVE-2023-53448", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53448" }, { "name": "CVE-2023-53308", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53308" }, { "name": "CVE-2023-53374", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53374" }, { "name": "CVE-2023-53384", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53384" }, { "name": "CVE-2025-38014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38014" }, { "name": "CVE-2022-50297", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50297" }, { "name": "CVE-2025-38727", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38727" }, { "name": "CVE-2025-38465", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38465" }, { "name": "CVE-2022-50435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50435" }, { "name": "CVE-2025-38513", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38513" }, { "name": "CVE-2022-50411", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50411" }, { "name": "CVE-2022-50465", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50465" }, { "name": "CVE-2022-50346", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50346" }, { "name": "CVE-2025-38670", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38670" }, { "name": "CVE-2025-39732", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39732" }, { "name": "CVE-2023-53458", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53458" }, { "name": "CVE-2022-50393", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50393" }, { "name": "CVE-2023-53367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53367" }, { "name": "CVE-2025-38602", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38602" }, { "name": "CVE-2022-50417", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50417" }, { "name": "CVE-2023-53326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53326" }, { "name": "CVE-2025-38441", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38441" }, { "name": "CVE-2023-53457", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53457" }, { "name": "CVE-2025-39845", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39845" }, { "name": "CVE-2023-53230", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53230" }, { "name": "CVE-2023-53397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53397" }, { "name": "CVE-2023-53171", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53171" }, { "name": "CVE-2025-38568", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38568" }, { "name": "CVE-2023-53489", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53489" }, { "name": "CVE-2022-50370", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50370" }, { "name": "CVE-2025-38583", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38583" }, { "name": "CVE-2023-53516", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53516" }, { "name": "CVE-2023-53474", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53474" }, { "name": "CVE-2025-38499", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38499" }, { "name": "CVE-2025-38735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38735" }, { "name": "CVE-2022-50247", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50247" }, { "name": "CVE-2025-38402", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38402" }, { "name": "CVE-2022-50325", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50325" }, { "name": "CVE-2022-50355", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50355" }, { "name": "CVE-2023-53400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53400" }, { "name": "CVE-2022-50292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50292" }, { "name": "CVE-2023-53287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53287" }, { "name": "CVE-2025-38616", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38616" }, { "name": "CVE-2025-37738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738" }, { "name": "CVE-2022-50406", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50406" }, { "name": "CVE-2025-38119", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38119" }, { "name": "CVE-2025-38245", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38245" }, { "name": "CVE-2025-38656", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38656" }, { "name": "CVE-2022-50454", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50454" }, { "name": "CVE-2023-53350", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53350" }, { "name": "CVE-2025-38614", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38614" }, { "name": "CVE-2022-50354", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50354" }, { "name": "CVE-2022-50249", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50249" }, { "name": "CVE-2023-53237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53237" }, { "name": "CVE-2025-38664", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38664" }, { "name": "CVE-2023-53454", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53454" }, { "name": "CVE-2023-53471", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53471" }, { "name": "CVE-2023-53182", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53182" }, { "name": "CVE-2025-38541", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38541" }, { "name": "CVE-2023-53416", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53416" }, { "name": "CVE-2022-50344", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50344" }, { "name": "CVE-2023-53322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53322" }, { "name": "CVE-2023-53220", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53220" }, { "name": "CVE-2023-53272", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53272" }, { "name": "CVE-2022-50388", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50388" }, { "name": "CVE-2023-53178", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53178" }, { "name": "CVE-2023-53210", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53210" }, { "name": "CVE-2025-38694", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38694" }, { "name": "CVE-2021-4460", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4460" }, { "name": "CVE-2023-3772", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3772" }, { "name": "CVE-2023-53259", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53259" }, { "name": "CVE-2025-38676", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38676" }, { "name": "CVE-2025-38530", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38530" }, { "name": "CVE-2024-26583", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26583" }, { "name": "CVE-2022-50318", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50318" }, { "name": "CVE-2023-53413", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53413" }, { "name": "CVE-2022-50389", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50389" }, { "name": "CVE-2023-53528", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53528" }, { "name": "CVE-2023-53524", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53524" }, { "name": "CVE-2023-53496", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53496" }, { "name": "CVE-2025-38729", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38729" }, { "name": "CVE-2023-53257", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53257" }, { "name": "CVE-2022-50390", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50390" }, { "name": "CVE-2023-53523", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53523" }, { "name": "CVE-2022-50359", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50359" }, { "name": "CVE-2023-53357", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53357" }, { "name": "CVE-2025-38681", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38681" }, { "name": "CVE-2025-38593", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38593" }, { "name": "CVE-2022-50285", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50285" }, { "name": "CVE-2022-2978", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2978" }, { "name": "CVE-2025-38687", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38687" }, { "name": "CVE-2022-49980", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49980" }, { "name": "CVE-2023-53335", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53335" }, { "name": "CVE-2023-53488", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53488" }, { "name": "CVE-2023-53464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53464" }, { "name": "CVE-2025-38111", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38111" }, { "name": "CVE-2023-53334", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53334" }, { "name": "CVE-2022-43945", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43945" }, { "name": "CVE-2023-53356", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53356" }, { "name": "CVE-2025-38529", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38529" }, { "name": "CVE-2023-53510", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53510" }, { "name": "CVE-2023-53151", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53151" }, { "name": "CVE-2025-38715", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38715" }, { "name": "CVE-2025-38089", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38089" }, { "name": "CVE-2022-50352", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50352" }, { "name": "CVE-2025-38608", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38608" }, { "name": "CVE-2025-38650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38650" }, { "name": "CVE-2025-39710", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39710" }, { "name": "CVE-2023-53215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53215" }, { "name": "CVE-2022-50342", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50342" }, { "name": "CVE-2023-53288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53288" }, { "name": "CVE-2024-26584", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26584" }, { "name": "CVE-2023-53406", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53406" }, { "name": "CVE-2025-38621", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38621" }, { "name": "CVE-2023-53352", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53352" }, { "name": "CVE-2025-38160", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38160" }, { "name": "CVE-2023-1380", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1380" }, { "name": "CVE-2023-53291", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53291" }, { "name": "CVE-2022-50408", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50408" }, { "name": "CVE-2025-38528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38528" }, { "name": "CVE-2022-50399", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50399" }, { "name": "CVE-2022-50372", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50372" }, { "name": "CVE-2025-39834", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39834" }, { "name": "CVE-2022-50431", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50431" }, { "name": "CVE-2022-50357", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50357" }, { "name": "CVE-2023-53263", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53263" }, { "name": "CVE-2023-53527", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53527" }, { "name": "CVE-2022-50303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50303" }, { "name": "CVE-2025-38713", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38713" }, { "name": "CVE-2023-53404", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53404" }, { "name": "CVE-2025-38556", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38556" }, { "name": "CVE-2025-38678", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38678" }, { "name": "CVE-2023-53344", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53344" }, { "name": "CVE-2023-53324", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53324" }, { "name": "CVE-2023-53465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53465" }, { "name": "CVE-2022-50468", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50468" }, { "name": "CVE-2025-39810", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39810" }, { "name": "CVE-2025-39782", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39782" }, { "name": "CVE-2025-38075", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38075" }, { "name": "CVE-2025-37885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885" }, { "name": "CVE-2023-53368", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53368" }, { "name": "CVE-2025-38697", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38697" }, { "name": "CVE-2022-50282", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50282" }, { "name": "CVE-2025-38691", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38691" }, { "name": "CVE-2023-53276", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53276" }, { "name": "CVE-2025-39759", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39759" }, { "name": "CVE-2025-38617", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38617" }, { "name": "CVE-2025-38639", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38639" }, { "name": "CVE-2025-38628", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38628" }, { "name": "CVE-2023-53518", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53518" }, { "name": "CVE-2025-38612", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38612" }, { "name": "CVE-2022-50250", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50250" }, { "name": "CVE-2023-53466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53466" }, { "name": "CVE-2023-53168", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53168" }, { "name": "CVE-2025-39860", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39860" }, { "name": "CVE-2025-21692", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21692" }, { "name": "CVE-2022-50347", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50347" }, { "name": "CVE-2025-39754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39754" }, { "name": "CVE-2023-53506", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53506" }, { "name": "CVE-2025-38566", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38566" }, { "name": "CVE-2025-39721", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39721" }, { "name": "CVE-2023-53398", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53398" }, { "name": "CVE-2025-39760", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39760" }, { "name": "CVE-2023-53149", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53149" }, { "name": "CVE-2022-50443", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50443" }, { "name": "CVE-2025-38663", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38663" }, { "name": "CVE-2023-53409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53409" }, { "name": "CVE-2023-53396", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53396" }, { "name": "CVE-2022-50260", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50260" }, { "name": "CVE-2025-39839", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39839" }, { "name": "CVE-2023-53282", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53282" }, { "name": "CVE-2025-39848", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39848" }, { "name": "CVE-2025-38722", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38722" }, { "name": "CVE-2025-39800", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39800" }, { "name": "CVE-2023-53435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53435" }, { "name": "CVE-2022-50328", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50328" }, { "name": "CVE-2023-53391", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53391" }, { "name": "CVE-2023-53487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53487" }, { "name": "CVE-2022-50267", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50267" }, { "name": "CVE-2023-53437", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53437" }, { "name": "CVE-2022-50317", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50317" }, { "name": "CVE-2025-39703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39703" }, { "name": "CVE-2023-53250", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53250" }, { "name": "CVE-2023-53338", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53338" }, { "name": "CVE-2025-38665", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38665" }, { "name": "CVE-2022-50235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50235" }, { "name": "CVE-2025-38671", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38671" }, { "name": "CVE-2023-53231", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53231" }, { "name": "CVE-2023-53206", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53206" }, { "name": "CVE-2022-50364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50364" }, { "name": "CVE-2025-38635", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38635" }, { "name": "CVE-2022-50276", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50276" }, { "name": "CVE-2023-53432", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53432" }, { "name": "CVE-2025-38488", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38488" }, { "name": "CVE-2022-50464", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50464" }, { "name": "CVE-2023-3867", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3867" }, { "name": "CVE-2022-50401", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50401" }, { "name": "CVE-2025-38540", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38540" }, { "name": "CVE-2022-50376", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50376" }, { "name": "CVE-2025-39825", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39825" }, { "name": "CVE-2023-53422", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53422" }, { "name": "CVE-2023-53383", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53383" }, { "name": "CVE-2023-53244", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53244" }, { "name": "CVE-2022-50275", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50275" }, { "name": "CVE-2023-53373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53373" }, { "name": "CVE-2022-50287", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50287" }, { "name": "CVE-2023-53375", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53375" }, { "name": "CVE-2025-39882", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39882" }, { "name": "CVE-2025-39766", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39766" }, { "name": "CVE-2025-39801", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39801" }, { "name": "CVE-2022-50308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50308" }, { "name": "CVE-2023-53530", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53530" }, { "name": "CVE-2025-38146", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38146" }, { "name": "CVE-2023-53197", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53197" }, { "name": "CVE-2025-39724", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39724" }, { "name": "CVE-2025-38510", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38510" }, { "name": "CVE-2025-39758", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39758" }, { "name": "CVE-2025-39694", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39694" }, { "name": "CVE-2025-38418", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38418" }, { "name": "CVE-2025-40300", "url": "https://www.cve.org/CVERecord?id=CVE-2025-40300" }, { "name": "CVE-2023-53401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53401" }, { "name": "CVE-2023-53229", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53229" }, { "name": "CVE-2025-39806", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39806" }, { "name": "CVE-2022-50414", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50414" }, { "name": "CVE-2023-53521", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53521" }, { "name": "CVE-2023-53479", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53479" }, { "name": "CVE-2025-38668", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38668" }, { "name": "CVE-2025-38721", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38721" }, { "name": "CVE-2023-53313", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53313" }, { "name": "CVE-2023-53395", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53395" }, { "name": "CVE-2025-39684", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39684" }, { "name": "CVE-2022-50339", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50339" }, { "name": "CVE-2022-50436", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50436" }, { "name": "CVE-2022-50271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50271" }, { "name": "CVE-2025-38526", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38526" }, { "name": "CVE-2023-53485", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53485" }, { "name": "CVE-2025-38472", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38472" }, { "name": "CVE-2025-38506", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38506" }, { "name": "CVE-2025-38703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38703" }, { "name": "CVE-2025-39870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39870" }, { "name": "CVE-2022-50241", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50241" }, { "name": "CVE-2025-39807", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39807" }, { "name": "CVE-2022-50258", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50258" }, { "name": "CVE-2025-38604", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38604" }, { "name": "CVE-2025-38623", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38623" }, { "name": "CVE-2023-53365", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53365" }, { "name": "CVE-2025-22022", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22022" }, { "name": "CVE-2025-38544", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38544" }, { "name": "CVE-2025-39922", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39922" }, { "name": "CVE-2025-39797", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39797" }, { "name": "CVE-2025-38725", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38725" }, { "name": "CVE-2023-53184", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53184" }, { "name": "CVE-2022-50365", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50365" }, { "name": "CVE-2025-38006", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38006" }, { "name": "CVE-2022-50312", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50312" }, { "name": "CVE-2023-53196", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53196" }, { "name": "CVE-2025-38125", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38125" }, { "name": "CVE-2023-53501", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53501" }, { "name": "CVE-2025-38351", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38351" }, { "name": "CVE-2025-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38477" }, { "name": "CVE-2022-50340", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50340" }, { "name": "CVE-2023-53331", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53331" }, { "name": "CVE-2024-46733", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46733" }, { "name": "CVE-2025-38683", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38683" }, { "name": "CVE-2023-53440", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53440" }, { "name": "CVE-2025-39846", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39846" }, { "name": "CVE-2022-50374", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50374" }, { "name": "CVE-2022-50375", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50375" }, { "name": "CVE-2024-58239", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58239" }, { "name": "CVE-2022-50460", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50460" }, { "name": "CVE-2023-53307", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53307" }, { "name": "CVE-2023-53152", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53152" }, { "name": "CVE-2025-38185", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38185" }, { "name": "CVE-2025-39691", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39691" }, { "name": "CVE-2025-39850", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39850" }, { "name": "CVE-2023-53442", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53442" }, { "name": "CVE-2025-39890", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39890" }, { "name": "CVE-2025-39844", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39844" }, { "name": "CVE-2025-39742", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39742" }, { "name": "CVE-2023-53286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53286" }, { "name": "CVE-2023-53207", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53207" }, { "name": "CVE-2025-38605", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38605" }, { "name": "CVE-2022-50362", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50362" }, { "name": "CVE-2023-53205", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53205" }, { "name": "CVE-2025-38263", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38263" }, { "name": "CVE-2025-38610", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38610" }, { "name": "CVE-2025-39863", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39863" }, { "name": "CVE-2023-53180", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53180" }, { "name": "CVE-2025-38560", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38560" }, { "name": "CVE-2023-53385", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53385" }, { "name": "CVE-2023-53226", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53226" }, { "name": "CVE-2023-53525", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53525" }, { "name": "CVE-2025-38701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38701" }, { "name": "CVE-2024-58240", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58240" }, { "name": "CVE-2023-53249", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53249" }, { "name": "CVE-2023-53252", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53252" }, { "name": "CVE-2023-53261", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53261" }, { "name": "CVE-2022-50396", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50396" }, { "name": "CVE-2025-39726", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39726" }, { "name": "CVE-2023-53246", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53246" }, { "name": "CVE-2024-53168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53168" }, { "name": "CVE-2023-53364", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53364" }, { "name": "CVE-2022-50423", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50423" }, { "name": "CVE-2025-38618", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38618" }, { "name": "CVE-2022-50239", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50239" }, { "name": "CVE-2023-53532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53532" }, { "name": "CVE-2022-50348", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50348" }, { "name": "CVE-2023-53508", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53508" }, { "name": "CVE-2025-38581", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38581" }, { "name": "CVE-2023-53213", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53213" }, { "name": "CVE-2023-53526", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53526" }, { "name": "CVE-2025-39891", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39891" }, { "name": "CVE-2025-39790", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39790" }, { "name": "CVE-2023-53255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53255" }, { "name": "CVE-2023-53277", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53277" }, { "name": "CVE-2025-38680", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38680" }, { "name": "CVE-2023-53379", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53379" }, { "name": "CVE-2025-38684", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38684" }, { "name": "CVE-2025-39686", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39686" }, { "name": "CVE-2025-39798", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39798" }, { "name": "CVE-2025-38730", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38730" }, { "name": "CVE-2023-4515", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4515" }, { "name": "CVE-2025-39747", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39747" }, { "name": "CVE-2023-53343", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53343" }, { "name": "CVE-2023-53299", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53299" }, { "name": "CVE-2023-53268", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53268" }, { "name": "CVE-2025-38516", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38516" }, { "name": "CVE-2023-53204", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53204" }, { "name": "CVE-2025-39714", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39714" }, { "name": "CVE-2023-53333", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53333" }, { "name": "CVE-2022-50394", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50394" }, { "name": "CVE-2023-53456", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53456" }, { "name": "CVE-2022-50266", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50266" }, { "name": "CVE-2023-53446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53446" }, { "name": "CVE-2023-53463", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53463" }, { "name": "CVE-2023-53170", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53170" }, { "name": "CVE-2023-53260", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53260" }, { "name": "CVE-2025-39854", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39854" }, { "name": "CVE-2023-53386", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53386" }, { "name": "CVE-2025-39706", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39706" }, { "name": "CVE-2025-39830", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39830" }, { "name": "CVE-2025-38576", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38576" }, { "name": "CVE-2025-39869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39869" }, { "name": "CVE-2023-53181", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53181" }, { "name": "CVE-2023-53174", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53174" }, { "name": "CVE-2025-38439", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38439" }, { "name": "CVE-2025-39719", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39719" }, { "name": "CVE-2025-39695", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39695" }, { "name": "CVE-2023-53254", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53254" }, { "name": "CVE-2022-50430", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50430" }, { "name": "CVE-2025-38553", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38553" }, { "name": "CVE-2025-38190", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38190" }, { "name": "CVE-2025-39738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39738" }, { "name": "CVE-2023-53295", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53295" }, { "name": "CVE-2023-53298", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53298" }, { "name": "CVE-2025-38205", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38205" }, { "name": "CVE-2023-53507", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53507" }, { "name": "CVE-2023-53314", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53314" }, { "name": "CVE-2023-53281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53281" }, { "name": "CVE-2023-53330", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53330" }, { "name": "CVE-2025-39705", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39705" }, { "name": "CVE-2022-50422", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50422" }, { "name": "CVE-2022-50252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50252" }, { "name": "CVE-2025-39713", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39713" }, { "name": "CVE-2023-53316", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53316" }, { "name": "CVE-2022-50412", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50412" }, { "name": "CVE-2022-50299", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50299" }, { "name": "CVE-2023-53208", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53208" }, { "name": "CVE-2025-39744", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39744" }, { "name": "CVE-2023-53315", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53315" }, { "name": "CVE-2025-38736", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38736" }, { "name": "CVE-2023-53297", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53297" }, { "name": "CVE-2023-53499", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53499" }, { "name": "CVE-2023-53234", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53234" }, { "name": "CVE-2025-21969", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969" }, { "name": "CVE-2023-53167", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53167" }, { "name": "CVE-2023-53342", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53342" }, { "name": "CVE-2025-39678", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39678" }, { "name": "CVE-2023-53414", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53414" }, { "name": "CVE-2025-38531", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38531" }, { "name": "CVE-2023-53265", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53265" }, { "name": "CVE-2025-39693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39693" }, { "name": "CVE-2022-50246", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50246" }, { "name": "CVE-2025-38503", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38503" }, { "name": "CVE-2025-38630", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38630" }, { "name": "CVE-2023-53490", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53490" }, { "name": "CVE-2023-53302", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53302" }, { "name": "CVE-2023-53482", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53482" }, { "name": "CVE-2023-53444", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53444" }, { "name": "CVE-2023-53175", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53175" }, { "name": "CVE-2022-50392", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50392" }, { "name": "CVE-2025-38585", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38585" }, { "name": "CVE-2022-50233", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50233" }, { "name": "CVE-2023-53274", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53274" }, { "name": "CVE-2025-39682", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39682" }, { "name": "CVE-2022-50410", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50410" }, { "name": "CVE-2022-50428", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50428" }, { "name": "CVE-2023-39197", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39197" }, { "name": "CVE-2025-39833", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39833" }, { "name": "CVE-2025-39832", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39832" }, { "name": "CVE-2023-53495", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53495" }, { "name": "CVE-2023-53436", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53436" }, { "name": "CVE-2022-50402", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50402" }, { "name": "CVE-2025-38643", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38643" }, { "name": "CVE-2022-50427", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50427" }, { "name": "CVE-2022-50278", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50278" }, { "name": "CVE-2023-53273", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53273" }, { "name": "CVE-2023-53377", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53377" }, { "name": "CVE-2023-53500", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53500" }, { "name": "CVE-2025-38103", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38103" }, { "name": "CVE-2025-39847", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39847" }, { "name": "CVE-2025-38514", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38514" }, { "name": "CVE-2025-38360", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38360" }, { "name": "CVE-2025-39783", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39783" }, { "name": "CVE-2025-39835", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39835" }, { "name": "CVE-2025-38255", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38255" }, { "name": "CVE-2025-38512", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38512" }, { "name": "CVE-2025-38622", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38622" }, { "name": "CVE-2022-50279", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50279" }, { "name": "CVE-2023-53243", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53243" }, { "name": "CVE-2023-53348", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53348" }, { "name": "CVE-2023-53219", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53219" }, { "name": "CVE-2022-50467", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50467" }, { "name": "CVE-2023-53428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53428" }, { "name": "CVE-2025-39677", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39677" }, { "name": "CVE-2022-50440", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50440" }, { "name": "CVE-2025-39707", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39707" }, { "name": "CVE-2022-50248", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50248" }, { "name": "CVE-2025-39907", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39907" }, { "name": "CVE-2023-53147", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53147" }, { "name": "CVE-2023-53292", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53292" }, { "name": "CVE-2025-38640", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38640" }, { "name": "CVE-2023-53371", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53371" }, { "name": "CVE-2025-38659", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38659" }, { "name": "CVE-2022-50311", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50311" }, { "name": "CVE-2024-53125", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53125" }, { "name": "CVE-2025-38572", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38572" }, { "name": "CVE-2022-50381", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50381" }, { "name": "CVE-2023-53187", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53187" }, { "name": "CVE-2025-38550", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38550" }, { "name": "CVE-2023-53201", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53201" }, { "name": "CVE-2025-39711", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39711" }, { "name": "CVE-2022-50385", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50385" }, { "name": "CVE-2025-38535", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38535" }, { "name": "CVE-2025-39873", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39873" }, { "name": "CVE-2022-50459", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50459" }, { "name": "CVE-2023-53192", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53192" }, { "name": "CVE-2022-50277", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50277" }, { "name": "CVE-2025-38714", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38714" }, { "name": "CVE-2023-53251", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53251" }, { "name": "CVE-2024-53093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53093" }, { "name": "CVE-2023-53337", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53337" }, { "name": "CVE-2023-53380", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53380" }, { "name": "CVE-2023-53452", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53452" }, { "name": "CVE-2022-50369", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50369" }, { "name": "CVE-2023-53153", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53153" } ], "initial_release_date": "2025-10-17T00:00:00", "last_revision_date": "2025-10-17T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0895", "revisions": [ { "description": "Version initiale", "revision_date": "2025-10-17T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE", "vendor_advisories": [ { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03615-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503615-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03553-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503553-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03557-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503557-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03539-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503539-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03543-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503543-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03580-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503580-1" }, { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03613-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503613-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03600-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503600-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03602-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503602-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03561-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503561-1" }, { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03614-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503614-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03567-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503567-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03554-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503554-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03576-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503576-1" }, { "published_at": "2025-10-17", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03626-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503626-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03548-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503548-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03551-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503551-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03601-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503601-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03578-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503578-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03575-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503575-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03562-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503562-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03572-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503572-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03550-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503550-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03568-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503568-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03569-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503569-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03563-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503563-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03566-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503566-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03555-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503555-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03529-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503529-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03538-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503538-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03571-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503571-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03559-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503559-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03528-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503528-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03583-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503583-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03552-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503552-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03577-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503577-1" } ] }
fkie_cve-2023-53383
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/35727af2b15d98a2dd2811d631d3a3886111312e | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/867a4f6cf1a8f511c06e131477988b3b3e7a0633 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0 |
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4\n\nThe T241 platform suffers from the T241-FABRIC-4 erratum which causes\nunexpected behavior in the GIC when multiple transactions are received\nsimultaneously from different sources. This hardware issue impacts\nNVIDIA server platforms that use more than two T241 chips\ninterconnected. Each chip has support for 320 {E}SPIs.\n\nThis issue occurs when multiple packets from different GICs are\nincorrectly interleaved at the target chip. The erratum text below\nspecifies exactly what can cause multiple transfer packets susceptible\nto interleaving and GIC state corruption. GIC state corruption can\nlead to a range of problems, including kernel panics, and unexpected\nbehavior.\n\n\u003eFrom the erratum text:\n \"In some cases, inter-socket AXI4 Stream packets with multiple\n transfers, may be interleaved by the fabric when presented to ARM\n Generic Interrupt Controller. GIC expects all transfers of a packet\n to be delivered without any interleaving.\n\n The following GICv3 commands may result in multiple transfer packets\n over inter-socket AXI4 Stream interface:\n - Register reads from GICD_I* and GICD_N*\n - Register writes to 64-bit GICD registers other than GICD_IROUTERn*\n - ITS command MOVALL\n\n Multiple commands in GICv4+ utilize multiple transfer packets,\n including VMOVP, VMOVI, VMAPP, and 64-bit register accesses.\"\n\n This issue impacts system configurations with more than 2 sockets,\n that require multi-transfer packets to be sent over inter-socket\n AXI4 Stream interface between GIC instances on different sockets.\n GICv4 cannot be supported. GICv3 SW model can only be supported\n with the workaround. Single and Dual socket configurations are not\n impacted by this issue and support GICv3 and GICv4.\"\n\n\nWriting to the chip alias region of the GICD_In{E} registers except\nGICD_ICENABLERn has an equivalent effect as writing to the global\ndistributor. The SPI interrupt deactivate path is not impacted by\nthe erratum.\n\nTo fix this problem, implement a workaround that ensures read accesses\nto the GICD_In{E} registers are directed to the chip that owns the\nSPI, and disable GICv4.x features. To simplify code changes, the\ngic_configure_irq() function uses the same alias region for both read\nand write operations to GICD_ICFGR." } ], "id": "CVE-2023-53383", "lastModified": "2025-09-19T16:00:27.847", "metrics": {}, "published": "2025-09-18T14:15:41.310", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/35727af2b15d98a2dd2811d631d3a3886111312e" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/867a4f6cf1a8f511c06e131477988b3b3e7a0633" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
ghsa-pg59-r5p5-6cfh
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4
The T241 platform suffers from the T241-FABRIC-4 erratum which causes unexpected behavior in the GIC when multiple transactions are received simultaneously from different sources. This hardware issue impacts NVIDIA server platforms that use more than two T241 chips interconnected. Each chip has support for 320 {E}SPIs.
This issue occurs when multiple packets from different GICs are incorrectly interleaved at the target chip. The erratum text below specifies exactly what can cause multiple transfer packets susceptible to interleaving and GIC state corruption. GIC state corruption can lead to a range of problems, including kernel panics, and unexpected behavior.
From the erratum text: "In some cases, inter-socket AXI4 Stream packets with multiple transfers, may be interleaved by the fabric when presented to ARM Generic Interrupt Controller. GIC expects all transfers of a packet to be delivered without any interleaving.
The following GICv3 commands may result in multiple transfer packets over inter-socket AXI4 Stream interface: - Register reads from GICD_I and GICD_N - Register writes to 64-bit GICD registers other than GICD_IROUTERn* - ITS command MOVALL
Multiple commands in GICv4+ utilize multiple transfer packets, including VMOVP, VMOVI, VMAPP, and 64-bit register accesses."
This issue impacts system configurations with more than 2 sockets, that require multi-transfer packets to be sent over inter-socket AXI4 Stream interface between GIC instances on different sockets. GICv4 cannot be supported. GICv3 SW model can only be supported with the workaround. Single and Dual socket configurations are not impacted by this issue and support GICv3 and GICv4."
Writing to the chip alias region of the GICD_In{E} registers except GICD_ICENABLERn has an equivalent effect as writing to the global distributor. The SPI interrupt deactivate path is not impacted by the erratum.
To fix this problem, implement a workaround that ensures read accesses to the GICD_In{E} registers are directed to the chip that owns the SPI, and disable GICv4.x features. To simplify code changes, the gic_configure_irq() function uses the same alias region for both read and write operations to GICD_ICFGR.
{ "affected": [], "aliases": [ "CVE-2023-53383" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-09-18T14:15:41Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4\n\nThe T241 platform suffers from the T241-FABRIC-4 erratum which causes\nunexpected behavior in the GIC when multiple transactions are received\nsimultaneously from different sources. This hardware issue impacts\nNVIDIA server platforms that use more than two T241 chips\ninterconnected. Each chip has support for 320 {E}SPIs.\n\nThis issue occurs when multiple packets from different GICs are\nincorrectly interleaved at the target chip. The erratum text below\nspecifies exactly what can cause multiple transfer packets susceptible\nto interleaving and GIC state corruption. GIC state corruption can\nlead to a range of problems, including kernel panics, and unexpected\nbehavior.\n\n\u003eFrom the erratum text:\n \"In some cases, inter-socket AXI4 Stream packets with multiple\n transfers, may be interleaved by the fabric when presented to ARM\n Generic Interrupt Controller. GIC expects all transfers of a packet\n to be delivered without any interleaving.\n\n The following GICv3 commands may result in multiple transfer packets\n over inter-socket AXI4 Stream interface:\n - Register reads from GICD_I* and GICD_N*\n - Register writes to 64-bit GICD registers other than GICD_IROUTERn*\n - ITS command MOVALL\n\n Multiple commands in GICv4+ utilize multiple transfer packets,\n including VMOVP, VMOVI, VMAPP, and 64-bit register accesses.\"\n\n This issue impacts system configurations with more than 2 sockets,\n that require multi-transfer packets to be sent over inter-socket\n AXI4 Stream interface between GIC instances on different sockets.\n GICv4 cannot be supported. GICv3 SW model can only be supported\n with the workaround. Single and Dual socket configurations are not\n impacted by this issue and support GICv3 and GICv4.\"\n\n\nWriting to the chip alias region of the GICD_In{E} registers except\nGICD_ICENABLERn has an equivalent effect as writing to the global\ndistributor. The SPI interrupt deactivate path is not impacted by\nthe erratum.\n\nTo fix this problem, implement a workaround that ensures read accesses\nto the GICD_In{E} registers are directed to the chip that owns the\nSPI, and disable GICv4.x features. To simplify code changes, the\ngic_configure_irq() function uses the same alias region for both read\nand write operations to GICD_ICFGR.", "id": "GHSA-pg59-r5p5-6cfh", "modified": "2025-09-18T15:30:34Z", "published": "2025-09-18T15:30:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53383" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/35727af2b15d98a2dd2811d631d3a3886111312e" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/867a4f6cf1a8f511c06e131477988b3b3e7a0633" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/86ba4f7b9f949e4c4bcb425f2a1ce490fea30df0" } ], "schema_version": "1.4.0", "severity": [] }
wid-sec-w-2025-2092
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und um nicht n\u00e4here beschriebene Effekte zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-2092 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2092.json" }, { "category": "self", "summary": "WID-SEC-2025-2092 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2092" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50375", "url": "https://lore.kernel.org/linux-cve-announce/2025091848-CVE-2022-50375-2409@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50376", "url": "https://lore.kernel.org/linux-cve-announce/2025091850-CVE-2022-50376-1398@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50377", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50377-f43b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50378", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50378-4c78@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50379", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50379-a7c6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50380", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50380-25c9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50381", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50381-b83f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50382", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50382-0ff0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50383", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50383-e1c7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50384", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50384-b652@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50385", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50385-7787@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50386", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50386-07d7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50387", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50387-cd0d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50388", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50388-02a2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50389", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50389-17eb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50390", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50390-742c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50391", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50391-7caa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50392", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50392-967e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50393", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50393-d5da@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50394", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50394-fcaa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50395", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50395-344c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50396", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50396-8b1b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50397", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50397-44b6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50398", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50398-1502@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50399", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50399-6051@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50400", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2022-50400-d99e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50401", "url": "https://lore.kernel.org/linux-cve-announce/2025091850-CVE-2022-50401-814e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50402", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50402-4c96@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50403", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50403-0471@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50404", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50404-5db4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50405", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50405-8450@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50406", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50406-8797@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50407", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50407-e539@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50408", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50408-5835@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50409", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50409-d7dc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50410", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50410-edee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50411", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50411-45ab@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50412", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50412-0f2e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50413", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50413-c345@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50414", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50414-a99a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50415", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50415-9bba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50416", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50416-886a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50417", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50417-1a69@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50418", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50418-deac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50419", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50419-23b9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53369", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2023-53369-394e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53370", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53370-1085@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53371", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53371-e5f9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53372", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53372-4d9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53373", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53373-087e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53374", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53374-d003@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53375", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53375-a29f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53376", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53376-d18b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53377", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53377-baaf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53378", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53378-3d98@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53379", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53379-a33e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53380", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53380-b2e0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53381", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53381-a774@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53382", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53382-0f75@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53383", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53383-fea9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53384", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53384-042e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53385", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53385-7f7c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53386", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53386-8ab2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53387", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53387-1fb7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53388", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53388-657a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53389", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53389-26a2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53390", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53390-8eb5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53391", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53391-cea3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53392", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53392-9703@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53393", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53393-5e45@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53394", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53394-dd17@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53395", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53395-939e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53396", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53396-27d9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53397", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53397-2076@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53398", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53398-2464@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53399", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53399-316d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53400", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53400-2d47@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53401", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53401-b668@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53402", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53402-4b40@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53403", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53403-a3a3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53404", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53404-29f4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53405", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53405-885a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53406", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53406-d3e0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53407", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53407-6ad0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53408", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53408-5a18@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53409", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53409-818d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53410", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53410-4483@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53411", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53411-530b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53412", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53412-cbd2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53413", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53413-f354@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53414", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53414-e790@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53415", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53415-ea27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53416", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53416-a008@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53417", "url": "https://lore.kernel.org/linux-cve-announce/2025091803-CVE-2023-53417-caf7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53418", "url": "https://lore.kernel.org/linux-cve-announce/2025091803-CVE-2023-53418-5b61@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53419", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53419-8597@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53420", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53420-e1ce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53421", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53421-0dd9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53422", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53422-8cca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53423", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53423-a5ce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53424", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53424-d5b6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53425", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53425-6eb5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53426", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53426-9553@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53427", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53427-f56c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53428", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53428-1448@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53429", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53429-dd4c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53430", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53430-4aaa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53431", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53431-7eac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53432", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53432-bc37@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53433", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53433-fc43@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53434", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53434-243b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53435", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53435-ed57@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53436", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53436-d294@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53437", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53437-7993@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53438", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53438-50e2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53439", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53439-b538@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53440", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53440-cd1e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53441", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53441-0641@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53442", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53442-8a1f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53443", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53443-6815@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53444", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53444-41d9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53445", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53445-7b18@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53446", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53446-2fcb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53447", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53447-e0ee@gregkh/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15585-1 vom 2025-09-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUHLDYQM4UZOZRCPRIEXRRIGQ4XKRHRT/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:17760 vom 2025-10-13", "url": "https://access.redhat.com/errata/RHSA-2025:17760" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-3038 vom 2025-10-15", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3038.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-111 vom 2025-10-14", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-111.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-17760 vom 2025-10-14", "url": "https://linux.oracle.com/errata/ELSA-2025-17760.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-10-15T22:00:00.000+00:00", "generator": { "date": "2025-10-16T09:43:30.376+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-2092", "initial_release_date": "2025-09-18T22:00:00.000+00:00", "revision_history": [ { "date": "2025-09-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-09-30T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-10-12T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-10-14T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon und Oracle Linux aufgenommen" }, { "date": "2025-10-15T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T034436", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-50375", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50375" }, { "cve": "CVE-2022-50376", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50376" }, { "cve": "CVE-2022-50377", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50377" }, { "cve": "CVE-2022-50378", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50378" }, { "cve": "CVE-2022-50379", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50379" }, { "cve": "CVE-2022-50380", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50380" }, { "cve": "CVE-2022-50381", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50381" }, { "cve": "CVE-2022-50382", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50382" }, { "cve": "CVE-2022-50383", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50383" }, { "cve": "CVE-2022-50384", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50384" }, { "cve": "CVE-2022-50385", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50385" }, { "cve": "CVE-2022-50386", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50386" }, { "cve": "CVE-2022-50387", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50387" }, { "cve": "CVE-2022-50388", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50388" }, { "cve": "CVE-2022-50389", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50389" }, { "cve": "CVE-2022-50390", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50390" }, { "cve": "CVE-2022-50391", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50391" }, { "cve": "CVE-2022-50392", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50392" }, { "cve": "CVE-2022-50393", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50393" }, { "cve": "CVE-2022-50394", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50394" }, { "cve": "CVE-2022-50395", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50395" }, { "cve": "CVE-2022-50396", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50396" }, { "cve": "CVE-2022-50397", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50397" }, { "cve": "CVE-2022-50398", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50398" }, { "cve": "CVE-2022-50399", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50399" }, { "cve": "CVE-2022-50400", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50400" }, { "cve": "CVE-2022-50401", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50401" }, { "cve": "CVE-2022-50402", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50402" }, { "cve": "CVE-2022-50403", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50403" }, { "cve": "CVE-2022-50404", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50404" }, { "cve": "CVE-2022-50405", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50405" }, { "cve": "CVE-2022-50406", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50406" }, { "cve": "CVE-2022-50407", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50407" }, { "cve": "CVE-2022-50408", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50408" }, { "cve": "CVE-2022-50409", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50409" }, { "cve": "CVE-2022-50410", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50410" }, { "cve": "CVE-2022-50411", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50411" }, { "cve": "CVE-2022-50412", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50412" }, { "cve": "CVE-2022-50413", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50413" }, { "cve": "CVE-2022-50414", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50414" }, { "cve": "CVE-2022-50415", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50415" }, { "cve": "CVE-2022-50416", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50416" }, { "cve": "CVE-2022-50417", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50417" }, { "cve": "CVE-2022-50418", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50418" }, { "cve": "CVE-2022-50419", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50419" }, { "cve": "CVE-2023-53369", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53369" }, { "cve": "CVE-2023-53370", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53370" }, { "cve": "CVE-2023-53371", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53371" }, { "cve": "CVE-2023-53372", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53372" }, { "cve": "CVE-2023-53373", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53373" }, { "cve": "CVE-2023-53374", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53374" }, { "cve": "CVE-2023-53375", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53375" }, { "cve": "CVE-2023-53376", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53376" }, { "cve": "CVE-2023-53377", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53377" }, { "cve": "CVE-2023-53378", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53378" }, { "cve": "CVE-2023-53379", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53379" }, { "cve": "CVE-2023-53380", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53380" }, { "cve": "CVE-2023-53381", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53381" }, { "cve": "CVE-2023-53382", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53382" }, { "cve": "CVE-2023-53383", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53383" }, { "cve": "CVE-2023-53384", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53384" }, { "cve": "CVE-2023-53385", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53385" }, { "cve": "CVE-2023-53386", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53386" }, { "cve": "CVE-2023-53387", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53387" }, { "cve": "CVE-2023-53388", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53388" }, { "cve": "CVE-2023-53389", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53389" }, { "cve": "CVE-2023-53390", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53390" }, { "cve": "CVE-2023-53391", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53391" }, { "cve": "CVE-2023-53392", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53392" }, { "cve": "CVE-2023-53393", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53393" }, { "cve": "CVE-2023-53394", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53394" }, { "cve": "CVE-2023-53395", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53395" }, { "cve": "CVE-2023-53396", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53396" }, { "cve": "CVE-2023-53397", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53397" }, { "cve": "CVE-2023-53398", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53398" }, { "cve": "CVE-2023-53399", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53399" }, { "cve": "CVE-2023-53400", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53400" }, { "cve": "CVE-2023-53401", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53401" }, { "cve": "CVE-2023-53402", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53402" }, { "cve": "CVE-2023-53403", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53403" }, { "cve": "CVE-2023-53404", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53404" }, { "cve": "CVE-2023-53405", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53405" }, { "cve": "CVE-2023-53406", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53406" }, { "cve": "CVE-2023-53407", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53407" }, { "cve": "CVE-2023-53408", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53408" }, { "cve": "CVE-2023-53409", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53409" }, { "cve": "CVE-2023-53410", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53410" }, { "cve": "CVE-2023-53411", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53411" }, { "cve": "CVE-2023-53412", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53412" }, { "cve": "CVE-2023-53413", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53413" }, { "cve": "CVE-2023-53414", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53414" }, { "cve": "CVE-2023-53415", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53415" }, { "cve": "CVE-2023-53416", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53416" }, { "cve": "CVE-2023-53417", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53417" }, { "cve": "CVE-2023-53418", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53418" }, { "cve": "CVE-2023-53419", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53419" }, { "cve": "CVE-2023-53420", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53420" }, { "cve": "CVE-2023-53421", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53421" }, { "cve": "CVE-2023-53422", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53422" }, { "cve": "CVE-2023-53423", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53423" }, { "cve": "CVE-2023-53424", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53424" }, { "cve": "CVE-2023-53425", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53425" }, { "cve": "CVE-2023-53426", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53426" }, { "cve": "CVE-2023-53427", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53427" }, { "cve": "CVE-2023-53428", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53428" }, { "cve": "CVE-2023-53429", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53429" }, { "cve": "CVE-2023-53430", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53430" }, { "cve": "CVE-2023-53431", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53431" }, { "cve": "CVE-2023-53432", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53432" }, { "cve": "CVE-2023-53433", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53433" }, { "cve": "CVE-2023-53434", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53434" }, { "cve": "CVE-2023-53435", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53435" }, { "cve": "CVE-2023-53436", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53436" }, { "cve": "CVE-2023-53437", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53437" }, { "cve": "CVE-2023-53438", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53438" }, { "cve": "CVE-2023-53439", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53439" }, { "cve": "CVE-2023-53440", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53440" }, { "cve": "CVE-2023-53441", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53441" }, { "cve": "CVE-2023-53442", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53442" }, { "cve": "CVE-2023-53443", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53443" }, { "cve": "CVE-2023-53444", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53444" }, { "cve": "CVE-2023-53445", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53445" }, { "cve": "CVE-2023-53446", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53446" }, { "cve": "CVE-2023-53447", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53447" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.