Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53427 (GCVE-0-2023-53427)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Linux | Linux |
Version: c7398583340a6d82b8bb7f7f21edcde27dc6a898 Version: c7398583340a6d82b8bb7f7f21edcde27dc6a898 Version: c7398583340a6d82b8bb7f7f21edcde27dc6a898 Version: c7398583340a6d82b8bb7f7f21edcde27dc6a898 Version: c7398583340a6d82b8bb7f7f21edcde27dc6a898 Version: c7398583340a6d82b8bb7f7f21edcde27dc6a898 Version: c7398583340a6d82b8bb7f7f21edcde27dc6a898 |
||
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/cifs/smbdirect.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "275a3d2b9408fc4895e342f772cab9a89960546e", "status": "affected", "version": "c7398583340a6d82b8bb7f7f21edcde27dc6a898", "versionType": "git" }, { "lessThan": "3524d6da0fe88aee79f06be6572955d16ad76b39", "status": "affected", "version": "c7398583340a6d82b8bb7f7f21edcde27dc6a898", "versionType": "git" }, { "lessThan": "cfd85a0922c4696d768965e686ad805a58d9d834", "status": "affected", "version": "c7398583340a6d82b8bb7f7f21edcde27dc6a898", "versionType": "git" }, { "lessThan": "7cbd5bdb5bd4404a5da4309521134b42c65846c0", "status": "affected", "version": "c7398583340a6d82b8bb7f7f21edcde27dc6a898", "versionType": "git" }, { "lessThan": "41832c62a75dad530dc5a2856c92ae5459d497e5", "status": "affected", "version": "c7398583340a6d82b8bb7f7f21edcde27dc6a898", "versionType": "git" }, { "lessThan": "2d0c4f5f618f58eba03385363717703bee873c64", "status": "affected", "version": "c7398583340a6d82b8bb7f7f21edcde27dc6a898", "versionType": "git" }, { "lessThan": "3e161c2791f8e661eed24a2c624087084d910215", "status": "affected", "version": "c7398583340a6d82b8bb7f7f21edcde27dc6a898", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/cifs/smbdirect.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.16" }, { "lessThan": "4.16", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.276", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.235", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.173", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.99", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.16", "versionType": "semver" }, { "lessThanOrEqual": "6.2.*", "status": "unaffected", "version": "6.2.3", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.3", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.19.276", "versionStartIncluding": "4.16", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.4.235", "versionStartIncluding": "4.16", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.10.173", "versionStartIncluding": "4.16", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.99", "versionStartIncluding": "4.16", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.16", "versionStartIncluding": "4.16", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.2.3", "versionStartIncluding": "4.16", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.3", "versionStartIncluding": "4.16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix warning and UAF when destroy the MR list\n\nIf the MR allocate failed, the MR recovery work not initialized\nand list not cleared. Then will be warning and UAF when release\nthe MR:\n\n WARNING: CPU: 4 PID: 824 at kernel/workqueue.c:3066 __flush_work.isra.0+0xf7/0x110\n CPU: 4 PID: 824 Comm: mount.cifs Not tainted 6.1.0-rc5+ #82\n RIP: 0010:__flush_work.isra.0+0xf7/0x110\n Call Trace:\n \u003cTASK\u003e\n __cancel_work_timer+0x2ba/0x2e0\n smbd_destroy+0x4e1/0x990\n _smbd_get_connection+0x1cbd/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\n BUG: KASAN: use-after-free in smbd_destroy+0x4fc/0x990\n Read of size 8 at addr ffff88810b156a08 by task mount.cifs/824\n CPU: 4 PID: 824 Comm: mount.cifs Tainted: G W 6.1.0-rc5+ #82\n Call Trace:\n dump_stack_lvl+0x34/0x44\n print_report+0x171/0x472\n kasan_report+0xad/0x130\n smbd_destroy+0x4fc/0x990\n _smbd_get_connection+0x1cbd/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\n Allocated by task 824:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_kmalloc+0x7a/0x90\n _smbd_get_connection+0x1b6f/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\n Freed by task 824:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x2a/0x40\n ____kasan_slab_free+0x143/0x1b0\n __kmem_cache_free+0xc8/0x330\n _smbd_get_connection+0x1c6a/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nLet\u0027s initialize the MR recovery work before MR allocate to prevent\nthe warning, remove the MRs from the list to prevent the UAF." } ], "providerMetadata": { "dateUpdated": "2025-09-18T16:04:08.917Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/275a3d2b9408fc4895e342f772cab9a89960546e" }, { "url": "https://git.kernel.org/stable/c/3524d6da0fe88aee79f06be6572955d16ad76b39" }, { "url": "https://git.kernel.org/stable/c/cfd85a0922c4696d768965e686ad805a58d9d834" }, { "url": "https://git.kernel.org/stable/c/7cbd5bdb5bd4404a5da4309521134b42c65846c0" }, { "url": "https://git.kernel.org/stable/c/41832c62a75dad530dc5a2856c92ae5459d497e5" }, { "url": "https://git.kernel.org/stable/c/2d0c4f5f618f58eba03385363717703bee873c64" }, { "url": "https://git.kernel.org/stable/c/3e161c2791f8e661eed24a2c624087084d910215" } ], "title": "cifs: Fix warning and UAF when destroy the MR list", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2023-53427", "datePublished": "2025-09-18T16:04:08.917Z", "dateReserved": "2025-09-17T14:54:09.743Z", "dateUpdated": "2025-09-18T16:04:08.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-53427\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-18T16:15:46.610\",\"lastModified\":\"2025-09-19T16:00:27.847\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncifs: Fix warning and UAF when destroy the MR list\\n\\nIf the MR allocate failed, the MR recovery work not initialized\\nand list not cleared. Then will be warning and UAF when release\\nthe MR:\\n\\n WARNING: CPU: 4 PID: 824 at kernel/workqueue.c:3066 __flush_work.isra.0+0xf7/0x110\\n CPU: 4 PID: 824 Comm: mount.cifs Not tainted 6.1.0-rc5+ #82\\n RIP: 0010:__flush_work.isra.0+0xf7/0x110\\n Call Trace:\\n \u003cTASK\u003e\\n __cancel_work_timer+0x2ba/0x2e0\\n smbd_destroy+0x4e1/0x990\\n _smbd_get_connection+0x1cbd/0x2110\\n smbd_get_connection+0x21/0x40\\n cifs_get_tcp_session+0x8ef/0xda0\\n mount_get_conns+0x60/0x750\\n cifs_mount+0x103/0xd00\\n cifs_smb3_do_mount+0x1dd/0xcb0\\n smb3_get_tree+0x1d5/0x300\\n vfs_get_tree+0x41/0xf0\\n path_mount+0x9b3/0xdd0\\n __x64_sys_mount+0x190/0x1d0\\n do_syscall_64+0x35/0x80\\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\\n\\n BUG: KASAN: use-after-free in smbd_destroy+0x4fc/0x990\\n Read of size 8 at addr ffff88810b156a08 by task mount.cifs/824\\n CPU: 4 PID: 824 Comm: mount.cifs Tainted: G W 6.1.0-rc5+ #82\\n Call Trace:\\n dump_stack_lvl+0x34/0x44\\n print_report+0x171/0x472\\n kasan_report+0xad/0x130\\n smbd_destroy+0x4fc/0x990\\n _smbd_get_connection+0x1cbd/0x2110\\n smbd_get_connection+0x21/0x40\\n cifs_get_tcp_session+0x8ef/0xda0\\n mount_get_conns+0x60/0x750\\n cifs_mount+0x103/0xd00\\n cifs_smb3_do_mount+0x1dd/0xcb0\\n smb3_get_tree+0x1d5/0x300\\n vfs_get_tree+0x41/0xf0\\n path_mount+0x9b3/0xdd0\\n __x64_sys_mount+0x190/0x1d0\\n do_syscall_64+0x35/0x80\\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\\n\\n Allocated by task 824:\\n kasan_save_stack+0x1e/0x40\\n kasan_set_track+0x21/0x30\\n __kasan_kmalloc+0x7a/0x90\\n _smbd_get_connection+0x1b6f/0x2110\\n smbd_get_connection+0x21/0x40\\n cifs_get_tcp_session+0x8ef/0xda0\\n mount_get_conns+0x60/0x750\\n cifs_mount+0x103/0xd00\\n cifs_smb3_do_mount+0x1dd/0xcb0\\n smb3_get_tree+0x1d5/0x300\\n vfs_get_tree+0x41/0xf0\\n path_mount+0x9b3/0xdd0\\n __x64_sys_mount+0x190/0x1d0\\n do_syscall_64+0x35/0x80\\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\\n\\n Freed by task 824:\\n kasan_save_stack+0x1e/0x40\\n kasan_set_track+0x21/0x30\\n kasan_save_free_info+0x2a/0x40\\n ____kasan_slab_free+0x143/0x1b0\\n __kmem_cache_free+0xc8/0x330\\n _smbd_get_connection+0x1c6a/0x2110\\n smbd_get_connection+0x21/0x40\\n cifs_get_tcp_session+0x8ef/0xda0\\n mount_get_conns+0x60/0x750\\n cifs_mount+0x103/0xd00\\n cifs_smb3_do_mount+0x1dd/0xcb0\\n smb3_get_tree+0x1d5/0x300\\n vfs_get_tree+0x41/0xf0\\n path_mount+0x9b3/0xdd0\\n __x64_sys_mount+0x190/0x1d0\\n do_syscall_64+0x35/0x80\\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\\n\\nLet\u0027s initialize the MR recovery work before MR allocate to prevent\\nthe warning, remove the MRs from the list to prevent the UAF.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/275a3d2b9408fc4895e342f772cab9a89960546e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2d0c4f5f618f58eba03385363717703bee873c64\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3524d6da0fe88aee79f06be6572955d16ad76b39\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3e161c2791f8e661eed24a2c624087084d910215\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/41832c62a75dad530dc5a2856c92ae5459d497e5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7cbd5bdb5bd4404a5da4309521134b42c65846c0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cfd85a0922c4696d768965e686ad805a58d9d834\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
ghsa-v584-qp6m-f4mf
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix warning and UAF when destroy the MR list
If the MR allocate failed, the MR recovery work not initialized and list not cleared. Then will be warning and UAF when release the MR:
WARNING: CPU: 4 PID: 824 at kernel/workqueue.c:3066 __flush_work.isra.0+0xf7/0x110 CPU: 4 PID: 824 Comm: mount.cifs Not tainted 6.1.0-rc5+ #82 RIP: 0010:__flush_work.isra.0+0xf7/0x110 Call Trace: __cancel_work_timer+0x2ba/0x2e0 smbd_destroy+0x4e1/0x990 _smbd_get_connection+0x1cbd/0x2110 smbd_get_connection+0x21/0x40 cifs_get_tcp_session+0x8ef/0xda0 mount_get_conns+0x60/0x750 cifs_mount+0x103/0xd00 cifs_smb3_do_mount+0x1dd/0xcb0 smb3_get_tree+0x1d5/0x300 vfs_get_tree+0x41/0xf0 path_mount+0x9b3/0xdd0 __x64_sys_mount+0x190/0x1d0 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0
BUG: KASAN: use-after-free in smbd_destroy+0x4fc/0x990 Read of size 8 at addr ffff88810b156a08 by task mount.cifs/824 CPU: 4 PID: 824 Comm: mount.cifs Tainted: G W 6.1.0-rc5+ #82 Call Trace: dump_stack_lvl+0x34/0x44 print_report+0x171/0x472 kasan_report+0xad/0x130 smbd_destroy+0x4fc/0x990 _smbd_get_connection+0x1cbd/0x2110 smbd_get_connection+0x21/0x40 cifs_get_tcp_session+0x8ef/0xda0 mount_get_conns+0x60/0x750 cifs_mount+0x103/0xd00 cifs_smb3_do_mount+0x1dd/0xcb0 smb3_get_tree+0x1d5/0x300 vfs_get_tree+0x41/0xf0 path_mount+0x9b3/0xdd0 __x64_sys_mount+0x190/0x1d0 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0
Allocated by task 824: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 __kasan_kmalloc+0x7a/0x90 _smbd_get_connection+0x1b6f/0x2110 smbd_get_connection+0x21/0x40 cifs_get_tcp_session+0x8ef/0xda0 mount_get_conns+0x60/0x750 cifs_mount+0x103/0xd00 cifs_smb3_do_mount+0x1dd/0xcb0 smb3_get_tree+0x1d5/0x300 vfs_get_tree+0x41/0xf0 path_mount+0x9b3/0xdd0 __x64_sys_mount+0x190/0x1d0 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0
Freed by task 824: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 kasan_save_free_info+0x2a/0x40 _kasanslab_free+0x143/0x1b0 kmem_cache_free+0xc8/0x330 _smbd_get_connection+0x1c6a/0x2110 smbd_get_connection+0x21/0x40 cifs_get_tcp_session+0x8ef/0xda0 mount_get_conns+0x60/0x750 cifs_mount+0x103/0xd00 cifs_smb3_do_mount+0x1dd/0xcb0 smb3_get_tree+0x1d5/0x300 vfs_get_tree+0x41/0xf0 path_mount+0x9b3/0xdd0 __x64_sys_mount+0x190/0x1d0 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0
Let's initialize the MR recovery work before MR allocate to prevent the warning, remove the MRs from the list to prevent the UAF.
{ "affected": [], "aliases": [ "CVE-2023-53427" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-09-18T16:15:46Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix warning and UAF when destroy the MR list\n\nIf the MR allocate failed, the MR recovery work not initialized\nand list not cleared. Then will be warning and UAF when release\nthe MR:\n\n WARNING: CPU: 4 PID: 824 at kernel/workqueue.c:3066 __flush_work.isra.0+0xf7/0x110\n CPU: 4 PID: 824 Comm: mount.cifs Not tainted 6.1.0-rc5+ #82\n RIP: 0010:__flush_work.isra.0+0xf7/0x110\n Call Trace:\n \u003cTASK\u003e\n __cancel_work_timer+0x2ba/0x2e0\n smbd_destroy+0x4e1/0x990\n _smbd_get_connection+0x1cbd/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\n BUG: KASAN: use-after-free in smbd_destroy+0x4fc/0x990\n Read of size 8 at addr ffff88810b156a08 by task mount.cifs/824\n CPU: 4 PID: 824 Comm: mount.cifs Tainted: G W 6.1.0-rc5+ #82\n Call Trace:\n dump_stack_lvl+0x34/0x44\n print_report+0x171/0x472\n kasan_report+0xad/0x130\n smbd_destroy+0x4fc/0x990\n _smbd_get_connection+0x1cbd/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\n Allocated by task 824:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_kmalloc+0x7a/0x90\n _smbd_get_connection+0x1b6f/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\n Freed by task 824:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x2a/0x40\n ____kasan_slab_free+0x143/0x1b0\n __kmem_cache_free+0xc8/0x330\n _smbd_get_connection+0x1c6a/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nLet\u0027s initialize the MR recovery work before MR allocate to prevent\nthe warning, remove the MRs from the list to prevent the UAF.", "id": "GHSA-v584-qp6m-f4mf", "modified": "2025-09-18T18:30:28Z", "published": "2025-09-18T18:30:28Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53427" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/275a3d2b9408fc4895e342f772cab9a89960546e" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/2d0c4f5f618f58eba03385363717703bee873c64" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/3524d6da0fe88aee79f06be6572955d16ad76b39" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/3e161c2791f8e661eed24a2c624087084d910215" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/41832c62a75dad530dc5a2856c92ae5459d497e5" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/7cbd5bdb5bd4404a5da4309521134b42c65846c0" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/cfd85a0922c4696d768965e686ad805a58d9d834" } ], "schema_version": "1.4.0", "severity": [] }
CERTFR-2025-AVI-0895
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
SUSE | Confidential Computing Module | Confidential Computing Module 15-SP6 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
SUSE | Basesystem Module | Basesystem Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP7 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
SUSE | Legacy Module | Legacy Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
SUSE | SUSE Enterprise Storage | SUSE Enterprise Storage 7.1 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
SUSE | Development Tools Module | Development Tools Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
SUSE | Basesystem Module | Basesystem Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP6 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
SUSE | Legacy Module | Legacy Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 | ||
SUSE | Development Tools Module | Development Tools Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SUSE Linux Enterprise High Performance Computing 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Confidential Computing Module 15-SP6", "product": { "name": "Confidential Computing Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP5", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP7", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.2", "product": { "name": "SUSE Manager Retail Branch Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 12 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP4", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.2", "product": { "name": "SUSE Manager Proxy", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 12-SP5", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP6", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP7", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP6", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP7", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.2", "product": { "name": "SUSE Manager Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP6", "product": { "name": "Legacy Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP5", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP6", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP6", "product": { "name": "Development Tools Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP7", "product": { "name": "SUSE Linux Enterprise Workstation Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP4", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP3", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.2", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP7", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP7", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP6", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP3", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP6", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP7", "product": { "name": "Legacy Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP7", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP6", "product": { "name": "SUSE Linux Enterprise Workstation Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP7", "product": { "name": "Development Tools Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP6", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP4", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-53443", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53443" }, { "name": "CVE-2023-53453", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53453" }, { "name": "CVE-2022-50378", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50378" }, { "name": "CVE-2025-38380", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38380" }, { "name": "CVE-2022-50291", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50291" }, { "name": "CVE-2023-53247", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53247" }, { "name": "CVE-2022-50433", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50433" }, { "name": "CVE-2022-50356", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50356" }, { "name": "CVE-2023-53473", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53473" }, { "name": "CVE-2022-49138", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49138" }, { "name": "CVE-2022-50425", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50425" }, { "name": "CVE-2025-38201", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38201" }, { "name": "CVE-2022-50367", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50367" }, { "name": "CVE-2025-39808", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39808" }, { "name": "CVE-2023-53347", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53347" }, { "name": "CVE-2023-53475", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53475" }, { "name": "CVE-2025-38520", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38520" }, { "name": "CVE-2023-53312", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53312" }, { "name": "CVE-2025-38588", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38588" }, { "name": "CVE-2023-53311", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53311" }, { "name": "CVE-2025-38574", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38574" }, { "name": "CVE-2022-50398", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50398" }, { "name": "CVE-2023-53393", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53393" }, { "name": "CVE-2023-53480", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53480" }, { "name": "CVE-2023-53303", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53303" }, { "name": "CVE-2023-28328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28328" }, { "name": "CVE-2025-39757", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39757" }, { "name": "CVE-2022-50469", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50469" }, { "name": "CVE-2022-50429", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50429" }, { "name": "CVE-2023-53193", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53193" }, { "name": "CVE-2023-53150", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53150" }, { "name": "CVE-2023-53321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53321" }, { "name": "CVE-2025-39772", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39772" }, { "name": "CVE-2023-53317", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53317" }, { "name": "CVE-2023-53176", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53176" }, { "name": "CVE-2023-53362", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53362" }, { "name": "CVE-2022-50298", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50298" }, { "name": "CVE-2025-38601", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38601" }, { "name": "CVE-2025-39826", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39826" }, { "name": "CVE-2022-50288", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50288" }, { "name": "CVE-2025-38515", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38515" }, { "name": "CVE-2025-38645", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38645" }, { "name": "CVE-2023-5633", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5633" }, { "name": "CVE-2025-38444", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38444" }, { "name": "CVE-2023-53349", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53349" }, { "name": "CVE-2025-39685", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39685" }, { "name": "CVE-2025-38660", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38660" }, { "name": "CVE-2025-39761", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39761" }, { "name": "CVE-2023-53405", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53405" }, { "name": "CVE-2023-53185", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53185" }, { "name": "CVE-2023-53320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53320" }, { "name": "CVE-2023-53359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53359" }, { "name": "CVE-2022-50466", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50466" }, { "name": "CVE-2023-53509", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53509" }, { "name": "CVE-2023-53421", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53421" }, { "name": "CVE-2023-53441", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53441" }, { "name": "CVE-2023-53199", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53199" }, { "name": "CVE-2025-39764", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39764" }, { "name": "CVE-2023-53245", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53245" }, { "name": "CVE-2023-53415", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53415" }, { "name": "CVE-2025-38624", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38624" }, { "name": "CVE-2024-53194", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53194" }, { "name": "CVE-2025-39827", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39827" }, { "name": "CVE-2022-50255", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50255" }, { "name": "CVE-2025-39746", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39746" }, { "name": "CVE-2023-53461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53461" }, { "name": "CVE-2025-38208", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38208" }, { "name": "CVE-2023-53531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53531" }, { "name": "CVE-2025-39889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39889" }, { "name": "CVE-2025-38524", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38524" }, { "name": "CVE-2025-38466", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38466" }, { "name": "CVE-2023-53258", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53258" }, { "name": "CVE-2023-53429", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53429" }, { "name": "CVE-2023-53449", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53449" }, { "name": "CVE-2025-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38595" }, { "name": "CVE-2023-53451", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53451" }, { "name": "CVE-2023-53325", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53325" }, { "name": "CVE-2022-50368", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50368" }, { "name": "CVE-2023-53511", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53511" }, { "name": "CVE-2025-38216", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38216" }, { "name": "CVE-2022-50349", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50349" }, { "name": "CVE-2023-53394", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53394" }, { "name": "CVE-2023-53494", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53494" }, { "name": "CVE-2025-39925", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39925" }, { "name": "CVE-2025-39811", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39811" }, { "name": "CVE-2022-50358", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50358" }, { "name": "CVE-2025-38646", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38646" }, { "name": "CVE-2025-38491", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38491" }, { "name": "CVE-2025-38408", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38408" }, { "name": "CVE-2022-50386", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50386" }, { "name": "CVE-2025-38644", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38644" }, { "name": "CVE-2025-38692", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38692" }, { "name": "CVE-2022-50244", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50244" }, { "name": "CVE-2025-38563", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38563" }, { "name": "CVE-2023-53209", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53209" }, { "name": "CVE-2025-39701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39701" }, { "name": "CVE-2023-53222", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53222" }, { "name": "CVE-2023-53264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53264" }, { "name": "CVE-2022-50323", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50323" }, { "name": "CVE-2025-38591", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38591" }, { "name": "CVE-2022-50441", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50441" }, { "name": "CVE-2025-38609", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38609" }, { "name": "CVE-2023-53519", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53519" }, { "name": "CVE-2022-50294", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50294" }, { "name": "CVE-2023-53447", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53447" }, { "name": "CVE-2023-53472", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53472" }, { "name": "CVE-2022-50242", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50242" }, { "name": "CVE-2023-53248", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53248" }, { "name": "CVE-2025-22023", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22023" }, { "name": "CVE-2025-38500", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38500" }, { "name": "CVE-2025-39709", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39709" }, { "name": "CVE-2023-53217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53217" }, { "name": "CVE-2023-53390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53390" }, { "name": "CVE-2023-53491", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53491" }, { "name": "CVE-2025-39787", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39787" }, { "name": "CVE-2025-39920", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39920" }, { "name": "CVE-2022-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50379" }, { "name": "CVE-2022-50257", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50257" }, { "name": "CVE-2023-53354", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53354" }, { "name": "CVE-2023-53504", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53504" }, { "name": "CVE-2025-38734", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38734" }, { "name": "CVE-2025-38571", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38571" }, { "name": "CVE-2022-50301", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50301" }, { "name": "CVE-2022-50432", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50432" }, { "name": "CVE-2023-53340", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53340" }, { "name": "CVE-2025-38695", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38695" }, { "name": "CVE-2023-52923", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52923" }, { "name": "CVE-2023-53323", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53323" }, { "name": "CVE-2025-39749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39749" }, { "name": "CVE-2022-50304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50304" }, { "name": "CVE-2024-26661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26661" }, { "name": "CVE-2023-53189", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53189" }, { "name": "CVE-2023-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53427" }, { "name": "CVE-2023-53498", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53498" }, { "name": "CVE-2023-4130", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4130" }, { "name": "CVE-2023-53242", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53242" }, { "name": "CVE-2022-50395", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50395" }, { "name": "CVE-2023-53309", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53309" }, { "name": "CVE-2025-39923", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39923" }, { "name": "CVE-2025-38445", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38445" }, { "name": "CVE-2025-38456", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38456" }, { "name": "CVE-2025-38538", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38538" }, { "name": "CVE-2022-50456", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50456" }, { "name": "CVE-2025-39751", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39751" }, { "name": "CVE-2024-58238", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58238" }, { "name": "CVE-2023-53425", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53425" }, { "name": "CVE-2022-50458", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50458" }, { "name": "CVE-2022-50321", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50321" }, { "name": "CVE-2023-53235", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53235" }, { "name": "CVE-2025-38565", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38565" }, { "name": "CVE-2022-50439", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50439" }, { "name": "CVE-2025-38710", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38710" }, { "name": "CVE-2023-53304", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53304" }, { "name": "CVE-2025-39681", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39681" }, { "name": "CVE-2023-53216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53216" }, { "name": "CVE-2025-39770", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39770" }, { "name": "CVE-2023-53339", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53339" }, { "name": "CVE-2023-53239", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53239" }, { "name": "CVE-2023-53280", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53280" }, { "name": "CVE-2025-38705", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38705" }, { "name": "CVE-2023-53179", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53179" }, { "name": "CVE-2022-50434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50434" }, { "name": "CVE-2025-38706", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38706" }, { "name": "CVE-2022-50234", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50234" }, { "name": "CVE-2025-39750", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39750" }, { "name": "CVE-2025-38587", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38587" }, { "name": "CVE-2023-53520", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53520" }, { "name": "CVE-2022-50353", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50353" }, { "name": "CVE-2023-53493", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53493" }, { "name": "CVE-2022-49975", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49975" }, { "name": "CVE-2022-50404", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50404" }, { "name": "CVE-2023-53492", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53492" }, { "name": "CVE-2023-31248", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31248" }, { "name": "CVE-2022-50360", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50360" }, { "name": "CVE-2023-53388", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53388" }, { "name": "CVE-2025-39853", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39853" }, { "name": "CVE-2025-38555", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38555" }, { "name": "CVE-2023-53221", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53221" }, { "name": "CVE-2022-50264", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50264" }, { "name": "CVE-2025-39871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39871" }, { "name": "CVE-2025-39857", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39857" }, { "name": "CVE-2022-50452", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50452" }, { "name": "CVE-2022-50320", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50320" }, { "name": "CVE-2025-38590", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38590" }, { "name": "CVE-2025-38709", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38709" }, { "name": "CVE-2022-50286", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50286" }, { "name": "CVE-2022-50449", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50449" }, { "name": "CVE-2023-53431", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53431" }, { "name": "CVE-2022-50324", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50324" }, { "name": "CVE-2024-58090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58090" }, { "name": "CVE-2023-53462", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53462" }, { "name": "CVE-2025-39865", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39865" }, { "name": "CVE-2025-39816", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39816" }, { "name": "CVE-2025-38584", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38584" }, { "name": "CVE-2025-39675", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39675" }, { "name": "CVE-2025-39679", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39679" }, { "name": "CVE-2025-38527", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38527" }, { "name": "CVE-2025-37958", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37958" }, { "name": "CVE-2022-50447", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50447" }, { "name": "CVE-2022-50251", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50251" }, { "name": "CVE-2025-39763", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39763" }, { "name": "CVE-2023-53148", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53148" }, { "name": "CVE-2025-38693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38693" }, { "name": "CVE-2025-38679", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38679" }, { "name": "CVE-2025-38459", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38459" }, { "name": "CVE-2022-50373", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50373" }, { "name": "CVE-2023-53505", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53505" }, { "name": "CVE-2025-38685", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38685" }, { "name": "CVE-2022-50269", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50269" }, { "name": "CVE-2023-53275", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53275" }, { "name": "CVE-2022-50437", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50437" }, { "name": "CVE-2022-50391", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50391" }, { "name": "CVE-2023-53476", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53476" }, { "name": "CVE-2025-38184", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38184" }, { "name": "CVE-2023-53468", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53468" }, { "name": "CVE-2022-50261", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50261" }, { "name": "CVE-2022-50351", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50351" }, { "name": "CVE-2022-50272", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50272" }, { "name": "CVE-2022-50331", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50331" }, { "name": "CVE-2025-39838", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39838" }, { "name": "CVE-2025-39823", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39823" }, { "name": "CVE-2025-38234", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38234" }, { "name": "CVE-2024-50154", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50154" }, { "name": "CVE-2025-38634", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38634" }, { "name": "CVE-2023-53183", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53183" }, { "name": "CVE-2023-53195", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53195" }, { "name": "CVE-2023-53232", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53232" }, { "name": "CVE-2025-39864", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39864" }, { "name": "CVE-2025-38458", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38458" }, { "name": "CVE-2025-39730", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39730" }, { "name": "CVE-2025-38011", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38011" }, { "name": "CVE-2022-50268", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50268" }, { "name": "CVE-2022-36280", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36280" }, { "name": "CVE-2023-53319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53319" }, { "name": "CVE-2022-50444", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50444" }, { "name": "CVE-2025-39824", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39824" }, { "name": "CVE-2023-53515", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53515" }, { "name": "CVE-2023-53420", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53420" }, { "name": "CVE-2023-53424", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53424" }, { "name": "CVE-2025-38464", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38464" }, { "name": "CVE-2023-53241", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53241" }, { "name": "CVE-2023-53305", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53305" }, { "name": "CVE-2023-42753", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42753" }, { "name": "CVE-2025-38702", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38702" }, { "name": "CVE-2023-53177", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53177" }, { "name": "CVE-2023-53381", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53381" }, { "name": "CVE-2023-53369", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53369" }, { "name": "CVE-2025-38724", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38724" }, { "name": "CVE-2022-50419", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50419" }, { "name": "CVE-2025-38582", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38582" }, { "name": "CVE-2023-53332", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53332" }, { "name": "CVE-2025-38543", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38543" }, { "name": "CVE-2025-38698", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38698" }, { "name": "CVE-2023-53328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53328" }, { "name": "CVE-2022-50289", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50289" }, { "name": "CVE-2022-50329", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50329" }, { "name": "CVE-2025-39842", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39842" }, { "name": "CVE-2025-39739", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39739" }, { "name": "CVE-2023-53165", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53165" }, { "name": "CVE-2023-53270", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53270" }, { "name": "CVE-2025-38419", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38419" }, { "name": "CVE-2025-38533", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38533" }, { "name": "CVE-2023-53284", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53284" }, { "name": "CVE-2022-50265", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50265" }, { "name": "CVE-2025-38537", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38537" }, { "name": "CVE-2025-39849", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39849" }, { "name": "CVE-2025-38546", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38546" }, { "name": "CVE-2022-50409", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50409" }, { "name": "CVE-2022-50453", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50453" }, { "name": "CVE-2023-53512", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53512" }, { "name": "CVE-2022-50418", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50418" }, { "name": "CVE-2023-53438", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53438" }, { "name": "CVE-2023-53238", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53238" }, { "name": "CVE-2025-21791", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791" }, { "name": "CVE-2025-39861", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39861" }, { "name": "CVE-2022-50253", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50253" }, { "name": "CVE-2022-50405", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50405" }, { "name": "CVE-2025-38251", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38251" }, { "name": "CVE-2023-53378", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53378" }, { "name": "CVE-2025-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38597" }, { "name": "CVE-2025-39743", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39743" }, { "name": "CVE-2025-39718", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39718" }, { "name": "CVE-2022-50333", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50333" }, { "name": "CVE-2025-38712", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38712" }, { "name": "CVE-2025-38732", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38732" }, { "name": "CVE-2025-39773", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39773" }, { "name": "CVE-2023-53360", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53360" }, { "name": "CVE-2025-39885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39885" }, { "name": "CVE-2023-53336", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53336" }, { "name": "CVE-2023-53426", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53426" }, { "name": "CVE-2023-53370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53370" }, { "name": "CVE-2022-50330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50330" }, { "name": "CVE-2023-53223", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53223" }, { "name": "CVE-2022-2602", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2602" }, { "name": "CVE-2025-38632", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38632" }, { "name": "CVE-2022-50309", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50309" }, { "name": "CVE-2025-38548", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38548" }, { "name": "CVE-2023-53448", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53448" }, { "name": "CVE-2023-53308", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53308" }, { "name": "CVE-2023-53374", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53374" }, { "name": "CVE-2023-53384", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53384" }, { "name": "CVE-2025-38014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38014" }, { "name": "CVE-2022-50297", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50297" }, { "name": "CVE-2025-38727", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38727" }, { "name": "CVE-2025-38465", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38465" }, { "name": "CVE-2022-50435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50435" }, { "name": "CVE-2025-38513", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38513" }, { "name": "CVE-2022-50411", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50411" }, { "name": "CVE-2022-50465", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50465" }, { "name": "CVE-2022-50346", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50346" }, { "name": "CVE-2025-38670", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38670" }, { "name": "CVE-2025-39732", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39732" }, { "name": "CVE-2023-53458", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53458" }, { "name": "CVE-2022-50393", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50393" }, { "name": "CVE-2023-53367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53367" }, { "name": "CVE-2025-38602", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38602" }, { "name": "CVE-2022-50417", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50417" }, { "name": "CVE-2023-53326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53326" }, { "name": "CVE-2025-38441", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38441" }, { "name": "CVE-2023-53457", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53457" }, { "name": "CVE-2025-39845", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39845" }, { "name": "CVE-2023-53230", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53230" }, { "name": "CVE-2023-53397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53397" }, { "name": "CVE-2023-53171", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53171" }, { "name": "CVE-2025-38568", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38568" }, { "name": "CVE-2023-53489", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53489" }, { "name": "CVE-2022-50370", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50370" }, { "name": "CVE-2025-38583", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38583" }, { "name": "CVE-2023-53516", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53516" }, { "name": "CVE-2023-53474", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53474" }, { "name": "CVE-2025-38499", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38499" }, { "name": "CVE-2025-38735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38735" }, { "name": "CVE-2022-50247", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50247" }, { "name": "CVE-2025-38402", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38402" }, { "name": "CVE-2022-50325", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50325" }, { "name": "CVE-2022-50355", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50355" }, { "name": "CVE-2023-53400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53400" }, { "name": "CVE-2022-50292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50292" }, { "name": "CVE-2023-53287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53287" }, { "name": "CVE-2025-38616", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38616" }, { "name": "CVE-2025-37738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738" }, { "name": "CVE-2022-50406", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50406" }, { "name": "CVE-2025-38119", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38119" }, { "name": "CVE-2025-38245", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38245" }, { "name": "CVE-2025-38656", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38656" }, { "name": "CVE-2022-50454", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50454" }, { "name": "CVE-2023-53350", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53350" }, { "name": "CVE-2025-38614", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38614" }, { "name": "CVE-2022-50354", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50354" }, { "name": "CVE-2022-50249", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50249" }, { "name": "CVE-2023-53237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53237" }, { "name": "CVE-2025-38664", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38664" }, { "name": "CVE-2023-53454", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53454" }, { "name": "CVE-2023-53471", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53471" }, { "name": "CVE-2023-53182", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53182" }, { "name": "CVE-2025-38541", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38541" }, { "name": "CVE-2023-53416", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53416" }, { "name": "CVE-2022-50344", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50344" }, { "name": "CVE-2023-53322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53322" }, { "name": "CVE-2023-53220", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53220" }, { "name": "CVE-2023-53272", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53272" }, { "name": "CVE-2022-50388", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50388" }, { "name": "CVE-2023-53178", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53178" }, { "name": "CVE-2023-53210", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53210" }, { "name": "CVE-2025-38694", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38694" }, { "name": "CVE-2021-4460", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4460" }, { "name": "CVE-2023-3772", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3772" }, { "name": "CVE-2023-53259", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53259" }, { "name": "CVE-2025-38676", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38676" }, { "name": "CVE-2025-38530", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38530" }, { "name": "CVE-2024-26583", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26583" }, { "name": "CVE-2022-50318", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50318" }, { "name": "CVE-2023-53413", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53413" }, { "name": "CVE-2022-50389", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50389" }, { "name": "CVE-2023-53528", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53528" }, { "name": "CVE-2023-53524", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53524" }, { "name": "CVE-2023-53496", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53496" }, { "name": "CVE-2025-38729", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38729" }, { "name": "CVE-2023-53257", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53257" }, { "name": "CVE-2022-50390", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50390" }, { "name": "CVE-2023-53523", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53523" }, { "name": "CVE-2022-50359", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50359" }, { "name": "CVE-2023-53357", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53357" }, { "name": "CVE-2025-38681", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38681" }, { "name": "CVE-2025-38593", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38593" }, { "name": "CVE-2022-50285", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50285" }, { "name": "CVE-2022-2978", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2978" }, { "name": "CVE-2025-38687", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38687" }, { "name": "CVE-2022-49980", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49980" }, { "name": "CVE-2023-53335", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53335" }, { "name": "CVE-2023-53488", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53488" }, { "name": "CVE-2023-53464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53464" }, { "name": "CVE-2025-38111", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38111" }, { "name": "CVE-2023-53334", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53334" }, { "name": "CVE-2022-43945", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43945" }, { "name": "CVE-2023-53356", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53356" }, { "name": "CVE-2025-38529", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38529" }, { "name": "CVE-2023-53510", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53510" }, { "name": "CVE-2023-53151", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53151" }, { "name": "CVE-2025-38715", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38715" }, { "name": "CVE-2025-38089", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38089" }, { "name": "CVE-2022-50352", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50352" }, { "name": "CVE-2025-38608", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38608" }, { "name": "CVE-2025-38650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38650" }, { "name": "CVE-2025-39710", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39710" }, { "name": "CVE-2023-53215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53215" }, { "name": "CVE-2022-50342", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50342" }, { "name": "CVE-2023-53288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53288" }, { "name": "CVE-2024-26584", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26584" }, { "name": "CVE-2023-53406", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53406" }, { "name": "CVE-2025-38621", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38621" }, { "name": "CVE-2023-53352", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53352" }, { "name": "CVE-2025-38160", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38160" }, { "name": "CVE-2023-1380", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1380" }, { "name": "CVE-2023-53291", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53291" }, { "name": "CVE-2022-50408", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50408" }, { "name": "CVE-2025-38528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38528" }, { "name": "CVE-2022-50399", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50399" }, { "name": "CVE-2022-50372", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50372" }, { "name": "CVE-2025-39834", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39834" }, { "name": "CVE-2022-50431", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50431" }, { "name": "CVE-2022-50357", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50357" }, { "name": "CVE-2023-53263", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53263" }, { "name": "CVE-2023-53527", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53527" }, { "name": "CVE-2022-50303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50303" }, { "name": "CVE-2025-38713", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38713" }, { "name": "CVE-2023-53404", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53404" }, { "name": "CVE-2025-38556", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38556" }, { "name": "CVE-2025-38678", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38678" }, { "name": "CVE-2023-53344", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53344" }, { "name": "CVE-2023-53324", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53324" }, { "name": "CVE-2023-53465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53465" }, { "name": "CVE-2022-50468", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50468" }, { "name": "CVE-2025-39810", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39810" }, { "name": "CVE-2025-39782", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39782" }, { "name": "CVE-2025-38075", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38075" }, { "name": "CVE-2025-37885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885" }, { "name": "CVE-2023-53368", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53368" }, { "name": "CVE-2025-38697", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38697" }, { "name": "CVE-2022-50282", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50282" }, { "name": "CVE-2025-38691", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38691" }, { "name": "CVE-2023-53276", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53276" }, { "name": "CVE-2025-39759", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39759" }, { "name": "CVE-2025-38617", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38617" }, { "name": "CVE-2025-38639", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38639" }, { "name": "CVE-2025-38628", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38628" }, { "name": "CVE-2023-53518", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53518" }, { "name": "CVE-2025-38612", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38612" }, { "name": "CVE-2022-50250", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50250" }, { "name": "CVE-2023-53466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53466" }, { "name": "CVE-2023-53168", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53168" }, { "name": "CVE-2025-39860", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39860" }, { "name": "CVE-2025-21692", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21692" }, { "name": "CVE-2022-50347", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50347" }, { "name": "CVE-2025-39754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39754" }, { "name": "CVE-2023-53506", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53506" }, { "name": "CVE-2025-38566", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38566" }, { "name": "CVE-2025-39721", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39721" }, { "name": "CVE-2023-53398", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53398" }, { "name": "CVE-2025-39760", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39760" }, { "name": "CVE-2023-53149", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53149" }, { "name": "CVE-2022-50443", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50443" }, { "name": "CVE-2025-38663", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38663" }, { "name": "CVE-2023-53409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53409" }, { "name": "CVE-2023-53396", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53396" }, { "name": "CVE-2022-50260", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50260" }, { "name": "CVE-2025-39839", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39839" }, { "name": "CVE-2023-53282", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53282" }, { "name": "CVE-2025-39848", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39848" }, { "name": "CVE-2025-38722", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38722" }, { "name": "CVE-2025-39800", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39800" }, { "name": "CVE-2023-53435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53435" }, { "name": "CVE-2022-50328", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50328" }, { "name": "CVE-2023-53391", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53391" }, { "name": "CVE-2023-53487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53487" }, { "name": "CVE-2022-50267", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50267" }, { "name": "CVE-2023-53437", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53437" }, { "name": "CVE-2022-50317", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50317" }, { "name": "CVE-2025-39703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39703" }, { "name": "CVE-2023-53250", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53250" }, { "name": "CVE-2023-53338", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53338" }, { "name": "CVE-2025-38665", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38665" }, { "name": "CVE-2022-50235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50235" }, { "name": "CVE-2025-38671", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38671" }, { "name": "CVE-2023-53231", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53231" }, { "name": "CVE-2023-53206", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53206" }, { "name": "CVE-2022-50364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50364" }, { "name": "CVE-2025-38635", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38635" }, { "name": "CVE-2022-50276", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50276" }, { "name": "CVE-2023-53432", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53432" }, { "name": "CVE-2025-38488", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38488" }, { "name": "CVE-2022-50464", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50464" }, { "name": "CVE-2023-3867", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3867" }, { "name": "CVE-2022-50401", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50401" }, { "name": "CVE-2025-38540", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38540" }, { "name": "CVE-2022-50376", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50376" }, { "name": "CVE-2025-39825", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39825" }, { "name": "CVE-2023-53422", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53422" }, { "name": "CVE-2023-53383", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53383" }, { "name": "CVE-2023-53244", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53244" }, { "name": "CVE-2022-50275", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50275" }, { "name": "CVE-2023-53373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53373" }, { "name": "CVE-2022-50287", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50287" }, { "name": "CVE-2023-53375", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53375" }, { "name": "CVE-2025-39882", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39882" }, { "name": "CVE-2025-39766", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39766" }, { "name": "CVE-2025-39801", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39801" }, { "name": "CVE-2022-50308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50308" }, { "name": "CVE-2023-53530", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53530" }, { "name": "CVE-2025-38146", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38146" }, { "name": "CVE-2023-53197", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53197" }, { "name": "CVE-2025-39724", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39724" }, { "name": "CVE-2025-38510", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38510" }, { "name": "CVE-2025-39758", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39758" }, { "name": "CVE-2025-39694", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39694" }, { "name": "CVE-2025-38418", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38418" }, { "name": "CVE-2025-40300", "url": "https://www.cve.org/CVERecord?id=CVE-2025-40300" }, { "name": "CVE-2023-53401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53401" }, { "name": "CVE-2023-53229", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53229" }, { "name": "CVE-2025-39806", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39806" }, { "name": "CVE-2022-50414", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50414" }, { "name": "CVE-2023-53521", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53521" }, { "name": "CVE-2023-53479", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53479" }, { "name": "CVE-2025-38668", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38668" }, { "name": "CVE-2025-38721", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38721" }, { "name": "CVE-2023-53313", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53313" }, { "name": "CVE-2023-53395", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53395" }, { "name": "CVE-2025-39684", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39684" }, { "name": "CVE-2022-50339", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50339" }, { "name": "CVE-2022-50436", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50436" }, { "name": "CVE-2022-50271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50271" }, { "name": "CVE-2025-38526", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38526" }, { "name": "CVE-2023-53485", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53485" }, { "name": "CVE-2025-38472", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38472" }, { "name": "CVE-2025-38506", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38506" }, { "name": "CVE-2025-38703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38703" }, { "name": "CVE-2025-39870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39870" }, { "name": "CVE-2022-50241", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50241" }, { "name": "CVE-2025-39807", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39807" }, { "name": "CVE-2022-50258", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50258" }, { "name": "CVE-2025-38604", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38604" }, { "name": "CVE-2025-38623", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38623" }, { "name": "CVE-2023-53365", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53365" }, { "name": "CVE-2025-22022", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22022" }, { "name": "CVE-2025-38544", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38544" }, { "name": "CVE-2025-39922", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39922" }, { "name": "CVE-2025-39797", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39797" }, { "name": "CVE-2025-38725", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38725" }, { "name": "CVE-2023-53184", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53184" }, { "name": "CVE-2022-50365", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50365" }, { "name": "CVE-2025-38006", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38006" }, { "name": "CVE-2022-50312", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50312" }, { "name": "CVE-2023-53196", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53196" }, { "name": "CVE-2025-38125", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38125" }, { "name": "CVE-2023-53501", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53501" }, { "name": "CVE-2025-38351", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38351" }, { "name": "CVE-2025-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38477" }, { "name": "CVE-2022-50340", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50340" }, { "name": "CVE-2023-53331", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53331" }, { "name": "CVE-2024-46733", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46733" }, { "name": "CVE-2025-38683", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38683" }, { "name": "CVE-2023-53440", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53440" }, { "name": "CVE-2025-39846", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39846" }, { "name": "CVE-2022-50374", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50374" }, { "name": "CVE-2022-50375", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50375" }, { "name": "CVE-2024-58239", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58239" }, { "name": "CVE-2022-50460", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50460" }, { "name": "CVE-2023-53307", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53307" }, { "name": "CVE-2023-53152", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53152" }, { "name": "CVE-2025-38185", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38185" }, { "name": "CVE-2025-39691", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39691" }, { "name": "CVE-2025-39850", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39850" }, { "name": "CVE-2023-53442", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53442" }, { "name": "CVE-2025-39890", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39890" }, { "name": "CVE-2025-39844", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39844" }, { "name": "CVE-2025-39742", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39742" }, { "name": "CVE-2023-53286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53286" }, { "name": "CVE-2023-53207", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53207" }, { "name": "CVE-2025-38605", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38605" }, { "name": "CVE-2022-50362", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50362" }, { "name": "CVE-2023-53205", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53205" }, { "name": "CVE-2025-38263", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38263" }, { "name": "CVE-2025-38610", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38610" }, { "name": "CVE-2025-39863", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39863" }, { "name": "CVE-2023-53180", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53180" }, { "name": "CVE-2025-38560", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38560" }, { "name": "CVE-2023-53385", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53385" }, { "name": "CVE-2023-53226", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53226" }, { "name": "CVE-2023-53525", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53525" }, { "name": "CVE-2025-38701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38701" }, { "name": "CVE-2024-58240", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58240" }, { "name": "CVE-2023-53249", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53249" }, { "name": "CVE-2023-53252", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53252" }, { "name": "CVE-2023-53261", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53261" }, { "name": "CVE-2022-50396", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50396" }, { "name": "CVE-2025-39726", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39726" }, { "name": "CVE-2023-53246", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53246" }, { "name": "CVE-2024-53168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53168" }, { "name": "CVE-2023-53364", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53364" }, { "name": "CVE-2022-50423", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50423" }, { "name": "CVE-2025-38618", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38618" }, { "name": "CVE-2022-50239", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50239" }, { "name": "CVE-2023-53532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53532" }, { "name": "CVE-2022-50348", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50348" }, { "name": "CVE-2023-53508", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53508" }, { "name": "CVE-2025-38581", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38581" }, { "name": "CVE-2023-53213", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53213" }, { "name": "CVE-2023-53526", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53526" }, { "name": "CVE-2025-39891", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39891" }, { "name": "CVE-2025-39790", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39790" }, { "name": "CVE-2023-53255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53255" }, { "name": "CVE-2023-53277", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53277" }, { "name": "CVE-2025-38680", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38680" }, { "name": "CVE-2023-53379", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53379" }, { "name": "CVE-2025-38684", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38684" }, { "name": "CVE-2025-39686", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39686" }, { "name": "CVE-2025-39798", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39798" }, { "name": "CVE-2025-38730", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38730" }, { "name": "CVE-2023-4515", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4515" }, { "name": "CVE-2025-39747", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39747" }, { "name": "CVE-2023-53343", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53343" }, { "name": "CVE-2023-53299", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53299" }, { "name": "CVE-2023-53268", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53268" }, { "name": "CVE-2025-38516", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38516" }, { "name": "CVE-2023-53204", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53204" }, { "name": "CVE-2025-39714", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39714" }, { "name": "CVE-2023-53333", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53333" }, { "name": "CVE-2022-50394", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50394" }, { "name": "CVE-2023-53456", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53456" }, { "name": "CVE-2022-50266", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50266" }, { "name": "CVE-2023-53446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53446" }, { "name": "CVE-2023-53463", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53463" }, { "name": "CVE-2023-53170", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53170" }, { "name": "CVE-2023-53260", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53260" }, { "name": "CVE-2025-39854", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39854" }, { "name": "CVE-2023-53386", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53386" }, { "name": "CVE-2025-39706", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39706" }, { "name": "CVE-2025-39830", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39830" }, { "name": "CVE-2025-38576", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38576" }, { "name": "CVE-2025-39869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39869" }, { "name": "CVE-2023-53181", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53181" }, { "name": "CVE-2023-53174", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53174" }, { "name": "CVE-2025-38439", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38439" }, { "name": "CVE-2025-39719", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39719" }, { "name": "CVE-2025-39695", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39695" }, { "name": "CVE-2023-53254", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53254" }, { "name": "CVE-2022-50430", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50430" }, { "name": "CVE-2025-38553", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38553" }, { "name": "CVE-2025-38190", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38190" }, { "name": "CVE-2025-39738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39738" }, { "name": "CVE-2023-53295", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53295" }, { "name": "CVE-2023-53298", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53298" }, { "name": "CVE-2025-38205", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38205" }, { "name": "CVE-2023-53507", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53507" }, { "name": "CVE-2023-53314", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53314" }, { "name": "CVE-2023-53281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53281" }, { "name": "CVE-2023-53330", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53330" }, { "name": "CVE-2025-39705", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39705" }, { "name": "CVE-2022-50422", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50422" }, { "name": "CVE-2022-50252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50252" }, { "name": "CVE-2025-39713", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39713" }, { "name": "CVE-2023-53316", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53316" }, { "name": "CVE-2022-50412", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50412" }, { "name": "CVE-2022-50299", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50299" }, { "name": "CVE-2023-53208", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53208" }, { "name": "CVE-2025-39744", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39744" }, { "name": "CVE-2023-53315", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53315" }, { "name": "CVE-2025-38736", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38736" }, { "name": "CVE-2023-53297", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53297" }, { "name": "CVE-2023-53499", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53499" }, { "name": "CVE-2023-53234", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53234" }, { "name": "CVE-2025-21969", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969" }, { "name": "CVE-2023-53167", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53167" }, { "name": "CVE-2023-53342", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53342" }, { "name": "CVE-2025-39678", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39678" }, { "name": "CVE-2023-53414", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53414" }, { "name": "CVE-2025-38531", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38531" }, { "name": "CVE-2023-53265", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53265" }, { "name": "CVE-2025-39693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39693" }, { "name": "CVE-2022-50246", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50246" }, { "name": "CVE-2025-38503", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38503" }, { "name": "CVE-2025-38630", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38630" }, { "name": "CVE-2023-53490", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53490" }, { "name": "CVE-2023-53302", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53302" }, { "name": "CVE-2023-53482", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53482" }, { "name": "CVE-2023-53444", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53444" }, { "name": "CVE-2023-53175", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53175" }, { "name": "CVE-2022-50392", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50392" }, { "name": "CVE-2025-38585", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38585" }, { "name": "CVE-2022-50233", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50233" }, { "name": "CVE-2023-53274", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53274" }, { "name": "CVE-2025-39682", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39682" }, { "name": "CVE-2022-50410", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50410" }, { "name": "CVE-2022-50428", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50428" }, { "name": "CVE-2023-39197", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39197" }, { "name": "CVE-2025-39833", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39833" }, { "name": "CVE-2025-39832", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39832" }, { "name": "CVE-2023-53495", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53495" }, { "name": "CVE-2023-53436", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53436" }, { "name": "CVE-2022-50402", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50402" }, { "name": "CVE-2025-38643", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38643" }, { "name": "CVE-2022-50427", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50427" }, { "name": "CVE-2022-50278", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50278" }, { "name": "CVE-2023-53273", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53273" }, { "name": "CVE-2023-53377", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53377" }, { "name": "CVE-2023-53500", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53500" }, { "name": "CVE-2025-38103", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38103" }, { "name": "CVE-2025-39847", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39847" }, { "name": "CVE-2025-38514", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38514" }, { "name": "CVE-2025-38360", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38360" }, { "name": "CVE-2025-39783", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39783" }, { "name": "CVE-2025-39835", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39835" }, { "name": "CVE-2025-38255", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38255" }, { "name": "CVE-2025-38512", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38512" }, { "name": "CVE-2025-38622", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38622" }, { "name": "CVE-2022-50279", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50279" }, { "name": "CVE-2023-53243", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53243" }, { "name": "CVE-2023-53348", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53348" }, { "name": "CVE-2023-53219", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53219" }, { "name": "CVE-2022-50467", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50467" }, { "name": "CVE-2023-53428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53428" }, { "name": "CVE-2025-39677", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39677" }, { "name": "CVE-2022-50440", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50440" }, { "name": "CVE-2025-39707", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39707" }, { "name": "CVE-2022-50248", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50248" }, { "name": "CVE-2025-39907", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39907" }, { "name": "CVE-2023-53147", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53147" }, { "name": "CVE-2023-53292", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53292" }, { "name": "CVE-2025-38640", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38640" }, { "name": "CVE-2023-53371", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53371" }, { "name": "CVE-2025-38659", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38659" }, { "name": "CVE-2022-50311", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50311" }, { "name": "CVE-2024-53125", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53125" }, { "name": "CVE-2025-38572", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38572" }, { "name": "CVE-2022-50381", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50381" }, { "name": "CVE-2023-53187", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53187" }, { "name": "CVE-2025-38550", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38550" }, { "name": "CVE-2023-53201", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53201" }, { "name": "CVE-2025-39711", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39711" }, { "name": "CVE-2022-50385", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50385" }, { "name": "CVE-2025-38535", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38535" }, { "name": "CVE-2025-39873", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39873" }, { "name": "CVE-2022-50459", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50459" }, { "name": "CVE-2023-53192", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53192" }, { "name": "CVE-2022-50277", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50277" }, { "name": "CVE-2025-38714", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38714" }, { "name": "CVE-2023-53251", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53251" }, { "name": "CVE-2024-53093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53093" }, { "name": "CVE-2023-53337", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53337" }, { "name": "CVE-2023-53380", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53380" }, { "name": "CVE-2023-53452", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53452" }, { "name": "CVE-2022-50369", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50369" }, { "name": "CVE-2023-53153", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53153" } ], "initial_release_date": "2025-10-17T00:00:00", "last_revision_date": "2025-10-17T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0895", "revisions": [ { "description": "Version initiale", "revision_date": "2025-10-17T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE", "vendor_advisories": [ { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03615-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503615-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03553-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503553-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03557-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503557-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03539-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503539-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03543-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503543-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03580-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503580-1" }, { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03613-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503613-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03600-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503600-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03602-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503602-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03561-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503561-1" }, { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03614-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503614-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03567-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503567-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03554-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503554-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03576-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503576-1" }, { "published_at": "2025-10-17", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03626-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503626-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03548-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503548-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03551-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503551-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03601-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503601-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03578-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503578-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03575-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503575-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03562-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503562-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03572-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503572-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03550-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503550-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03568-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503568-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03569-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503569-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03563-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503563-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03566-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503566-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03555-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503555-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03529-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503529-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03538-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503538-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03571-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503571-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03559-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503559-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03528-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503528-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03583-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503583-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03552-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503552-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03577-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503577-1" } ] }
fkie_cve-2023-53427
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/275a3d2b9408fc4895e342f772cab9a89960546e | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/2d0c4f5f618f58eba03385363717703bee873c64 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/3524d6da0fe88aee79f06be6572955d16ad76b39 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/3e161c2791f8e661eed24a2c624087084d910215 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/41832c62a75dad530dc5a2856c92ae5459d497e5 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/7cbd5bdb5bd4404a5da4309521134b42c65846c0 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/cfd85a0922c4696d768965e686ad805a58d9d834 |
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix warning and UAF when destroy the MR list\n\nIf the MR allocate failed, the MR recovery work not initialized\nand list not cleared. Then will be warning and UAF when release\nthe MR:\n\n WARNING: CPU: 4 PID: 824 at kernel/workqueue.c:3066 __flush_work.isra.0+0xf7/0x110\n CPU: 4 PID: 824 Comm: mount.cifs Not tainted 6.1.0-rc5+ #82\n RIP: 0010:__flush_work.isra.0+0xf7/0x110\n Call Trace:\n \u003cTASK\u003e\n __cancel_work_timer+0x2ba/0x2e0\n smbd_destroy+0x4e1/0x990\n _smbd_get_connection+0x1cbd/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\n BUG: KASAN: use-after-free in smbd_destroy+0x4fc/0x990\n Read of size 8 at addr ffff88810b156a08 by task mount.cifs/824\n CPU: 4 PID: 824 Comm: mount.cifs Tainted: G W 6.1.0-rc5+ #82\n Call Trace:\n dump_stack_lvl+0x34/0x44\n print_report+0x171/0x472\n kasan_report+0xad/0x130\n smbd_destroy+0x4fc/0x990\n _smbd_get_connection+0x1cbd/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\n Allocated by task 824:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_kmalloc+0x7a/0x90\n _smbd_get_connection+0x1b6f/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\n Freed by task 824:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x2a/0x40\n ____kasan_slab_free+0x143/0x1b0\n __kmem_cache_free+0xc8/0x330\n _smbd_get_connection+0x1c6a/0x2110\n smbd_get_connection+0x21/0x40\n cifs_get_tcp_session+0x8ef/0xda0\n mount_get_conns+0x60/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nLet\u0027s initialize the MR recovery work before MR allocate to prevent\nthe warning, remove the MRs from the list to prevent the UAF." } ], "id": "CVE-2023-53427", "lastModified": "2025-09-19T16:00:27.847", "metrics": {}, "published": "2025-09-18T16:15:46.610", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/275a3d2b9408fc4895e342f772cab9a89960546e" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/2d0c4f5f618f58eba03385363717703bee873c64" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/3524d6da0fe88aee79f06be6572955d16ad76b39" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/3e161c2791f8e661eed24a2c624087084d910215" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/41832c62a75dad530dc5a2856c92ae5459d497e5" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/7cbd5bdb5bd4404a5da4309521134b42c65846c0" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/cfd85a0922c4696d768965e686ad805a58d9d834" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
wid-sec-w-2025-2092
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und um nicht n\u00e4here beschriebene Effekte zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-2092 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2092.json" }, { "category": "self", "summary": "WID-SEC-2025-2092 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2092" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50375", "url": "https://lore.kernel.org/linux-cve-announce/2025091848-CVE-2022-50375-2409@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50376", "url": "https://lore.kernel.org/linux-cve-announce/2025091850-CVE-2022-50376-1398@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50377", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50377-f43b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50378", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50378-4c78@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50379", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50379-a7c6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50380", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50380-25c9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50381", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50381-b83f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50382", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50382-0ff0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50383", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50383-e1c7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50384", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50384-b652@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50385", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50385-7787@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50386", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50386-07d7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50387", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50387-cd0d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50388", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50388-02a2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50389", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50389-17eb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50390", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50390-742c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50391", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50391-7caa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50392", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50392-967e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50393", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50393-d5da@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50394", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50394-fcaa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50395", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50395-344c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50396", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50396-8b1b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50397", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50397-44b6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50398", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50398-1502@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50399", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50399-6051@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50400", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2022-50400-d99e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50401", "url": "https://lore.kernel.org/linux-cve-announce/2025091850-CVE-2022-50401-814e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50402", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50402-4c96@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50403", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50403-0471@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50404", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50404-5db4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50405", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50405-8450@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50406", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50406-8797@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50407", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50407-e539@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50408", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50408-5835@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50409", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50409-d7dc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50410", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50410-edee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50411", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50411-45ab@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50412", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50412-0f2e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50413", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50413-c345@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50414", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50414-a99a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50415", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50415-9bba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50416", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50416-886a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50417", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50417-1a69@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50418", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50418-deac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50419", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50419-23b9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53369", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2023-53369-394e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53370", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53370-1085@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53371", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53371-e5f9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53372", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53372-4d9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53373", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53373-087e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53374", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53374-d003@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53375", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53375-a29f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53376", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53376-d18b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53377", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53377-baaf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53378", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53378-3d98@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53379", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53379-a33e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53380", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53380-b2e0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53381", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53381-a774@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53382", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53382-0f75@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53383", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53383-fea9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53384", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53384-042e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53385", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53385-7f7c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53386", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53386-8ab2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53387", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53387-1fb7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53388", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53388-657a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53389", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53389-26a2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53390", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53390-8eb5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53391", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53391-cea3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53392", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53392-9703@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53393", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53393-5e45@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53394", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53394-dd17@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53395", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53395-939e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53396", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53396-27d9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53397", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53397-2076@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53398", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53398-2464@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53399", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53399-316d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53400", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53400-2d47@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53401", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53401-b668@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53402", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53402-4b40@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53403", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53403-a3a3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53404", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53404-29f4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53405", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53405-885a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53406", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53406-d3e0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53407", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53407-6ad0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53408", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53408-5a18@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53409", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53409-818d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53410", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53410-4483@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53411", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53411-530b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53412", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53412-cbd2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53413", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53413-f354@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53414", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53414-e790@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53415", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53415-ea27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53416", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53416-a008@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53417", "url": "https://lore.kernel.org/linux-cve-announce/2025091803-CVE-2023-53417-caf7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53418", "url": "https://lore.kernel.org/linux-cve-announce/2025091803-CVE-2023-53418-5b61@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53419", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53419-8597@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53420", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53420-e1ce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53421", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53421-0dd9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53422", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53422-8cca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53423", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53423-a5ce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53424", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53424-d5b6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53425", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53425-6eb5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53426", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53426-9553@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53427", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53427-f56c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53428", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53428-1448@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53429", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53429-dd4c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53430", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53430-4aaa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53431", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53431-7eac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53432", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53432-bc37@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53433", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53433-fc43@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53434", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53434-243b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53435", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53435-ed57@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53436", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53436-d294@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53437", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53437-7993@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53438", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53438-50e2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53439", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53439-b538@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53440", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53440-cd1e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53441", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53441-0641@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53442", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53442-8a1f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53443", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53443-6815@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53444", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53444-41d9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53445", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53445-7b18@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53446", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53446-2fcb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53447", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53447-e0ee@gregkh/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15585-1 vom 2025-09-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUHLDYQM4UZOZRCPRIEXRRIGQ4XKRHRT/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:17760 vom 2025-10-13", "url": "https://access.redhat.com/errata/RHSA-2025:17760" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-3038 vom 2025-10-15", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3038.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-111 vom 2025-10-14", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-111.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-17760 vom 2025-10-14", "url": "https://linux.oracle.com/errata/ELSA-2025-17760.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-10-15T22:00:00.000+00:00", "generator": { "date": "2025-10-16T09:43:30.376+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-2092", "initial_release_date": "2025-09-18T22:00:00.000+00:00", "revision_history": [ { "date": "2025-09-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-09-30T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-10-12T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-10-14T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon und Oracle Linux aufgenommen" }, { "date": "2025-10-15T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T034436", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-50375", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50375" }, { "cve": "CVE-2022-50376", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50376" }, { "cve": "CVE-2022-50377", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50377" }, { "cve": "CVE-2022-50378", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50378" }, { "cve": "CVE-2022-50379", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50379" }, { "cve": "CVE-2022-50380", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50380" }, { "cve": "CVE-2022-50381", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50381" }, { "cve": "CVE-2022-50382", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50382" }, { "cve": "CVE-2022-50383", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50383" }, { "cve": "CVE-2022-50384", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50384" }, { "cve": "CVE-2022-50385", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50385" }, { "cve": "CVE-2022-50386", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50386" }, { "cve": "CVE-2022-50387", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50387" }, { "cve": "CVE-2022-50388", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50388" }, { "cve": "CVE-2022-50389", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50389" }, { "cve": "CVE-2022-50390", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50390" }, { "cve": "CVE-2022-50391", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50391" }, { "cve": "CVE-2022-50392", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50392" }, { "cve": "CVE-2022-50393", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50393" }, { "cve": "CVE-2022-50394", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50394" }, { "cve": "CVE-2022-50395", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50395" }, { "cve": "CVE-2022-50396", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50396" }, { "cve": "CVE-2022-50397", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50397" }, { "cve": "CVE-2022-50398", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50398" }, { "cve": "CVE-2022-50399", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50399" }, { "cve": "CVE-2022-50400", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50400" }, { "cve": "CVE-2022-50401", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50401" }, { "cve": "CVE-2022-50402", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50402" }, { "cve": "CVE-2022-50403", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50403" }, { "cve": "CVE-2022-50404", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50404" }, { "cve": "CVE-2022-50405", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50405" }, { "cve": "CVE-2022-50406", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50406" }, { "cve": "CVE-2022-50407", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50407" }, { "cve": "CVE-2022-50408", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50408" }, { "cve": "CVE-2022-50409", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50409" }, { "cve": "CVE-2022-50410", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50410" }, { "cve": "CVE-2022-50411", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50411" }, { "cve": "CVE-2022-50412", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50412" }, { "cve": "CVE-2022-50413", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50413" }, { "cve": "CVE-2022-50414", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50414" }, { "cve": "CVE-2022-50415", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50415" }, { "cve": "CVE-2022-50416", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50416" }, { "cve": "CVE-2022-50417", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50417" }, { "cve": "CVE-2022-50418", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50418" }, { "cve": "CVE-2022-50419", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50419" }, { "cve": "CVE-2023-53369", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53369" }, { "cve": "CVE-2023-53370", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53370" }, { "cve": "CVE-2023-53371", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53371" }, { "cve": "CVE-2023-53372", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53372" }, { "cve": "CVE-2023-53373", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53373" }, { "cve": "CVE-2023-53374", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53374" }, { "cve": "CVE-2023-53375", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53375" }, { "cve": "CVE-2023-53376", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53376" }, { "cve": "CVE-2023-53377", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53377" }, { "cve": "CVE-2023-53378", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53378" }, { "cve": "CVE-2023-53379", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53379" }, { "cve": "CVE-2023-53380", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53380" }, { "cve": "CVE-2023-53381", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53381" }, { "cve": "CVE-2023-53382", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53382" }, { "cve": "CVE-2023-53383", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53383" }, { "cve": "CVE-2023-53384", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53384" }, { "cve": "CVE-2023-53385", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53385" }, { "cve": "CVE-2023-53386", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53386" }, { "cve": "CVE-2023-53387", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53387" }, { "cve": "CVE-2023-53388", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53388" }, { "cve": "CVE-2023-53389", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53389" }, { "cve": "CVE-2023-53390", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53390" }, { "cve": "CVE-2023-53391", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53391" }, { "cve": "CVE-2023-53392", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53392" }, { "cve": "CVE-2023-53393", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53393" }, { "cve": "CVE-2023-53394", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53394" }, { "cve": "CVE-2023-53395", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53395" }, { "cve": "CVE-2023-53396", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53396" }, { "cve": "CVE-2023-53397", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53397" }, { "cve": "CVE-2023-53398", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53398" }, { "cve": "CVE-2023-53399", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53399" }, { "cve": "CVE-2023-53400", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53400" }, { "cve": "CVE-2023-53401", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53401" }, { "cve": "CVE-2023-53402", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53402" }, { "cve": "CVE-2023-53403", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53403" }, { "cve": "CVE-2023-53404", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53404" }, { "cve": "CVE-2023-53405", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53405" }, { "cve": "CVE-2023-53406", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53406" }, { "cve": "CVE-2023-53407", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53407" }, { "cve": "CVE-2023-53408", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53408" }, { "cve": "CVE-2023-53409", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53409" }, { "cve": "CVE-2023-53410", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53410" }, { "cve": "CVE-2023-53411", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53411" }, { "cve": "CVE-2023-53412", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53412" }, { "cve": "CVE-2023-53413", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53413" }, { "cve": "CVE-2023-53414", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53414" }, { "cve": "CVE-2023-53415", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53415" }, { "cve": "CVE-2023-53416", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53416" }, { "cve": "CVE-2023-53417", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53417" }, { "cve": "CVE-2023-53418", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53418" }, { "cve": "CVE-2023-53419", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53419" }, { "cve": "CVE-2023-53420", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53420" }, { "cve": "CVE-2023-53421", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53421" }, { "cve": "CVE-2023-53422", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53422" }, { "cve": "CVE-2023-53423", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53423" }, { "cve": "CVE-2023-53424", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53424" }, { "cve": "CVE-2023-53425", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53425" }, { "cve": "CVE-2023-53426", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53426" }, { "cve": "CVE-2023-53427", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53427" }, { "cve": "CVE-2023-53428", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53428" }, { "cve": "CVE-2023-53429", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53429" }, { "cve": "CVE-2023-53430", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53430" }, { "cve": "CVE-2023-53431", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53431" }, { "cve": "CVE-2023-53432", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53432" }, { "cve": "CVE-2023-53433", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53433" }, { "cve": "CVE-2023-53434", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53434" }, { "cve": "CVE-2023-53435", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53435" }, { "cve": "CVE-2023-53436", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53436" }, { "cve": "CVE-2023-53437", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53437" }, { "cve": "CVE-2023-53438", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53438" }, { "cve": "CVE-2023-53439", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53439" }, { "cve": "CVE-2023-53440", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53440" }, { "cve": "CVE-2023-53441", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53441" }, { "cve": "CVE-2023-53442", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53442" }, { "cve": "CVE-2023-53443", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53443" }, { "cve": "CVE-2023-53444", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53444" }, { "cve": "CVE-2023-53445", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53445" }, { "cve": "CVE-2023-53446", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53446" }, { "cve": "CVE-2023-53447", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53447" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.