Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53431 (GCVE-0-2023-53431)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Linux | Linux |
Version: 9927c68864e9c39cc317b4f559309ba29e642168 Version: 9927c68864e9c39cc317b4f559309ba29e642168 Version: 9927c68864e9c39cc317b4f559309ba29e642168 Version: 9927c68864e9c39cc317b4f559309ba29e642168 Version: 9927c68864e9c39cc317b4f559309ba29e642168 Version: 9927c68864e9c39cc317b4f559309ba29e642168 Version: 9927c68864e9c39cc317b4f559309ba29e642168 |
||
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/scsi/ses.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "4e7c498c3713b09bef20c76c7319555637e8bbd5", "status": "affected", "version": "9927c68864e9c39cc317b4f559309ba29e642168", "versionType": "git" }, { "lessThan": "110d425cdfb15006f3c4fde5264e786a247b6b36", "status": "affected", "version": "9927c68864e9c39cc317b4f559309ba29e642168", "versionType": "git" }, { "lessThan": "176d7345b89ced72020a313bfa4e7f345d1c3aed", "status": "affected", "version": "9927c68864e9c39cc317b4f559309ba29e642168", "versionType": "git" }, { "lessThan": "05143d90ac90b7abc6692285895a1ef460e008ee", "status": "affected", "version": "9927c68864e9c39cc317b4f559309ba29e642168", "versionType": "git" }, { "lessThan": "f8e702c54413eee2d8f94f61d18adadac7c87e87", "status": "affected", "version": "9927c68864e9c39cc317b4f559309ba29e642168", "versionType": "git" }, { "lessThan": "eabc4872f172ecb8dd8536bc366a51868154a450", "status": "affected", "version": "9927c68864e9c39cc317b4f559309ba29e642168", "versionType": "git" }, { "lessThan": "c8e22b7a1694bb8d025ea636816472739d859145", "status": "affected", "version": "9927c68864e9c39cc317b4f559309ba29e642168", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/scsi/ses.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "2.6.25" }, { "lessThan": "2.6.25", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.281", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.241", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.178", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.108", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.25", "versionType": "semver" }, { "lessThanOrEqual": "6.2.*", "status": "unaffected", "version": "6.2.12", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.3", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.19.281", "versionStartIncluding": "2.6.25", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.4.241", "versionStartIncluding": "2.6.25", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.10.178", "versionStartIncluding": "2.6.25", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.108", "versionStartIncluding": "2.6.25", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.25", "versionStartIncluding": "2.6.25", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.2.12", "versionStartIncluding": "2.6.25", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.3", "versionStartIncluding": "2.6.25", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ses: Handle enclosure with just a primary component gracefully\n\nThis reverts commit 3fe97ff3d949 (\"scsi: ses: Don\u0027t attach if enclosure\nhas no components\") and introduces proper handling of case where there are\nno detected secondary components, but primary component (enumerated in\nnum_enclosures) does exist. That fix was originally proposed by Ding Hui\n\u003cdinghui@sangfor.com.cn\u003e.\n\nCompletely ignoring devices that have one primary enclosure and no\nsecondary one results in ses_intf_add() bailing completely\n\n\tscsi 2:0:0:254: enclosure has no enumerated components\n scsi 2:0:0:254: Failed to bind enclosure -12ven in valid configurations such\n\neven on valid configurations with 1 primary and 0 secondary enclosures as\nbelow:\n\n\t# sg_ses /dev/sg0\n\t 3PARdata SES 3321\n\tSupported diagnostic pages:\n\t Supported Diagnostic Pages [sdp] [0x0]\n\t Configuration (SES) [cf] [0x1]\n\t Short Enclosure Status (SES) [ses] [0x8]\n\t# sg_ses -p cf /dev/sg0\n\t 3PARdata SES 3321\n\tConfiguration diagnostic page:\n\t number of secondary subenclosures: 0\n\t generation code: 0x0\n\t enclosure descriptor list\n\t Subenclosure identifier: 0 [primary]\n\t relative ES process id: 0, number of ES processes: 1\n\t number of type descriptor headers: 1\n\t enclosure logical identifier (hex): 20000002ac02068d\n\t enclosure vendor: 3PARdata product: VV rev: 3321\n\t type descriptor header and text list\n\t Element type: Unspecified, subenclosure id: 0\n\t number of possible elements: 1\n\nThe changelog for the original fix follows\n\n=====\nWe can get a crash when disconnecting the iSCSI session,\nthe call trace like this:\n\n [ffff00002a00fb70] kfree at ffff00000830e224\n [ffff00002a00fba0] ses_intf_remove at ffff000001f200e4\n [ffff00002a00fbd0] device_del at ffff0000086b6a98\n [ffff00002a00fc50] device_unregister at ffff0000086b6d58\n [ffff00002a00fc70] __scsi_remove_device at ffff00000870608c\n [ffff00002a00fca0] scsi_remove_device at ffff000008706134\n [ffff00002a00fcc0] __scsi_remove_target at ffff0000087062e4\n [ffff00002a00fd10] scsi_remove_target at ffff0000087064c0\n [ffff00002a00fd70] __iscsi_unbind_session at ffff000001c872c4\n [ffff00002a00fdb0] process_one_work at ffff00000810f35c\n [ffff00002a00fe00] worker_thread at ffff00000810f648\n [ffff00002a00fe70] kthread at ffff000008116e98\n\nIn ses_intf_add, components count could be 0, and kcalloc 0 size scomp,\nbut not saved in edev-\u003ecomponent[i].scratch\n\nIn this situation, edev-\u003ecomponent[0].scratch is an invalid pointer,\nwhen kfree it in ses_intf_remove_enclosure, a crash like above would happen\nThe call trace also could be other random cases when kfree cannot catch\nthe invalid pointer\n\nWe should not use edev-\u003ecomponent[] array when the components count is 0\nWe also need check index when use edev-\u003ecomponent[] array in\nses_enclosure_data_process\n=====" } ], "providerMetadata": { "dateUpdated": "2025-10-02T07:04:20.059Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/4e7c498c3713b09bef20c76c7319555637e8bbd5" }, { "url": "https://git.kernel.org/stable/c/110d425cdfb15006f3c4fde5264e786a247b6b36" }, { "url": "https://git.kernel.org/stable/c/176d7345b89ced72020a313bfa4e7f345d1c3aed" }, { "url": "https://git.kernel.org/stable/c/05143d90ac90b7abc6692285895a1ef460e008ee" }, { "url": "https://git.kernel.org/stable/c/f8e702c54413eee2d8f94f61d18adadac7c87e87" }, { "url": "https://git.kernel.org/stable/c/eabc4872f172ecb8dd8536bc366a51868154a450" }, { "url": "https://git.kernel.org/stable/c/c8e22b7a1694bb8d025ea636816472739d859145" } ], "title": "scsi: ses: Handle enclosure with just a primary component gracefully", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2023-53431", "datePublished": "2025-09-18T16:04:11.748Z", "dateReserved": "2025-09-17T14:54:09.745Z", "dateUpdated": "2025-10-02T07:04:20.059Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-53431\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-18T16:15:47.070\",\"lastModified\":\"2025-10-01T08:15:30.747\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nscsi: ses: Handle enclosure with just a primary component gracefully\\n\\nThis reverts commit 3fe97ff3d949 (\\\"scsi: ses: Don\u0027t attach if enclosure\\nhas no components\\\") and introduces proper handling of case where there are\\nno detected secondary components, but primary component (enumerated in\\nnum_enclosures) does exist. That fix was originally proposed by Ding Hui\\n\u003cdinghui@sangfor.com.cn\u003e.\\n\\nCompletely ignoring devices that have one primary enclosure and no\\nsecondary one results in ses_intf_add() bailing completely\\n\\n\\tscsi 2:0:0:254: enclosure has no enumerated components\\n scsi 2:0:0:254: Failed to bind enclosure -12ven in valid configurations such\\n\\neven on valid configurations with 1 primary and 0 secondary enclosures as\\nbelow:\\n\\n\\t# sg_ses /dev/sg0\\n\\t 3PARdata SES 3321\\n\\tSupported diagnostic pages:\\n\\t Supported Diagnostic Pages [sdp] [0x0]\\n\\t Configuration (SES) [cf] [0x1]\\n\\t Short Enclosure Status (SES) [ses] [0x8]\\n\\t# sg_ses -p cf /dev/sg0\\n\\t 3PARdata SES 3321\\n\\tConfiguration diagnostic page:\\n\\t number of secondary subenclosures: 0\\n\\t generation code: 0x0\\n\\t enclosure descriptor list\\n\\t Subenclosure identifier: 0 [primary]\\n\\t relative ES process id: 0, number of ES processes: 1\\n\\t number of type descriptor headers: 1\\n\\t enclosure logical identifier (hex): 20000002ac02068d\\n\\t enclosure vendor: 3PARdata product: VV rev: 3321\\n\\t type descriptor header and text list\\n\\t Element type: Unspecified, subenclosure id: 0\\n\\t number of possible elements: 1\\n\\nThe changelog for the original fix follows\\n\\n=====\\nWe can get a crash when disconnecting the iSCSI session,\\nthe call trace like this:\\n\\n [ffff00002a00fb70] kfree at ffff00000830e224\\n [ffff00002a00fba0] ses_intf_remove at ffff000001f200e4\\n [ffff00002a00fbd0] device_del at ffff0000086b6a98\\n [ffff00002a00fc50] device_unregister at ffff0000086b6d58\\n [ffff00002a00fc70] __scsi_remove_device at ffff00000870608c\\n [ffff00002a00fca0] scsi_remove_device at ffff000008706134\\n [ffff00002a00fcc0] __scsi_remove_target at ffff0000087062e4\\n [ffff00002a00fd10] scsi_remove_target at ffff0000087064c0\\n [ffff00002a00fd70] __iscsi_unbind_session at ffff000001c872c4\\n [ffff00002a00fdb0] process_one_work at ffff00000810f35c\\n [ffff00002a00fe00] worker_thread at ffff00000810f648\\n [ffff00002a00fe70] kthread at ffff000008116e98\\n\\nIn ses_intf_add, components count could be 0, and kcalloc 0 size scomp,\\nbut not saved in edev-\u003ecomponent[i].scratch\\n\\nIn this situation, edev-\u003ecomponent[0].scratch is an invalid pointer,\\nwhen kfree it in ses_intf_remove_enclosure, a crash like above would happen\\nThe call trace also could be other random cases when kfree cannot catch\\nthe invalid pointer\\n\\nWe should not use edev-\u003ecomponent[] array when the components count is 0\\nWe also need check index when use edev-\u003ecomponent[] array in\\nses_enclosure_data_process\\n=====\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/05143d90ac90b7abc6692285895a1ef460e008ee\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/110d425cdfb15006f3c4fde5264e786a247b6b36\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/176d7345b89ced72020a313bfa4e7f345d1c3aed\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4e7c498c3713b09bef20c76c7319555637e8bbd5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c8e22b7a1694bb8d025ea636816472739d859145\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/eabc4872f172ecb8dd8536bc366a51868154a450\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f8e702c54413eee2d8f94f61d18adadac7c87e87\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
CERTFR-2025-AVI-0895
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
SUSE | Confidential Computing Module | Confidential Computing Module 15-SP6 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
SUSE | Basesystem Module | Basesystem Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP7 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
SUSE | Legacy Module | Legacy Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
SUSE | SUSE Enterprise Storage | SUSE Enterprise Storage 7.1 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
SUSE | Development Tools Module | Development Tools Module 15-SP6 | ||
SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
SUSE | Basesystem Module | Basesystem Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP6 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
SUSE | Legacy Module | Legacy Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP3 | ||
SUSE | Development Tools Module | Development Tools Module 15-SP7 | ||
SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SUSE Linux Enterprise High Performance Computing 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Confidential Computing Module 15-SP6", "product": { "name": "Confidential Computing Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP5", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP7", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.2", "product": { "name": "SUSE Manager Retail Branch Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 12 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP4", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.2", "product": { "name": "SUSE Manager Proxy", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 12-SP5", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP6", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP7", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP6", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP7", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.2", "product": { "name": "SUSE Manager Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP6", "product": { "name": "Legacy Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP5", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP6", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP6", "product": { "name": "Development Tools Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP7", "product": { "name": "SUSE Linux Enterprise Workstation Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP4", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP3", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.2", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP7", "product": { "name": "Basesystem Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP7", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP6", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP3", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP6", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP7", "product": { "name": "Legacy Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP7", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5 LTSS", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP6", "product": { "name": "SUSE Linux Enterprise Workstation Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP7", "product": { "name": "Development Tools Module", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP6", "product": { "name": "SUSE Linux Enterprise High Availability Extension", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP4", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-53443", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53443" }, { "name": "CVE-2023-53453", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53453" }, { "name": "CVE-2022-50378", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50378" }, { "name": "CVE-2025-38380", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38380" }, { "name": "CVE-2022-50291", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50291" }, { "name": "CVE-2023-53247", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53247" }, { "name": "CVE-2022-50433", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50433" }, { "name": "CVE-2022-50356", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50356" }, { "name": "CVE-2023-53473", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53473" }, { "name": "CVE-2022-49138", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49138" }, { "name": "CVE-2022-50425", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50425" }, { "name": "CVE-2025-38201", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38201" }, { "name": "CVE-2022-50367", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50367" }, { "name": "CVE-2025-39808", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39808" }, { "name": "CVE-2023-53347", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53347" }, { "name": "CVE-2023-53475", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53475" }, { "name": "CVE-2025-38520", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38520" }, { "name": "CVE-2023-53312", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53312" }, { "name": "CVE-2025-38588", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38588" }, { "name": "CVE-2023-53311", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53311" }, { "name": "CVE-2025-38574", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38574" }, { "name": "CVE-2022-50398", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50398" }, { "name": "CVE-2023-53393", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53393" }, { "name": "CVE-2023-53480", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53480" }, { "name": "CVE-2023-53303", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53303" }, { "name": "CVE-2023-28328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28328" }, { "name": "CVE-2025-39757", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39757" }, { "name": "CVE-2022-50469", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50469" }, { "name": "CVE-2022-50429", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50429" }, { "name": "CVE-2023-53193", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53193" }, { "name": "CVE-2023-53150", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53150" }, { "name": "CVE-2023-53321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53321" }, { "name": "CVE-2025-39772", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39772" }, { "name": "CVE-2023-53317", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53317" }, { "name": "CVE-2023-53176", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53176" }, { "name": "CVE-2023-53362", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53362" }, { "name": "CVE-2022-50298", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50298" }, { "name": "CVE-2025-38601", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38601" }, { "name": "CVE-2025-39826", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39826" }, { "name": "CVE-2022-50288", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50288" }, { "name": "CVE-2025-38515", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38515" }, { "name": "CVE-2025-38645", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38645" }, { "name": "CVE-2023-5633", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5633" }, { "name": "CVE-2025-38444", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38444" }, { "name": "CVE-2023-53349", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53349" }, { "name": "CVE-2025-39685", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39685" }, { "name": "CVE-2025-38660", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38660" }, { "name": "CVE-2025-39761", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39761" }, { "name": "CVE-2023-53405", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53405" }, { "name": "CVE-2023-53185", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53185" }, { "name": "CVE-2023-53320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53320" }, { "name": "CVE-2023-53359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53359" }, { "name": "CVE-2022-50466", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50466" }, { "name": "CVE-2023-53509", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53509" }, { "name": "CVE-2023-53421", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53421" }, { "name": "CVE-2023-53441", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53441" }, { "name": "CVE-2023-53199", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53199" }, { "name": "CVE-2025-39764", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39764" }, { "name": "CVE-2023-53245", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53245" }, { "name": "CVE-2023-53415", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53415" }, { "name": "CVE-2025-38624", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38624" }, { "name": "CVE-2024-53194", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53194" }, { "name": "CVE-2025-39827", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39827" }, { "name": "CVE-2022-50255", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50255" }, { "name": "CVE-2025-39746", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39746" }, { "name": "CVE-2023-53461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53461" }, { "name": "CVE-2025-38208", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38208" }, { "name": "CVE-2023-53531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53531" }, { "name": "CVE-2025-39889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39889" }, { "name": "CVE-2025-38524", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38524" }, { "name": "CVE-2025-38466", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38466" }, { "name": "CVE-2023-53258", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53258" }, { "name": "CVE-2023-53429", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53429" }, { "name": "CVE-2023-53449", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53449" }, { "name": "CVE-2025-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38595" }, { "name": "CVE-2023-53451", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53451" }, { "name": "CVE-2023-53325", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53325" }, { "name": "CVE-2022-50368", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50368" }, { "name": "CVE-2023-53511", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53511" }, { "name": "CVE-2025-38216", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38216" }, { "name": "CVE-2022-50349", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50349" }, { "name": "CVE-2023-53394", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53394" }, { "name": "CVE-2023-53494", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53494" }, { "name": "CVE-2025-39925", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39925" }, { "name": "CVE-2025-39811", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39811" }, { "name": "CVE-2022-50358", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50358" }, { "name": "CVE-2025-38646", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38646" }, { "name": "CVE-2025-38491", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38491" }, { "name": "CVE-2025-38408", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38408" }, { "name": "CVE-2022-50386", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50386" }, { "name": "CVE-2025-38644", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38644" }, { "name": "CVE-2025-38692", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38692" }, { "name": "CVE-2022-50244", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50244" }, { "name": "CVE-2025-38563", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38563" }, { "name": "CVE-2023-53209", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53209" }, { "name": "CVE-2025-39701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39701" }, { "name": "CVE-2023-53222", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53222" }, { "name": "CVE-2023-53264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53264" }, { "name": "CVE-2022-50323", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50323" }, { "name": "CVE-2025-38591", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38591" }, { "name": "CVE-2022-50441", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50441" }, { "name": "CVE-2025-38609", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38609" }, { "name": "CVE-2023-53519", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53519" }, { "name": "CVE-2022-50294", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50294" }, { "name": "CVE-2023-53447", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53447" }, { "name": "CVE-2023-53472", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53472" }, { "name": "CVE-2022-50242", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50242" }, { "name": "CVE-2023-53248", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53248" }, { "name": "CVE-2025-22023", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22023" }, { "name": "CVE-2025-38500", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38500" }, { "name": "CVE-2025-39709", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39709" }, { "name": "CVE-2023-53217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53217" }, { "name": "CVE-2023-53390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53390" }, { "name": "CVE-2023-53491", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53491" }, { "name": "CVE-2025-39787", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39787" }, { "name": "CVE-2025-39920", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39920" }, { "name": "CVE-2022-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50379" }, { "name": "CVE-2022-50257", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50257" }, { "name": "CVE-2023-53354", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53354" }, { "name": "CVE-2023-53504", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53504" }, { "name": "CVE-2025-38734", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38734" }, { "name": "CVE-2025-38571", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38571" }, { "name": "CVE-2022-50301", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50301" }, { "name": "CVE-2022-50432", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50432" }, { "name": "CVE-2023-53340", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53340" }, { "name": "CVE-2025-38695", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38695" }, { "name": "CVE-2023-52923", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52923" }, { "name": "CVE-2023-53323", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53323" }, { "name": "CVE-2025-39749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39749" }, { "name": "CVE-2022-50304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50304" }, { "name": "CVE-2024-26661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26661" }, { "name": "CVE-2023-53189", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53189" }, { "name": "CVE-2023-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53427" }, { "name": "CVE-2023-53498", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53498" }, { "name": "CVE-2023-4130", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4130" }, { "name": "CVE-2023-53242", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53242" }, { "name": "CVE-2022-50395", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50395" }, { "name": "CVE-2023-53309", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53309" }, { "name": "CVE-2025-39923", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39923" }, { "name": "CVE-2025-38445", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38445" }, { "name": "CVE-2025-38456", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38456" }, { "name": "CVE-2025-38538", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38538" }, { "name": "CVE-2022-50456", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50456" }, { "name": "CVE-2025-39751", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39751" }, { "name": "CVE-2024-58238", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58238" }, { "name": "CVE-2023-53425", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53425" }, { "name": "CVE-2022-50458", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50458" }, { "name": "CVE-2022-50321", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50321" }, { "name": "CVE-2023-53235", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53235" }, { "name": "CVE-2025-38565", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38565" }, { "name": "CVE-2022-50439", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50439" }, { "name": "CVE-2025-38710", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38710" }, { "name": "CVE-2023-53304", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53304" }, { "name": "CVE-2025-39681", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39681" }, { "name": "CVE-2023-53216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53216" }, { "name": "CVE-2025-39770", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39770" }, { "name": "CVE-2023-53339", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53339" }, { "name": "CVE-2023-53239", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53239" }, { "name": "CVE-2023-53280", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53280" }, { "name": "CVE-2025-38705", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38705" }, { "name": "CVE-2023-53179", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53179" }, { "name": "CVE-2022-50434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50434" }, { "name": "CVE-2025-38706", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38706" }, { "name": "CVE-2022-50234", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50234" }, { "name": "CVE-2025-39750", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39750" }, { "name": "CVE-2025-38587", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38587" }, { "name": "CVE-2023-53520", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53520" }, { "name": "CVE-2022-50353", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50353" }, { "name": "CVE-2023-53493", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53493" }, { "name": "CVE-2022-49975", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49975" }, { "name": "CVE-2022-50404", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50404" }, { "name": "CVE-2023-53492", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53492" }, { "name": "CVE-2023-31248", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31248" }, { "name": "CVE-2022-50360", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50360" }, { "name": "CVE-2023-53388", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53388" }, { "name": "CVE-2025-39853", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39853" }, { "name": "CVE-2025-38555", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38555" }, { "name": "CVE-2023-53221", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53221" }, { "name": "CVE-2022-50264", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50264" }, { "name": "CVE-2025-39871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39871" }, { "name": "CVE-2025-39857", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39857" }, { "name": "CVE-2022-50452", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50452" }, { "name": "CVE-2022-50320", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50320" }, { "name": "CVE-2025-38590", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38590" }, { "name": "CVE-2025-38709", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38709" }, { "name": "CVE-2022-50286", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50286" }, { "name": "CVE-2022-50449", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50449" }, { "name": "CVE-2023-53431", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53431" }, { "name": "CVE-2022-50324", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50324" }, { "name": "CVE-2024-58090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58090" }, { "name": "CVE-2023-53462", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53462" }, { "name": "CVE-2025-39865", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39865" }, { "name": "CVE-2025-39816", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39816" }, { "name": "CVE-2025-38584", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38584" }, { "name": "CVE-2025-39675", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39675" }, { "name": "CVE-2025-39679", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39679" }, { "name": "CVE-2025-38527", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38527" }, { "name": "CVE-2025-37958", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37958" }, { "name": "CVE-2022-50447", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50447" }, { "name": "CVE-2022-50251", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50251" }, { "name": "CVE-2025-39763", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39763" }, { "name": "CVE-2023-53148", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53148" }, { "name": "CVE-2025-38693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38693" }, { "name": "CVE-2025-38679", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38679" }, { "name": "CVE-2025-38459", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38459" }, { "name": "CVE-2022-50373", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50373" }, { "name": "CVE-2023-53505", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53505" }, { "name": "CVE-2025-38685", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38685" }, { "name": "CVE-2022-50269", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50269" }, { "name": "CVE-2023-53275", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53275" }, { "name": "CVE-2022-50437", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50437" }, { "name": "CVE-2022-50391", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50391" }, { "name": "CVE-2023-53476", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53476" }, { "name": "CVE-2025-38184", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38184" }, { "name": "CVE-2023-53468", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53468" }, { "name": "CVE-2022-50261", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50261" }, { "name": "CVE-2022-50351", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50351" }, { "name": "CVE-2022-50272", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50272" }, { "name": "CVE-2022-50331", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50331" }, { "name": "CVE-2025-39838", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39838" }, { "name": "CVE-2025-39823", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39823" }, { "name": "CVE-2025-38234", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38234" }, { "name": "CVE-2024-50154", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50154" }, { "name": "CVE-2025-38634", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38634" }, { "name": "CVE-2023-53183", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53183" }, { "name": "CVE-2023-53195", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53195" }, { "name": "CVE-2023-53232", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53232" }, { "name": "CVE-2025-39864", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39864" }, { "name": "CVE-2025-38458", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38458" }, { "name": "CVE-2025-39730", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39730" }, { "name": "CVE-2025-38011", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38011" }, { "name": "CVE-2022-50268", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50268" }, { "name": "CVE-2022-36280", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36280" }, { "name": "CVE-2023-53319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53319" }, { "name": "CVE-2022-50444", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50444" }, { "name": "CVE-2025-39824", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39824" }, { "name": "CVE-2023-53515", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53515" }, { "name": "CVE-2023-53420", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53420" }, { "name": "CVE-2023-53424", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53424" }, { "name": "CVE-2025-38464", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38464" }, { "name": "CVE-2023-53241", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53241" }, { "name": "CVE-2023-53305", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53305" }, { "name": "CVE-2023-42753", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42753" }, { "name": "CVE-2025-38702", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38702" }, { "name": "CVE-2023-53177", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53177" }, { "name": "CVE-2023-53381", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53381" }, { "name": "CVE-2023-53369", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53369" }, { "name": "CVE-2025-38724", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38724" }, { "name": "CVE-2022-50419", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50419" }, { "name": "CVE-2025-38582", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38582" }, { "name": "CVE-2023-53332", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53332" }, { "name": "CVE-2025-38543", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38543" }, { "name": "CVE-2025-38698", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38698" }, { "name": "CVE-2023-53328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53328" }, { "name": "CVE-2022-50289", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50289" }, { "name": "CVE-2022-50329", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50329" }, { "name": "CVE-2025-39842", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39842" }, { "name": "CVE-2025-39739", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39739" }, { "name": "CVE-2023-53165", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53165" }, { "name": "CVE-2023-53270", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53270" }, { "name": "CVE-2025-38419", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38419" }, { "name": "CVE-2025-38533", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38533" }, { "name": "CVE-2023-53284", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53284" }, { "name": "CVE-2022-50265", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50265" }, { "name": "CVE-2025-38537", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38537" }, { "name": "CVE-2025-39849", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39849" }, { "name": "CVE-2025-38546", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38546" }, { "name": "CVE-2022-50409", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50409" }, { "name": "CVE-2022-50453", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50453" }, { "name": "CVE-2023-53512", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53512" }, { "name": "CVE-2022-50418", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50418" }, { "name": "CVE-2023-53438", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53438" }, { "name": "CVE-2023-53238", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53238" }, { "name": "CVE-2025-21791", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791" }, { "name": "CVE-2025-39861", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39861" }, { "name": "CVE-2022-50253", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50253" }, { "name": "CVE-2022-50405", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50405" }, { "name": "CVE-2025-38251", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38251" }, { "name": "CVE-2023-53378", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53378" }, { "name": "CVE-2025-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38597" }, { "name": "CVE-2025-39743", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39743" }, { "name": "CVE-2025-39718", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39718" }, { "name": "CVE-2022-50333", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50333" }, { "name": "CVE-2025-38712", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38712" }, { "name": "CVE-2025-38732", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38732" }, { "name": "CVE-2025-39773", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39773" }, { "name": "CVE-2023-53360", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53360" }, { "name": "CVE-2025-39885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39885" }, { "name": "CVE-2023-53336", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53336" }, { "name": "CVE-2023-53426", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53426" }, { "name": "CVE-2023-53370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53370" }, { "name": "CVE-2022-50330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50330" }, { "name": "CVE-2023-53223", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53223" }, { "name": "CVE-2022-2602", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2602" }, { "name": "CVE-2025-38632", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38632" }, { "name": "CVE-2022-50309", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50309" }, { "name": "CVE-2025-38548", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38548" }, { "name": "CVE-2023-53448", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53448" }, { "name": "CVE-2023-53308", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53308" }, { "name": "CVE-2023-53374", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53374" }, { "name": "CVE-2023-53384", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53384" }, { "name": "CVE-2025-38014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38014" }, { "name": "CVE-2022-50297", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50297" }, { "name": "CVE-2025-38727", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38727" }, { "name": "CVE-2025-38465", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38465" }, { "name": "CVE-2022-50435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50435" }, { "name": "CVE-2025-38513", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38513" }, { "name": "CVE-2022-50411", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50411" }, { "name": "CVE-2022-50465", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50465" }, { "name": "CVE-2022-50346", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50346" }, { "name": "CVE-2025-38670", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38670" }, { "name": "CVE-2025-39732", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39732" }, { "name": "CVE-2023-53458", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53458" }, { "name": "CVE-2022-50393", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50393" }, { "name": "CVE-2023-53367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53367" }, { "name": "CVE-2025-38602", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38602" }, { "name": "CVE-2022-50417", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50417" }, { "name": "CVE-2023-53326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53326" }, { "name": "CVE-2025-38441", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38441" }, { "name": "CVE-2023-53457", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53457" }, { "name": "CVE-2025-39845", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39845" }, { "name": "CVE-2023-53230", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53230" }, { "name": "CVE-2023-53397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53397" }, { "name": "CVE-2023-53171", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53171" }, { "name": "CVE-2025-38568", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38568" }, { "name": "CVE-2023-53489", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53489" }, { "name": "CVE-2022-50370", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50370" }, { "name": "CVE-2025-38583", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38583" }, { "name": "CVE-2023-53516", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53516" }, { "name": "CVE-2023-53474", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53474" }, { "name": "CVE-2025-38499", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38499" }, { "name": "CVE-2025-38735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38735" }, { "name": "CVE-2022-50247", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50247" }, { "name": "CVE-2025-38402", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38402" }, { "name": "CVE-2022-50325", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50325" }, { "name": "CVE-2022-50355", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50355" }, { "name": "CVE-2023-53400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53400" }, { "name": "CVE-2022-50292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50292" }, { "name": "CVE-2023-53287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53287" }, { "name": "CVE-2025-38616", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38616" }, { "name": "CVE-2025-37738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738" }, { "name": "CVE-2022-50406", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50406" }, { "name": "CVE-2025-38119", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38119" }, { "name": "CVE-2025-38245", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38245" }, { "name": "CVE-2025-38656", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38656" }, { "name": "CVE-2022-50454", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50454" }, { "name": "CVE-2023-53350", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53350" }, { "name": "CVE-2025-38614", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38614" }, { "name": "CVE-2022-50354", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50354" }, { "name": "CVE-2022-50249", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50249" }, { "name": "CVE-2023-53237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53237" }, { "name": "CVE-2025-38664", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38664" }, { "name": "CVE-2023-53454", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53454" }, { "name": "CVE-2023-53471", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53471" }, { "name": "CVE-2023-53182", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53182" }, { "name": "CVE-2025-38541", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38541" }, { "name": "CVE-2023-53416", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53416" }, { "name": "CVE-2022-50344", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50344" }, { "name": "CVE-2023-53322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53322" }, { "name": "CVE-2023-53220", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53220" }, { "name": "CVE-2023-53272", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53272" }, { "name": "CVE-2022-50388", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50388" }, { "name": "CVE-2023-53178", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53178" }, { "name": "CVE-2023-53210", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53210" }, { "name": "CVE-2025-38694", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38694" }, { "name": "CVE-2021-4460", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4460" }, { "name": "CVE-2023-3772", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3772" }, { "name": "CVE-2023-53259", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53259" }, { "name": "CVE-2025-38676", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38676" }, { "name": "CVE-2025-38530", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38530" }, { "name": "CVE-2024-26583", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26583" }, { "name": "CVE-2022-50318", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50318" }, { "name": "CVE-2023-53413", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53413" }, { "name": "CVE-2022-50389", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50389" }, { "name": "CVE-2023-53528", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53528" }, { "name": "CVE-2023-53524", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53524" }, { "name": "CVE-2023-53496", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53496" }, { "name": "CVE-2025-38729", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38729" }, { "name": "CVE-2023-53257", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53257" }, { "name": "CVE-2022-50390", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50390" }, { "name": "CVE-2023-53523", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53523" }, { "name": "CVE-2022-50359", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50359" }, { "name": "CVE-2023-53357", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53357" }, { "name": "CVE-2025-38681", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38681" }, { "name": "CVE-2025-38593", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38593" }, { "name": "CVE-2022-50285", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50285" }, { "name": "CVE-2022-2978", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2978" }, { "name": "CVE-2025-38687", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38687" }, { "name": "CVE-2022-49980", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49980" }, { "name": "CVE-2023-53335", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53335" }, { "name": "CVE-2023-53488", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53488" }, { "name": "CVE-2023-53464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53464" }, { "name": "CVE-2025-38111", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38111" }, { "name": "CVE-2023-53334", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53334" }, { "name": "CVE-2022-43945", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43945" }, { "name": "CVE-2023-53356", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53356" }, { "name": "CVE-2025-38529", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38529" }, { "name": "CVE-2023-53510", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53510" }, { "name": "CVE-2023-53151", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53151" }, { "name": "CVE-2025-38715", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38715" }, { "name": "CVE-2025-38089", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38089" }, { "name": "CVE-2022-50352", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50352" }, { "name": "CVE-2025-38608", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38608" }, { "name": "CVE-2025-38650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38650" }, { "name": "CVE-2025-39710", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39710" }, { "name": "CVE-2023-53215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53215" }, { "name": "CVE-2022-50342", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50342" }, { "name": "CVE-2023-53288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53288" }, { "name": "CVE-2024-26584", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26584" }, { "name": "CVE-2023-53406", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53406" }, { "name": "CVE-2025-38621", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38621" }, { "name": "CVE-2023-53352", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53352" }, { "name": "CVE-2025-38160", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38160" }, { "name": "CVE-2023-1380", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1380" }, { "name": "CVE-2023-53291", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53291" }, { "name": "CVE-2022-50408", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50408" }, { "name": "CVE-2025-38528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38528" }, { "name": "CVE-2022-50399", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50399" }, { "name": "CVE-2022-50372", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50372" }, { "name": "CVE-2025-39834", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39834" }, { "name": "CVE-2022-50431", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50431" }, { "name": "CVE-2022-50357", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50357" }, { "name": "CVE-2023-53263", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53263" }, { "name": "CVE-2023-53527", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53527" }, { "name": "CVE-2022-50303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50303" }, { "name": "CVE-2025-38713", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38713" }, { "name": "CVE-2023-53404", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53404" }, { "name": "CVE-2025-38556", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38556" }, { "name": "CVE-2025-38678", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38678" }, { "name": "CVE-2023-53344", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53344" }, { "name": "CVE-2023-53324", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53324" }, { "name": "CVE-2023-53465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53465" }, { "name": "CVE-2022-50468", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50468" }, { "name": "CVE-2025-39810", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39810" }, { "name": "CVE-2025-39782", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39782" }, { "name": "CVE-2025-38075", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38075" }, { "name": "CVE-2025-37885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885" }, { "name": "CVE-2023-53368", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53368" }, { "name": "CVE-2025-38697", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38697" }, { "name": "CVE-2022-50282", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50282" }, { "name": "CVE-2025-38691", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38691" }, { "name": "CVE-2023-53276", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53276" }, { "name": "CVE-2025-39759", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39759" }, { "name": "CVE-2025-38617", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38617" }, { "name": "CVE-2025-38639", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38639" }, { "name": "CVE-2025-38628", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38628" }, { "name": "CVE-2023-53518", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53518" }, { "name": "CVE-2025-38612", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38612" }, { "name": "CVE-2022-50250", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50250" }, { "name": "CVE-2023-53466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53466" }, { "name": "CVE-2023-53168", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53168" }, { "name": "CVE-2025-39860", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39860" }, { "name": "CVE-2025-21692", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21692" }, { "name": "CVE-2022-50347", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50347" }, { "name": "CVE-2025-39754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39754" }, { "name": "CVE-2023-53506", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53506" }, { "name": "CVE-2025-38566", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38566" }, { "name": "CVE-2025-39721", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39721" }, { "name": "CVE-2023-53398", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53398" }, { "name": "CVE-2025-39760", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39760" }, { "name": "CVE-2023-53149", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53149" }, { "name": "CVE-2022-50443", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50443" }, { "name": "CVE-2025-38663", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38663" }, { "name": "CVE-2023-53409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53409" }, { "name": "CVE-2023-53396", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53396" }, { "name": "CVE-2022-50260", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50260" }, { "name": "CVE-2025-39839", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39839" }, { "name": "CVE-2023-53282", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53282" }, { "name": "CVE-2025-39848", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39848" }, { "name": "CVE-2025-38722", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38722" }, { "name": "CVE-2025-39800", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39800" }, { "name": "CVE-2023-53435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53435" }, { "name": "CVE-2022-50328", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50328" }, { "name": "CVE-2023-53391", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53391" }, { "name": "CVE-2023-53487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53487" }, { "name": "CVE-2022-50267", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50267" }, { "name": "CVE-2023-53437", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53437" }, { "name": "CVE-2022-50317", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50317" }, { "name": "CVE-2025-39703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39703" }, { "name": "CVE-2023-53250", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53250" }, { "name": "CVE-2023-53338", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53338" }, { "name": "CVE-2025-38665", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38665" }, { "name": "CVE-2022-50235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50235" }, { "name": "CVE-2025-38671", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38671" }, { "name": "CVE-2023-53231", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53231" }, { "name": "CVE-2023-53206", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53206" }, { "name": "CVE-2022-50364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50364" }, { "name": "CVE-2025-38635", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38635" }, { "name": "CVE-2022-50276", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50276" }, { "name": "CVE-2023-53432", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53432" }, { "name": "CVE-2025-38488", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38488" }, { "name": "CVE-2022-50464", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50464" }, { "name": "CVE-2023-3867", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3867" }, { "name": "CVE-2022-50401", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50401" }, { "name": "CVE-2025-38540", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38540" }, { "name": "CVE-2022-50376", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50376" }, { "name": "CVE-2025-39825", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39825" }, { "name": "CVE-2023-53422", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53422" }, { "name": "CVE-2023-53383", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53383" }, { "name": "CVE-2023-53244", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53244" }, { "name": "CVE-2022-50275", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50275" }, { "name": "CVE-2023-53373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53373" }, { "name": "CVE-2022-50287", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50287" }, { "name": "CVE-2023-53375", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53375" }, { "name": "CVE-2025-39882", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39882" }, { "name": "CVE-2025-39766", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39766" }, { "name": "CVE-2025-39801", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39801" }, { "name": "CVE-2022-50308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50308" }, { "name": "CVE-2023-53530", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53530" }, { "name": "CVE-2025-38146", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38146" }, { "name": "CVE-2023-53197", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53197" }, { "name": "CVE-2025-39724", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39724" }, { "name": "CVE-2025-38510", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38510" }, { "name": "CVE-2025-39758", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39758" }, { "name": "CVE-2025-39694", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39694" }, { "name": "CVE-2025-38418", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38418" }, { "name": "CVE-2025-40300", "url": "https://www.cve.org/CVERecord?id=CVE-2025-40300" }, { "name": "CVE-2023-53401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53401" }, { "name": "CVE-2023-53229", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53229" }, { "name": "CVE-2025-39806", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39806" }, { "name": "CVE-2022-50414", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50414" }, { "name": "CVE-2023-53521", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53521" }, { "name": "CVE-2023-53479", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53479" }, { "name": "CVE-2025-38668", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38668" }, { "name": "CVE-2025-38721", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38721" }, { "name": "CVE-2023-53313", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53313" }, { "name": "CVE-2023-53395", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53395" }, { "name": "CVE-2025-39684", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39684" }, { "name": "CVE-2022-50339", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50339" }, { "name": "CVE-2022-50436", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50436" }, { "name": "CVE-2022-50271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50271" }, { "name": "CVE-2025-38526", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38526" }, { "name": "CVE-2023-53485", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53485" }, { "name": "CVE-2025-38472", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38472" }, { "name": "CVE-2025-38506", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38506" }, { "name": "CVE-2025-38703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38703" }, { "name": "CVE-2025-39870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39870" }, { "name": "CVE-2022-50241", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50241" }, { "name": "CVE-2025-39807", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39807" }, { "name": "CVE-2022-50258", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50258" }, { "name": "CVE-2025-38604", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38604" }, { "name": "CVE-2025-38623", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38623" }, { "name": "CVE-2023-53365", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53365" }, { "name": "CVE-2025-22022", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22022" }, { "name": "CVE-2025-38544", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38544" }, { "name": "CVE-2025-39922", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39922" }, { "name": "CVE-2025-39797", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39797" }, { "name": "CVE-2025-38725", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38725" }, { "name": "CVE-2023-53184", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53184" }, { "name": "CVE-2022-50365", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50365" }, { "name": "CVE-2025-38006", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38006" }, { "name": "CVE-2022-50312", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50312" }, { "name": "CVE-2023-53196", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53196" }, { "name": "CVE-2025-38125", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38125" }, { "name": "CVE-2023-53501", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53501" }, { "name": "CVE-2025-38351", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38351" }, { "name": "CVE-2025-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38477" }, { "name": "CVE-2022-50340", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50340" }, { "name": "CVE-2023-53331", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53331" }, { "name": "CVE-2024-46733", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46733" }, { "name": "CVE-2025-38683", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38683" }, { "name": "CVE-2023-53440", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53440" }, { "name": "CVE-2025-39846", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39846" }, { "name": "CVE-2022-50374", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50374" }, { "name": "CVE-2022-50375", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50375" }, { "name": "CVE-2024-58239", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58239" }, { "name": "CVE-2022-50460", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50460" }, { "name": "CVE-2023-53307", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53307" }, { "name": "CVE-2023-53152", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53152" }, { "name": "CVE-2025-38185", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38185" }, { "name": "CVE-2025-39691", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39691" }, { "name": "CVE-2025-39850", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39850" }, { "name": "CVE-2023-53442", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53442" }, { "name": "CVE-2025-39890", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39890" }, { "name": "CVE-2025-39844", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39844" }, { "name": "CVE-2025-39742", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39742" }, { "name": "CVE-2023-53286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53286" }, { "name": "CVE-2023-53207", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53207" }, { "name": "CVE-2025-38605", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38605" }, { "name": "CVE-2022-50362", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50362" }, { "name": "CVE-2023-53205", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53205" }, { "name": "CVE-2025-38263", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38263" }, { "name": "CVE-2025-38610", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38610" }, { "name": "CVE-2025-39863", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39863" }, { "name": "CVE-2023-53180", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53180" }, { "name": "CVE-2025-38560", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38560" }, { "name": "CVE-2023-53385", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53385" }, { "name": "CVE-2023-53226", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53226" }, { "name": "CVE-2023-53525", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53525" }, { "name": "CVE-2025-38701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38701" }, { "name": "CVE-2024-58240", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58240" }, { "name": "CVE-2023-53249", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53249" }, { "name": "CVE-2023-53252", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53252" }, { "name": "CVE-2023-53261", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53261" }, { "name": "CVE-2022-50396", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50396" }, { "name": "CVE-2025-39726", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39726" }, { "name": "CVE-2023-53246", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53246" }, { "name": "CVE-2024-53168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53168" }, { "name": "CVE-2023-53364", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53364" }, { "name": "CVE-2022-50423", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50423" }, { "name": "CVE-2025-38618", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38618" }, { "name": "CVE-2022-50239", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50239" }, { "name": "CVE-2023-53532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53532" }, { "name": "CVE-2022-50348", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50348" }, { "name": "CVE-2023-53508", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53508" }, { "name": "CVE-2025-38581", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38581" }, { "name": "CVE-2023-53213", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53213" }, { "name": "CVE-2023-53526", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53526" }, { "name": "CVE-2025-39891", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39891" }, { "name": "CVE-2025-39790", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39790" }, { "name": "CVE-2023-53255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53255" }, { "name": "CVE-2023-53277", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53277" }, { "name": "CVE-2025-38680", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38680" }, { "name": "CVE-2023-53379", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53379" }, { "name": "CVE-2025-38684", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38684" }, { "name": "CVE-2025-39686", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39686" }, { "name": "CVE-2025-39798", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39798" }, { "name": "CVE-2025-38730", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38730" }, { "name": "CVE-2023-4515", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4515" }, { "name": "CVE-2025-39747", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39747" }, { "name": "CVE-2023-53343", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53343" }, { "name": "CVE-2023-53299", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53299" }, { "name": "CVE-2023-53268", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53268" }, { "name": "CVE-2025-38516", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38516" }, { "name": "CVE-2023-53204", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53204" }, { "name": "CVE-2025-39714", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39714" }, { "name": "CVE-2023-53333", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53333" }, { "name": "CVE-2022-50394", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50394" }, { "name": "CVE-2023-53456", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53456" }, { "name": "CVE-2022-50266", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50266" }, { "name": "CVE-2023-53446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53446" }, { "name": "CVE-2023-53463", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53463" }, { "name": "CVE-2023-53170", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53170" }, { "name": "CVE-2023-53260", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53260" }, { "name": "CVE-2025-39854", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39854" }, { "name": "CVE-2023-53386", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53386" }, { "name": "CVE-2025-39706", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39706" }, { "name": "CVE-2025-39830", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39830" }, { "name": "CVE-2025-38576", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38576" }, { "name": "CVE-2025-39869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39869" }, { "name": "CVE-2023-53181", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53181" }, { "name": "CVE-2023-53174", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53174" }, { "name": "CVE-2025-38439", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38439" }, { "name": "CVE-2025-39719", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39719" }, { "name": "CVE-2025-39695", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39695" }, { "name": "CVE-2023-53254", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53254" }, { "name": "CVE-2022-50430", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50430" }, { "name": "CVE-2025-38553", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38553" }, { "name": "CVE-2025-38190", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38190" }, { "name": "CVE-2025-39738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39738" }, { "name": "CVE-2023-53295", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53295" }, { "name": "CVE-2023-53298", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53298" }, { "name": "CVE-2025-38205", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38205" }, { "name": "CVE-2023-53507", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53507" }, { "name": "CVE-2023-53314", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53314" }, { "name": "CVE-2023-53281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53281" }, { "name": "CVE-2023-53330", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53330" }, { "name": "CVE-2025-39705", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39705" }, { "name": "CVE-2022-50422", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50422" }, { "name": "CVE-2022-50252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50252" }, { "name": "CVE-2025-39713", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39713" }, { "name": "CVE-2023-53316", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53316" }, { "name": "CVE-2022-50412", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50412" }, { "name": "CVE-2022-50299", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50299" }, { "name": "CVE-2023-53208", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53208" }, { "name": "CVE-2025-39744", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39744" }, { "name": "CVE-2023-53315", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53315" }, { "name": "CVE-2025-38736", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38736" }, { "name": "CVE-2023-53297", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53297" }, { "name": "CVE-2023-53499", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53499" }, { "name": "CVE-2023-53234", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53234" }, { "name": "CVE-2025-21969", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969" }, { "name": "CVE-2023-53167", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53167" }, { "name": "CVE-2023-53342", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53342" }, { "name": "CVE-2025-39678", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39678" }, { "name": "CVE-2023-53414", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53414" }, { "name": "CVE-2025-38531", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38531" }, { "name": "CVE-2023-53265", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53265" }, { "name": "CVE-2025-39693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39693" }, { "name": "CVE-2022-50246", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50246" }, { "name": "CVE-2025-38503", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38503" }, { "name": "CVE-2025-38630", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38630" }, { "name": "CVE-2023-53490", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53490" }, { "name": "CVE-2023-53302", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53302" }, { "name": "CVE-2023-53482", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53482" }, { "name": "CVE-2023-53444", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53444" }, { "name": "CVE-2023-53175", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53175" }, { "name": "CVE-2022-50392", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50392" }, { "name": "CVE-2025-38585", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38585" }, { "name": "CVE-2022-50233", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50233" }, { "name": "CVE-2023-53274", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53274" }, { "name": "CVE-2025-39682", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39682" }, { "name": "CVE-2022-50410", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50410" }, { "name": "CVE-2022-50428", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50428" }, { "name": "CVE-2023-39197", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39197" }, { "name": "CVE-2025-39833", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39833" }, { "name": "CVE-2025-39832", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39832" }, { "name": "CVE-2023-53495", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53495" }, { "name": "CVE-2023-53436", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53436" }, { "name": "CVE-2022-50402", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50402" }, { "name": "CVE-2025-38643", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38643" }, { "name": "CVE-2022-50427", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50427" }, { "name": "CVE-2022-50278", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50278" }, { "name": "CVE-2023-53273", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53273" }, { "name": "CVE-2023-53377", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53377" }, { "name": "CVE-2023-53500", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53500" }, { "name": "CVE-2025-38103", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38103" }, { "name": "CVE-2025-39847", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39847" }, { "name": "CVE-2025-38514", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38514" }, { "name": "CVE-2025-38360", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38360" }, { "name": "CVE-2025-39783", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39783" }, { "name": "CVE-2025-39835", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39835" }, { "name": "CVE-2025-38255", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38255" }, { "name": "CVE-2025-38512", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38512" }, { "name": "CVE-2025-38622", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38622" }, { "name": "CVE-2022-50279", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50279" }, { "name": "CVE-2023-53243", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53243" }, { "name": "CVE-2023-53348", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53348" }, { "name": "CVE-2023-53219", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53219" }, { "name": "CVE-2022-50467", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50467" }, { "name": "CVE-2023-53428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53428" }, { "name": "CVE-2025-39677", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39677" }, { "name": "CVE-2022-50440", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50440" }, { "name": "CVE-2025-39707", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39707" }, { "name": "CVE-2022-50248", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50248" }, { "name": "CVE-2025-39907", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39907" }, { "name": "CVE-2023-53147", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53147" }, { "name": "CVE-2023-53292", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53292" }, { "name": "CVE-2025-38640", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38640" }, { "name": "CVE-2023-53371", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53371" }, { "name": "CVE-2025-38659", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38659" }, { "name": "CVE-2022-50311", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50311" }, { "name": "CVE-2024-53125", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53125" }, { "name": "CVE-2025-38572", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38572" }, { "name": "CVE-2022-50381", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50381" }, { "name": "CVE-2023-53187", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53187" }, { "name": "CVE-2025-38550", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38550" }, { "name": "CVE-2023-53201", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53201" }, { "name": "CVE-2025-39711", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39711" }, { "name": "CVE-2022-50385", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50385" }, { "name": "CVE-2025-38535", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38535" }, { "name": "CVE-2025-39873", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39873" }, { "name": "CVE-2022-50459", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50459" }, { "name": "CVE-2023-53192", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53192" }, { "name": "CVE-2022-50277", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50277" }, { "name": "CVE-2025-38714", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38714" }, { "name": "CVE-2023-53251", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53251" }, { "name": "CVE-2024-53093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53093" }, { "name": "CVE-2023-53337", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53337" }, { "name": "CVE-2023-53380", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53380" }, { "name": "CVE-2023-53452", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53452" }, { "name": "CVE-2022-50369", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50369" }, { "name": "CVE-2023-53153", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53153" } ], "initial_release_date": "2025-10-17T00:00:00", "last_revision_date": "2025-10-17T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0895", "revisions": [ { "description": "Version initiale", "revision_date": "2025-10-17T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE", "vendor_advisories": [ { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03615-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503615-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03553-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503553-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03557-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503557-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03539-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503539-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03543-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503543-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03580-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503580-1" }, { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03613-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503613-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03600-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503600-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03602-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503602-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03561-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503561-1" }, { "published_at": "2025-10-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03614-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503614-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03567-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503567-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03554-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503554-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03576-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503576-1" }, { "published_at": "2025-10-17", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03626-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503626-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03548-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503548-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03551-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503551-1" }, { "published_at": "2025-10-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03601-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503601-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03578-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503578-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03575-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503575-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03562-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503562-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03572-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503572-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03550-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503550-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03568-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503568-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03569-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503569-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03563-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503563-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03566-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503566-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03555-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503555-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03529-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503529-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03538-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503538-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03571-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503571-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03559-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503559-1" }, { "published_at": "2025-10-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03528-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503528-1" }, { "published_at": "2025-10-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03583-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503583-1" }, { "published_at": "2025-10-11", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03552-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503552-1" }, { "published_at": "2025-10-12", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:03577-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503577-1" } ] }
fkie_cve-2023-53431
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/05143d90ac90b7abc6692285895a1ef460e008ee | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/110d425cdfb15006f3c4fde5264e786a247b6b36 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/176d7345b89ced72020a313bfa4e7f345d1c3aed | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/4e7c498c3713b09bef20c76c7319555637e8bbd5 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/c8e22b7a1694bb8d025ea636816472739d859145 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/eabc4872f172ecb8dd8536bc366a51868154a450 | ||
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/f8e702c54413eee2d8f94f61d18adadac7c87e87 |
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ses: Handle enclosure with just a primary component gracefully\n\nThis reverts commit 3fe97ff3d949 (\"scsi: ses: Don\u0027t attach if enclosure\nhas no components\") and introduces proper handling of case where there are\nno detected secondary components, but primary component (enumerated in\nnum_enclosures) does exist. That fix was originally proposed by Ding Hui\n\u003cdinghui@sangfor.com.cn\u003e.\n\nCompletely ignoring devices that have one primary enclosure and no\nsecondary one results in ses_intf_add() bailing completely\n\n\tscsi 2:0:0:254: enclosure has no enumerated components\n scsi 2:0:0:254: Failed to bind enclosure -12ven in valid configurations such\n\neven on valid configurations with 1 primary and 0 secondary enclosures as\nbelow:\n\n\t# sg_ses /dev/sg0\n\t 3PARdata SES 3321\n\tSupported diagnostic pages:\n\t Supported Diagnostic Pages [sdp] [0x0]\n\t Configuration (SES) [cf] [0x1]\n\t Short Enclosure Status (SES) [ses] [0x8]\n\t# sg_ses -p cf /dev/sg0\n\t 3PARdata SES 3321\n\tConfiguration diagnostic page:\n\t number of secondary subenclosures: 0\n\t generation code: 0x0\n\t enclosure descriptor list\n\t Subenclosure identifier: 0 [primary]\n\t relative ES process id: 0, number of ES processes: 1\n\t number of type descriptor headers: 1\n\t enclosure logical identifier (hex): 20000002ac02068d\n\t enclosure vendor: 3PARdata product: VV rev: 3321\n\t type descriptor header and text list\n\t Element type: Unspecified, subenclosure id: 0\n\t number of possible elements: 1\n\nThe changelog for the original fix follows\n\n=====\nWe can get a crash when disconnecting the iSCSI session,\nthe call trace like this:\n\n [ffff00002a00fb70] kfree at ffff00000830e224\n [ffff00002a00fba0] ses_intf_remove at ffff000001f200e4\n [ffff00002a00fbd0] device_del at ffff0000086b6a98\n [ffff00002a00fc50] device_unregister at ffff0000086b6d58\n [ffff00002a00fc70] __scsi_remove_device at ffff00000870608c\n [ffff00002a00fca0] scsi_remove_device at ffff000008706134\n [ffff00002a00fcc0] __scsi_remove_target at ffff0000087062e4\n [ffff00002a00fd10] scsi_remove_target at ffff0000087064c0\n [ffff00002a00fd70] __iscsi_unbind_session at ffff000001c872c4\n [ffff00002a00fdb0] process_one_work at ffff00000810f35c\n [ffff00002a00fe00] worker_thread at ffff00000810f648\n [ffff00002a00fe70] kthread at ffff000008116e98\n\nIn ses_intf_add, components count could be 0, and kcalloc 0 size scomp,\nbut not saved in edev-\u003ecomponent[i].scratch\n\nIn this situation, edev-\u003ecomponent[0].scratch is an invalid pointer,\nwhen kfree it in ses_intf_remove_enclosure, a crash like above would happen\nThe call trace also could be other random cases when kfree cannot catch\nthe invalid pointer\n\nWe should not use edev-\u003ecomponent[] array when the components count is 0\nWe also need check index when use edev-\u003ecomponent[] array in\nses_enclosure_data_process\n=====" } ], "id": "CVE-2023-53431", "lastModified": "2025-10-01T08:15:30.747", "metrics": {}, "published": "2025-09-18T16:15:47.070", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/05143d90ac90b7abc6692285895a1ef460e008ee" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/110d425cdfb15006f3c4fde5264e786a247b6b36" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/176d7345b89ced72020a313bfa4e7f345d1c3aed" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/4e7c498c3713b09bef20c76c7319555637e8bbd5" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/c8e22b7a1694bb8d025ea636816472739d859145" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/eabc4872f172ecb8dd8536bc366a51868154a450" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/f8e702c54413eee2d8f94f61d18adadac7c87e87" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
ghsa-36rm-q238-p59m
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
scsi: ses: Don't attach if enclosure has no components
An enclosure with no components can't usefully be operated by the driver (since effectively it has nothing to manage), so report the problem and don't attach. Not attaching also fixes an oops which could occur if the driver tries to manage a zero component enclosure.
[mkp: Switched to KERN_WARNING since this scenario is common]
{ "affected": [], "aliases": [ "CVE-2023-53431" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-09-18T16:15:47Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ses: Don\u0027t attach if enclosure has no components\n\nAn enclosure with no components can\u0027t usefully be operated by the driver\n(since effectively it has nothing to manage), so report the problem and\ndon\u0027t attach. Not attaching also fixes an oops which could occur if the\ndriver tries to manage a zero component enclosure.\n\n[mkp: Switched to KERN_WARNING since this scenario is common]", "id": "GHSA-36rm-q238-p59m", "modified": "2025-10-01T09:30:24Z", "published": "2025-09-18T18:30:28Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53431" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/05143d90ac90b7abc6692285895a1ef460e008ee" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/110d425cdfb15006f3c4fde5264e786a247b6b36" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/176d7345b89ced72020a313bfa4e7f345d1c3aed" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/3fe97ff3d94934649abb0652028dd7296170c8d0" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/4863fefc8a8cc8e8f6c7635b12d9dffaa0a12d86" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/4e7c498c3713b09bef20c76c7319555637e8bbd5" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/5ca5470b33e5221dd3e5be81108697c22dd38b56" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/6069e04a922a0488bcf4f1017d38d18afda8194c" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/6fce2307650a190e343a84537c278d499fa37c26" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/c8e22b7a1694bb8d025ea636816472739d859145" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/d68937dfc73ee7f61cf3424fa3225be93cacaa00" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/eabc4872f172ecb8dd8536bc366a51868154a450" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f182ad02024d3f45374a9e0c9d76f28b776d762d" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f8e702c54413eee2d8f94f61d18adadac7c87e87" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/feefd5232ecb788f0666f75893a7a86faec8bbcc" } ], "schema_version": "1.4.0", "severity": [] }
wid-sec-w-2025-2092
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und um nicht n\u00e4here beschriebene Effekte zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-2092 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2092.json" }, { "category": "self", "summary": "WID-SEC-2025-2092 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2092" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50375", "url": "https://lore.kernel.org/linux-cve-announce/2025091848-CVE-2022-50375-2409@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50376", "url": "https://lore.kernel.org/linux-cve-announce/2025091850-CVE-2022-50376-1398@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50377", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50377-f43b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50378", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50378-4c78@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50379", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50379-a7c6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50380", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50380-25c9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50381", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50381-b83f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50382", "url": "https://lore.kernel.org/linux-cve-announce/2025091851-CVE-2022-50382-0ff0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50383", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50383-e1c7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50384", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50384-b652@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50385", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50385-7787@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50386", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50386-07d7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50387", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50387-cd0d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50388", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50388-02a2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50389", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50389-17eb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50390", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50390-742c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50391", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50391-7caa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50392", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50392-967e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50393", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50393-d5da@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50394", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50394-fcaa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50395", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50395-344c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50396", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50396-8b1b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50397", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50397-44b6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50398", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50398-1502@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50399", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50399-6051@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50400", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2022-50400-d99e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50401", "url": "https://lore.kernel.org/linux-cve-announce/2025091850-CVE-2022-50401-814e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50402", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50402-4c96@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50403", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50403-0471@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50404", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50404-5db4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50405", "url": "https://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50405-8450@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50406", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50406-8797@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50407", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50407-e539@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50408", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50408-5835@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50409", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50409-d7dc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50410", "url": "https://lore.kernel.org/linux-cve-announce/2025091853-CVE-2022-50410-edee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50411", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50411-45ab@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50412", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50412-0f2e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50413", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50413-c345@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50414", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50414-a99a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50415", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50415-9bba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50416", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2022-50416-886a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50417", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50417-1a69@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50418", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50418-deac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50419", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2022-50419-23b9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53369", "url": "https://lore.kernel.org/linux-cve-announce/2025091854-CVE-2023-53369-394e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53370", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53370-1085@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53371", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53371-e5f9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53372", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53372-4d9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53373", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53373-087e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53374", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53374-d003@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53375", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53375-a29f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53376", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53376-d18b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53377", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53377-baaf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53378", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53378-3d98@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53379", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53379-a33e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53380", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53380-b2e0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53381", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53381-a774@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53382", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53382-0f75@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53383", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53383-fea9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53384", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53384-042e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53385", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53385-7f7c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53386", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53386-8ab2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53387", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53387-1fb7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53388", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53388-657a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53389", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53389-26a2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53390", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53390-8eb5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53391", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53391-cea3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53392", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53392-9703@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53393", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53393-5e45@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53394", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53394-dd17@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53395", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53395-939e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53396", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53396-27d9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53397", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53397-2076@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53398", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53398-2464@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53399", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53399-316d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53400", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53400-2d47@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53401", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53401-b668@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53402", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53402-4b40@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53403", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53403-a3a3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53404", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53404-29f4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53405", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53405-885a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53406", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53406-d3e0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53407", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53407-6ad0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53408", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53408-5a18@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53409", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53409-818d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53410", "url": "https://lore.kernel.org/linux-cve-announce/2025091801-CVE-2023-53410-4483@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53411", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53411-530b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53412", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53412-cbd2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53413", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53413-f354@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53414", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53414-e790@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53415", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53415-ea27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53416", "url": "https://lore.kernel.org/linux-cve-announce/2025091802-CVE-2023-53416-a008@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53417", "url": "https://lore.kernel.org/linux-cve-announce/2025091803-CVE-2023-53417-caf7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53418", "url": "https://lore.kernel.org/linux-cve-announce/2025091803-CVE-2023-53418-5b61@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53419", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53419-8597@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53420", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53420-e1ce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53421", "url": "https://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53421-0dd9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53422", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53422-8cca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53423", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53423-a5ce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53424", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53424-d5b6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53425", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53425-6eb5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53426", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53426-9553@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53427", "url": "https://lore.kernel.org/linux-cve-announce/2025091856-CVE-2023-53427-f56c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53428", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53428-1448@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53429", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53429-dd4c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53430", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53430-4aaa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53431", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53431-7eac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53432", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53432-bc37@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53433", "url": "https://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53433-fc43@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53434", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53434-243b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53435", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53435-ed57@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53436", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53436-d294@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53437", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53437-7993@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53438", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53438-50e2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53439", "url": "https://lore.kernel.org/linux-cve-announce/2025091858-CVE-2023-53439-b538@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53440", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53440-cd1e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53441", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53441-0641@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53442", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53442-8a1f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53443", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53443-6815@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53444", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53444-41d9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53445", "url": "https://lore.kernel.org/linux-cve-announce/2025091859-CVE-2023-53445-7b18@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53446", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53446-2fcb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53447", "url": "https://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53447-e0ee@gregkh/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15585-1 vom 2025-09-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUHLDYQM4UZOZRCPRIEXRRIGQ4XKRHRT/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:17760 vom 2025-10-13", "url": "https://access.redhat.com/errata/RHSA-2025:17760" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-3038 vom 2025-10-15", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3038.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-111 vom 2025-10-14", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-111.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-17760 vom 2025-10-14", "url": "https://linux.oracle.com/errata/ELSA-2025-17760.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-10-15T22:00:00.000+00:00", "generator": { "date": "2025-10-16T09:43:30.376+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-2092", "initial_release_date": "2025-09-18T22:00:00.000+00:00", "revision_history": [ { "date": "2025-09-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-09-30T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-10-12T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-10-14T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon und Oracle Linux aufgenommen" }, { "date": "2025-10-15T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T034436", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-50375", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50375" }, { "cve": "CVE-2022-50376", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50376" }, { "cve": "CVE-2022-50377", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50377" }, { "cve": "CVE-2022-50378", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50378" }, { "cve": "CVE-2022-50379", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50379" }, { "cve": "CVE-2022-50380", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50380" }, { "cve": "CVE-2022-50381", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50381" }, { "cve": "CVE-2022-50382", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50382" }, { "cve": "CVE-2022-50383", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50383" }, { "cve": "CVE-2022-50384", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50384" }, { "cve": "CVE-2022-50385", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50385" }, { "cve": "CVE-2022-50386", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50386" }, { "cve": "CVE-2022-50387", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50387" }, { "cve": "CVE-2022-50388", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50388" }, { "cve": "CVE-2022-50389", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50389" }, { "cve": "CVE-2022-50390", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50390" }, { "cve": "CVE-2022-50391", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50391" }, { "cve": "CVE-2022-50392", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50392" }, { "cve": "CVE-2022-50393", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50393" }, { "cve": "CVE-2022-50394", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50394" }, { "cve": "CVE-2022-50395", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50395" }, { "cve": "CVE-2022-50396", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50396" }, { "cve": "CVE-2022-50397", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50397" }, { "cve": "CVE-2022-50398", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50398" }, { "cve": "CVE-2022-50399", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50399" }, { "cve": "CVE-2022-50400", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50400" }, { "cve": "CVE-2022-50401", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50401" }, { "cve": "CVE-2022-50402", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50402" }, { "cve": "CVE-2022-50403", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50403" }, { "cve": "CVE-2022-50404", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50404" }, { "cve": "CVE-2022-50405", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50405" }, { "cve": "CVE-2022-50406", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50406" }, { "cve": "CVE-2022-50407", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50407" }, { "cve": "CVE-2022-50408", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50408" }, { "cve": "CVE-2022-50409", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50409" }, { "cve": "CVE-2022-50410", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50410" }, { "cve": "CVE-2022-50411", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50411" }, { "cve": "CVE-2022-50412", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50412" }, { "cve": "CVE-2022-50413", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50413" }, { "cve": "CVE-2022-50414", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50414" }, { "cve": "CVE-2022-50415", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50415" }, { "cve": "CVE-2022-50416", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50416" }, { "cve": "CVE-2022-50417", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50417" }, { "cve": "CVE-2022-50418", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50418" }, { "cve": "CVE-2022-50419", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2022-50419" }, { "cve": "CVE-2023-53369", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53369" }, { "cve": "CVE-2023-53370", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53370" }, { "cve": "CVE-2023-53371", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53371" }, { "cve": "CVE-2023-53372", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53372" }, { "cve": "CVE-2023-53373", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53373" }, { "cve": "CVE-2023-53374", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53374" }, { "cve": "CVE-2023-53375", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53375" }, { "cve": "CVE-2023-53376", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53376" }, { "cve": "CVE-2023-53377", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53377" }, { "cve": "CVE-2023-53378", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53378" }, { "cve": "CVE-2023-53379", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53379" }, { "cve": "CVE-2023-53380", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53380" }, { "cve": "CVE-2023-53381", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53381" }, { "cve": "CVE-2023-53382", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53382" }, { "cve": "CVE-2023-53383", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53383" }, { "cve": "CVE-2023-53384", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53384" }, { "cve": "CVE-2023-53385", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53385" }, { "cve": "CVE-2023-53386", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53386" }, { "cve": "CVE-2023-53387", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53387" }, { "cve": "CVE-2023-53388", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53388" }, { "cve": "CVE-2023-53389", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53389" }, { "cve": "CVE-2023-53390", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53390" }, { "cve": "CVE-2023-53391", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53391" }, { "cve": "CVE-2023-53392", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53392" }, { "cve": "CVE-2023-53393", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53393" }, { "cve": "CVE-2023-53394", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53394" }, { "cve": "CVE-2023-53395", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53395" }, { "cve": "CVE-2023-53396", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53396" }, { "cve": "CVE-2023-53397", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53397" }, { "cve": "CVE-2023-53398", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53398" }, { "cve": "CVE-2023-53399", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53399" }, { "cve": "CVE-2023-53400", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53400" }, { "cve": "CVE-2023-53401", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53401" }, { "cve": "CVE-2023-53402", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53402" }, { "cve": "CVE-2023-53403", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53403" }, { "cve": "CVE-2023-53404", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53404" }, { "cve": "CVE-2023-53405", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53405" }, { "cve": "CVE-2023-53406", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53406" }, { "cve": "CVE-2023-53407", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53407" }, { "cve": "CVE-2023-53408", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53408" }, { "cve": "CVE-2023-53409", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53409" }, { "cve": "CVE-2023-53410", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53410" }, { "cve": "CVE-2023-53411", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53411" }, { "cve": "CVE-2023-53412", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53412" }, { "cve": "CVE-2023-53413", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53413" }, { "cve": "CVE-2023-53414", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53414" }, { "cve": "CVE-2023-53415", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53415" }, { "cve": "CVE-2023-53416", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53416" }, { "cve": "CVE-2023-53417", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53417" }, { "cve": "CVE-2023-53418", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53418" }, { "cve": "CVE-2023-53419", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53419" }, { "cve": "CVE-2023-53420", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53420" }, { "cve": "CVE-2023-53421", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53421" }, { "cve": "CVE-2023-53422", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53422" }, { "cve": "CVE-2023-53423", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53423" }, { "cve": "CVE-2023-53424", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53424" }, { "cve": "CVE-2023-53425", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53425" }, { "cve": "CVE-2023-53426", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53426" }, { "cve": "CVE-2023-53427", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53427" }, { "cve": "CVE-2023-53428", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53428" }, { "cve": "CVE-2023-53429", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53429" }, { "cve": "CVE-2023-53430", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53430" }, { "cve": "CVE-2023-53431", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53431" }, { "cve": "CVE-2023-53432", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53432" }, { "cve": "CVE-2023-53433", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53433" }, { "cve": "CVE-2023-53434", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53434" }, { "cve": "CVE-2023-53435", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53435" }, { "cve": "CVE-2023-53436", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53436" }, { "cve": "CVE-2023-53437", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53437" }, { "cve": "CVE-2023-53438", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53438" }, { "cve": "CVE-2023-53439", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53439" }, { "cve": "CVE-2023-53440", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53440" }, { "cve": "CVE-2023-53441", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53441" }, { "cve": "CVE-2023-53442", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53442" }, { "cve": "CVE-2023-53443", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53443" }, { "cve": "CVE-2023-53444", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53444" }, { "cve": "CVE-2023-53445", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53445" }, { "cve": "CVE-2023-53446", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53446" }, { "cve": "CVE-2023-53447", "product_status": { "known_affected": [ "T034436", "T002207", "67646", "T027843", "398363", "T004914" ] }, "release_date": "2025-09-18T22:00:00.000+00:00", "title": "CVE-2023-53447" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.