Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-54056 (GCVE-0-2023-54056)
Vulnerability from cvelistv5 – Published: 2025-12-24 12:23 – Updated: 2025-12-24 12:23
VLAI?
EPSS
Title
kheaders: Use array declaration instead of char
Summary
In the Linux kernel, the following vulnerability has been resolved:
kheaders: Use array declaration instead of char
Under CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination
and source buffers. Defining kernel_headers_data as "char" would trip
this check. Since these addresses are treated as byte arrays, define
them as arrays (as done everywhere else).
This was seen with:
$ cat /sys/kernel/kheaders.tar.xz >> /dev/null
detected buffer overflow in memcpy
kernel BUG at lib/string_helpers.c:1027!
...
RIP: 0010:fortify_panic+0xf/0x20
[...]
Call Trace:
<TASK>
ikheaders_read+0x45/0x50 [kheaders]
kernfs_fop_read_iter+0x1a4/0x2f0
...
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
43d8ce9d65a54846d378545770991e65838981e0 , < 719459877d58c8aced5845c1e5b98d8d87d09197
(git)
Affected: 43d8ce9d65a54846d378545770991e65838981e0 , < fcd2da2e6bf2640a31a2a5b118b50dc3635c707b (git) Affected: 43d8ce9d65a54846d378545770991e65838981e0 , < 4a07d2d511e2703efd4387891d49e0326f1157f3 (git) Affected: 43d8ce9d65a54846d378545770991e65838981e0 , < b9f6845a492de20679b84bda6b08be347c5819da (git) Affected: 43d8ce9d65a54846d378545770991e65838981e0 , < d6d1af6b8611801b585c53c0cc63626c8d339e96 (git) Affected: 43d8ce9d65a54846d378545770991e65838981e0 , < 82d2e01b95c439fe55fab5e04fc83387c42d3a48 (git) Affected: 43d8ce9d65a54846d378545770991e65838981e0 , < b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb (git) |
|||||||
|
|||||||||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"kernel/kheaders.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "719459877d58c8aced5845c1e5b98d8d87d09197",
"status": "affected",
"version": "43d8ce9d65a54846d378545770991e65838981e0",
"versionType": "git"
},
{
"lessThan": "fcd2da2e6bf2640a31a2a5b118b50dc3635c707b",
"status": "affected",
"version": "43d8ce9d65a54846d378545770991e65838981e0",
"versionType": "git"
},
{
"lessThan": "4a07d2d511e2703efd4387891d49e0326f1157f3",
"status": "affected",
"version": "43d8ce9d65a54846d378545770991e65838981e0",
"versionType": "git"
},
{
"lessThan": "b9f6845a492de20679b84bda6b08be347c5819da",
"status": "affected",
"version": "43d8ce9d65a54846d378545770991e65838981e0",
"versionType": "git"
},
{
"lessThan": "d6d1af6b8611801b585c53c0cc63626c8d339e96",
"status": "affected",
"version": "43d8ce9d65a54846d378545770991e65838981e0",
"versionType": "git"
},
{
"lessThan": "82d2e01b95c439fe55fab5e04fc83387c42d3a48",
"status": "affected",
"version": "43d8ce9d65a54846d378545770991e65838981e0",
"versionType": "git"
},
{
"lessThan": "b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb",
"status": "affected",
"version": "43d8ce9d65a54846d378545770991e65838981e0",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"kernel/kheaders.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.2"
},
{
"lessThan": "5.2",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.243",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.180",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.111",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.28",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.2.*",
"status": "unaffected",
"version": "6.2.15",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.3.*",
"status": "unaffected",
"version": "6.3.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.4",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.243",
"versionStartIncluding": "5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.180",
"versionStartIncluding": "5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.111",
"versionStartIncluding": "5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.28",
"versionStartIncluding": "5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.15",
"versionStartIncluding": "5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.2",
"versionStartIncluding": "5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4",
"versionStartIncluding": "5.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkheaders: Use array declaration instead of char\n\nUnder CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination\nand source buffers. Defining kernel_headers_data as \"char\" would trip\nthis check. Since these addresses are treated as byte arrays, define\nthem as arrays (as done everywhere else).\n\nThis was seen with:\n\n $ cat /sys/kernel/kheaders.tar.xz \u003e\u003e /dev/null\n\n detected buffer overflow in memcpy\n kernel BUG at lib/string_helpers.c:1027!\n ...\n RIP: 0010:fortify_panic+0xf/0x20\n [...]\n Call Trace:\n \u003cTASK\u003e\n ikheaders_read+0x45/0x50 [kheaders]\n kernfs_fop_read_iter+0x1a4/0x2f0\n ..."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-24T12:23:04.559Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/719459877d58c8aced5845c1e5b98d8d87d09197"
},
{
"url": "https://git.kernel.org/stable/c/fcd2da2e6bf2640a31a2a5b118b50dc3635c707b"
},
{
"url": "https://git.kernel.org/stable/c/4a07d2d511e2703efd4387891d49e0326f1157f3"
},
{
"url": "https://git.kernel.org/stable/c/b9f6845a492de20679b84bda6b08be347c5819da"
},
{
"url": "https://git.kernel.org/stable/c/d6d1af6b8611801b585c53c0cc63626c8d339e96"
},
{
"url": "https://git.kernel.org/stable/c/82d2e01b95c439fe55fab5e04fc83387c42d3a48"
},
{
"url": "https://git.kernel.org/stable/c/b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb"
}
],
"title": "kheaders: Use array declaration instead of char",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-54056",
"datePublished": "2025-12-24T12:23:04.559Z",
"dateReserved": "2025-12-24T12:21:05.091Z",
"dateUpdated": "2025-12-24T12:23:04.559Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-54056\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-24T13:16:07.320\",\"lastModified\":\"2025-12-29T15:58:34.503\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nkheaders: Use array declaration instead of char\\n\\nUnder CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination\\nand source buffers. Defining kernel_headers_data as \\\"char\\\" would trip\\nthis check. Since these addresses are treated as byte arrays, define\\nthem as arrays (as done everywhere else).\\n\\nThis was seen with:\\n\\n $ cat /sys/kernel/kheaders.tar.xz \u003e\u003e /dev/null\\n\\n detected buffer overflow in memcpy\\n kernel BUG at lib/string_helpers.c:1027!\\n ...\\n RIP: 0010:fortify_panic+0xf/0x20\\n [...]\\n Call Trace:\\n \u003cTASK\u003e\\n ikheaders_read+0x45/0x50 [kheaders]\\n kernfs_fop_read_iter+0x1a4/0x2f0\\n ...\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/4a07d2d511e2703efd4387891d49e0326f1157f3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/719459877d58c8aced5845c1e5b98d8d87d09197\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/82d2e01b95c439fe55fab5e04fc83387c42d3a48\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b9f6845a492de20679b84bda6b08be347c5819da\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d6d1af6b8611801b585c53c0cc63626c8d339e96\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fcd2da2e6bf2640a31a2a5b118b50dc3635c707b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
FKIE_CVE-2023-54056
Vulnerability from fkie_nvd - Published: 2025-12-24 13:16 - Updated: 2025-12-29 15:58
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
kheaders: Use array declaration instead of char
Under CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination
and source buffers. Defining kernel_headers_data as "char" would trip
this check. Since these addresses are treated as byte arrays, define
them as arrays (as done everywhere else).
This was seen with:
$ cat /sys/kernel/kheaders.tar.xz >> /dev/null
detected buffer overflow in memcpy
kernel BUG at lib/string_helpers.c:1027!
...
RIP: 0010:fortify_panic+0xf/0x20
[...]
Call Trace:
<TASK>
ikheaders_read+0x45/0x50 [kheaders]
kernfs_fop_read_iter+0x1a4/0x2f0
...
References
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/4a07d2d511e2703efd4387891d49e0326f1157f3 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/719459877d58c8aced5845c1e5b98d8d87d09197 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/82d2e01b95c439fe55fab5e04fc83387c42d3a48 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/b9f6845a492de20679b84bda6b08be347c5819da | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d6d1af6b8611801b585c53c0cc63626c8d339e96 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/fcd2da2e6bf2640a31a2a5b118b50dc3635c707b |
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkheaders: Use array declaration instead of char\n\nUnder CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination\nand source buffers. Defining kernel_headers_data as \"char\" would trip\nthis check. Since these addresses are treated as byte arrays, define\nthem as arrays (as done everywhere else).\n\nThis was seen with:\n\n $ cat /sys/kernel/kheaders.tar.xz \u003e\u003e /dev/null\n\n detected buffer overflow in memcpy\n kernel BUG at lib/string_helpers.c:1027!\n ...\n RIP: 0010:fortify_panic+0xf/0x20\n [...]\n Call Trace:\n \u003cTASK\u003e\n ikheaders_read+0x45/0x50 [kheaders]\n kernfs_fop_read_iter+0x1a4/0x2f0\n ..."
}
],
"id": "CVE-2023-54056",
"lastModified": "2025-12-29T15:58:34.503",
"metrics": {},
"published": "2025-12-24T13:16:07.320",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/4a07d2d511e2703efd4387891d49e0326f1157f3"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/719459877d58c8aced5845c1e5b98d8d87d09197"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/82d2e01b95c439fe55fab5e04fc83387c42d3a48"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/b9f6845a492de20679b84bda6b08be347c5819da"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/d6d1af6b8611801b585c53c0cc63626c8d339e96"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/fcd2da2e6bf2640a31a2a5b118b50dc3635c707b"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
CVE-2023-54056
Vulnerability from fstec - Published: 24.03.2023
VLAI Severity ?
Title
Уязвимость функции asm () модуля kernel/kheaders.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость функции asm () модуля kernel/kheaders.c ядра операционной системы Linux связана с копированием буфера без проверки размера входных данных (классическое переполнение буфера). Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Severity ?
Vendor
Red Hat Inc., Сообщество свободного программного обеспечения
Software Name
Red Hat Enterprise Linux, Debian GNU/Linux, Linux
Software Version
8 (Red Hat Enterprise Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 9 (Red Hat Enterprise Linux), от 5.5 до 5.10.179 включительно (Linux), от 5.11 до 5.15.110 включительно (Linux), от 5.16 до 6.1.27 включительно (Linux), от 6.2 до 6.2.14 включительно (Linux), от 6.3 до 6.3.1 включительно (Linux), от 5.2 до 5.4.242 включительно (Linux)
Possible Mitigations
В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Linux:
https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54056-fd56@gregkh/
https://git.kernel.org/stable/c/719459877d58c8aced5845c1e5b98d8d87d09197
https://git.kernel.org/stable/c/fcd2da2e6bf2640a31a2a5b118b50dc3635c707b
https://git.kernel.org/stable/c/4a07d2d511e2703efd4387891d49e0326f1157f3
https://git.kernel.org/stable/c/b9f6845a492de20679b84bda6b08be347c5819da
https://git.kernel.org/stable/c/d6d1af6b8611801b585c53c0cc63626c8d339e96
https://git.kernel.org/stable/c/82d2e01b95c439fe55fab5e04fc83387c42d3a48
https://git.kernel.org/stable/c/b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.243
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.180
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.111
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.28
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.15
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2023-54056
Для продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2023-54056
Reference
https://www.cve.org/CVERecord?id=CVE-2023-54056
https://git.kernel.org/stable/c/719459877d58c8aced5845c1e5b98d8d87d09197
https://git.kernel.org/stable/c/fcd2da2e6bf2640a31a2a5b118b50dc3635c707b
https://git.kernel.org/stable/c/4a07d2d511e2703efd4387891d49e0326f1157f3
https://git.kernel.org/stable/c/b9f6845a492de20679b84bda6b08be347c5819da
https://git.kernel.org/stable/c/d6d1af6b8611801b585c53c0cc63626c8d339e96
https://git.kernel.org/stable/c/82d2e01b95c439fe55fab5e04fc83387c42d3a48
https://git.kernel.org/stable/c/b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.243
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.180
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.111
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.28
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.15
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54056-fd56@gregkh/
https://security-tracker.debian.org/tracker/CVE-2023-54056
https://access.redhat.com/security/cve/cve-2023-54056
CWE
CWE-119, CWE-120
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8 (Red Hat Enterprise Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 9 (Red Hat Enterprise Linux), \u043e\u0442 5.5 \u0434\u043e 5.10.179 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 5.11 \u0434\u043e 5.15.110 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 5.16 \u0434\u043e 6.1.27 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 6.2 \u0434\u043e 6.2.14 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 6.3 \u0434\u043e 6.3.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 5.2 \u0434\u043e 5.4.242 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54056-fd56@gregkh/\nhttps://git.kernel.org/stable/c/719459877d58c8aced5845c1e5b98d8d87d09197\nhttps://git.kernel.org/stable/c/fcd2da2e6bf2640a31a2a5b118b50dc3635c707b\nhttps://git.kernel.org/stable/c/4a07d2d511e2703efd4387891d49e0326f1157f3\nhttps://git.kernel.org/stable/c/b9f6845a492de20679b84bda6b08be347c5819da\nhttps://git.kernel.org/stable/c/d6d1af6b8611801b585c53c0cc63626c8d339e96\nhttps://git.kernel.org/stable/c/82d2e01b95c439fe55fab5e04fc83387c42d3a48\nhttps://git.kernel.org/stable/c/b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.243\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.180\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.111\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.28\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.15\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2023-54056\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2023-54056",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "24.03.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "05.02.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "05.02.2026",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2026-01249",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-54056",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , Red Hat Inc. Red Hat Enterprise Linux 9 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.5 \u0434\u043e 5.10.179 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.11 \u0434\u043e 5.15.110 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.16 \u0434\u043e 6.1.27 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.2 \u0434\u043e 6.2.14 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.3 \u0434\u043e 6.3.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.2 \u0434\u043e 5.4.242 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 asm () \u043c\u043e\u0434\u0443\u043b\u044f kernel/kheaders.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119), \u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (\u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430) (CWE-120)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 asm () \u043c\u043e\u0434\u0443\u043b\u044f kernel/kheaders.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (\u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.cve.org/CVERecord?id=CVE-2023-54056\nhttps://git.kernel.org/stable/c/719459877d58c8aced5845c1e5b98d8d87d09197\nhttps://git.kernel.org/stable/c/fcd2da2e6bf2640a31a2a5b118b50dc3635c707b\nhttps://git.kernel.org/stable/c/4a07d2d511e2703efd4387891d49e0326f1157f3\nhttps://git.kernel.org/stable/c/b9f6845a492de20679b84bda6b08be347c5819da\nhttps://git.kernel.org/stable/c/d6d1af6b8611801b585c53c0cc63626c8d339e96\nhttps://git.kernel.org/stable/c/82d2e01b95c439fe55fab5e04fc83387c42d3a48\nhttps://git.kernel.org/stable/c/b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.243\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.180\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.111\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.28\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.15\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2\nhttps://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54056-fd56@gregkh/\nhttps://security-tracker.debian.org/tracker/CVE-2023-54056\nhttps://access.redhat.com/security/cve/cve-2023-54056",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119, CWE-120",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
GHSA-W8P6-7X4V-892G
Vulnerability from github – Published: 2025-12-24 15:30 – Updated: 2025-12-24 15:30
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
kheaders: Use array declaration instead of char
Under CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination and source buffers. Defining kernel_headers_data as "char" would trip this check. Since these addresses are treated as byte arrays, define them as arrays (as done everywhere else).
This was seen with:
$ cat /sys/kernel/kheaders.tar.xz >> /dev/null
detected buffer overflow in memcpy kernel BUG at lib/string_helpers.c:1027! ... RIP: 0010:fortify_panic+0xf/0x20 [...] Call Trace: ikheaders_read+0x45/0x50 [kheaders] kernfs_fop_read_iter+0x1a4/0x2f0 ...
{
"affected": [],
"aliases": [
"CVE-2023-54056"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-24T13:16:07Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nkheaders: Use array declaration instead of char\n\nUnder CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination\nand source buffers. Defining kernel_headers_data as \"char\" would trip\nthis check. Since these addresses are treated as byte arrays, define\nthem as arrays (as done everywhere else).\n\nThis was seen with:\n\n $ cat /sys/kernel/kheaders.tar.xz \u003e\u003e /dev/null\n\n detected buffer overflow in memcpy\n kernel BUG at lib/string_helpers.c:1027!\n ...\n RIP: 0010:fortify_panic+0xf/0x20\n [...]\n Call Trace:\n \u003cTASK\u003e\n ikheaders_read+0x45/0x50 [kheaders]\n kernfs_fop_read_iter+0x1a4/0x2f0\n ...",
"id": "GHSA-w8p6-7x4v-892g",
"modified": "2025-12-24T15:30:36Z",
"published": "2025-12-24T15:30:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-54056"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/4a07d2d511e2703efd4387891d49e0326f1157f3"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/719459877d58c8aced5845c1e5b98d8d87d09197"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/82d2e01b95c439fe55fab5e04fc83387c42d3a48"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/b9f6845a492de20679b84bda6b08be347c5819da"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d6d1af6b8611801b585c53c0cc63626c8d339e96"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/fcd2da2e6bf2640a31a2a5b118b50dc3635c707b"
}
],
"schema_version": "1.4.0",
"severity": []
}
WID-SEC-W-2025-2929
Vulnerability from csaf_certbund - Published: 2025-12-28 23:00 - Updated: 2026-02-19 23:00Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht näher spezifizierte Angriffe durchzuführen, die möglicherweise zu einer Denial-of-Service- Bedingung führen oder eine Speicherbeschädigung verursachen können.
Betroffene Betriebssysteme
- Linux
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2929 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2929.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2929 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2929"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50712",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2022-50712-6c0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50713",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2022-50713-24cc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50714",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50714-32b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50715",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50715-5640@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50716",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50716-88e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50717",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2022-50717-dc68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50718",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2022-50718-a890@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50719",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2022-50719-02d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50720",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50720-0297@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50721",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50721-9683@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50722",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50722-06c7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50723",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50723-a62d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50724",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50724-f625@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50725",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50725-967f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50726",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50726-2f42@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50727",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50727-95aa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50728",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50728-afa8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50729",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50729-f996@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50730",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50730-a4ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50731",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50731-a78b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50732",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50732-042c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50733",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50733-a587@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50734",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50734-96fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50735",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50735-2929@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50736",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2022-50736-1cb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50737",
"url": "https://lore.kernel.org/linux-cve-announce/2025122447-CVE-2022-50737-45ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50738",
"url": "https://lore.kernel.org/linux-cve-announce/2025122447-CVE-2022-50738-d561@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50739",
"url": "https://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50739-f061@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50740",
"url": "https://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50740-a780@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50741",
"url": "https://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50741-1736@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50742",
"url": "https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2022-50742-e130@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50743",
"url": "https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2022-50743-8e63@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50744",
"url": "https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2022-50744-bc80@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50745",
"url": "https://lore.kernel.org/linux-cve-announce/2025122450-CVE-2022-50745-af5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50746",
"url": "https://lore.kernel.org/linux-cve-announce/2025122450-CVE-2022-50746-7cbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50747",
"url": "https://lore.kernel.org/linux-cve-announce/2025122450-CVE-2022-50747-8937@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50748",
"url": "https://lore.kernel.org/linux-cve-announce/2025122451-CVE-2022-50748-0136@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50749",
"url": "https://lore.kernel.org/linux-cve-announce/2025122451-CVE-2022-50749-dae0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50750",
"url": "https://lore.kernel.org/linux-cve-announce/2025122451-CVE-2022-50750-5395@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50751",
"url": "https://lore.kernel.org/linux-cve-announce/2025122452-CVE-2022-50751-b5ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50752",
"url": "https://lore.kernel.org/linux-cve-announce/2025122452-CVE-2022-50752-fa82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50753",
"url": "https://lore.kernel.org/linux-cve-announce/2025122452-CVE-2022-50753-6266@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50754",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2022-50754-ec9a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50755",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2022-50755-f5d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50756",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2022-50756-ce43@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50757",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2022-50757-15f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50758",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2022-50758-800b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50759",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2022-50759-747e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50760",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2022-50760-b793@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50761",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2022-50761-0e67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50762",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2022-50762-282c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50763",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50763-923e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50764",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50764-45eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50765",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50765-356e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50766",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50766-0964@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50767",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2022-50767-9a13@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50768",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2022-50768-2703@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50769",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2022-50769-f4db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50770",
"url": "https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2022-50770-ba3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50771",
"url": "https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2022-50771-3440@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50772",
"url": "https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2022-50772-774d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50773",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2022-50773-b946@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50774",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2022-50774-73eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50775",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2022-50775-6733@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50776",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2022-50776-f275@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50777",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2022-50777-d1e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50778",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2022-50778-0b9a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50779",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2022-50779-fa1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50780",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2022-50780-bc90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50781",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2022-50781-3d18@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50782",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2022-50782-d849@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50783",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2022-50783-3109@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54043",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54043-16c8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54044",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54044-61d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54045",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54045-e0ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54046",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54046-aaf6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54047",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54047-42ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54048",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54048-ea7d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54049",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54049-79f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54050",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54050-737a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54051",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54051-b704@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54052",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54052-302d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54053",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54053-9a4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54054",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54054-292f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54055",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54055-3b5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54056",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54056-fd56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54057",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54057-f0c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54058",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54058-ce20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54059",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54059-c769@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54060",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54060-2029@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54061",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54061-5cd1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54062",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54062-d861@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54063",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54063-e78c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54064",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54064-7509@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54065",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54065-1de4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54066",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54066-8ff7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54067",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54067-46cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54068",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54068-dbe6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54069",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54069-1a17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54070",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54070-6104@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54071",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54071-b4c6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54072",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54072-4a34@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54073",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54073-249f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54074",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54074-cf89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54075",
"url": "https://lore.kernel.org/linux-cve-announce/2025122433-CVE-2023-54075-ab3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54076",
"url": "https://lore.kernel.org/linux-cve-announce/2025122433-CVE-2023-54076-e317@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54077",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54077-61a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54078",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2023-54078-03f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54079",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2023-54079-be62@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54080",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2023-54080-bec3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54081",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2023-54081-3fc3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54082",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2023-54082-4124@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54083",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2023-54083-fc0e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54084",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2023-54084-a862@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54085",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2023-54085-7e32@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54086",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2023-54086-d696@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54087",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2023-54087-38fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54088",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54088-f00f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54089",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54089-ddc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54090",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54090-2944@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54091",
"url": "https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2023-54091-577a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54092",
"url": "https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2023-54092-91ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54093",
"url": "https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2023-54093-fcea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54094",
"url": "https://lore.kernel.org/linux-cve-announce/2025122408-CVE-2023-54094-e8ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54095",
"url": "https://lore.kernel.org/linux-cve-announce/2025122408-CVE-2023-54095-7fe0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54096",
"url": "https://lore.kernel.org/linux-cve-announce/2025122408-CVE-2023-54096-efde@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54097",
"url": "https://lore.kernel.org/linux-cve-announce/2025122409-CVE-2023-54097-3fb1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54098",
"url": "https://lore.kernel.org/linux-cve-announce/2025122409-CVE-2023-54098-d7c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54099",
"url": "https://lore.kernel.org/linux-cve-announce/2025122409-CVE-2023-54099-4143@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54100",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2023-54100-91a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54101",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2023-54101-49f5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54102",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2023-54102-7dd5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54103",
"url": "https://lore.kernel.org/linux-cve-announce/2025122411-CVE-2023-54103-5493@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54104",
"url": "https://lore.kernel.org/linux-cve-announce/2025122411-CVE-2023-54104-32e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54105",
"url": "https://lore.kernel.org/linux-cve-announce/2025122411-CVE-2023-54105-fbe5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54106",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54106-b8da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54107",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54107-12ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54108",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54108-d5be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54109",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54109-714c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54110",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2023-54110-5816@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54111",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2023-54111-de3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54112",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2023-54112-71f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54113",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2023-54113-de5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54114",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2023-54114-8362@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54115",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2023-54115-19b7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54116",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2023-54116-886b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54117",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2023-54117-e980@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54118",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2023-54118-d92b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54119",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2023-54119-fbd4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54120",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2023-54120-d966@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54121",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2023-54121-691a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54122",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2023-54122-b6f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54123",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2023-54123-4e1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54124",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2023-54124-d6ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54125",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2023-54125-2085@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54126",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2023-54126-7e20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54127",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2023-54127-87e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54128",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2023-54128-a164@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54129",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2023-54129-8cb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54130",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2023-54130-3339@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54131",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2023-54131-87b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54132",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2023-54132-dd33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54133",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2023-54133-dc22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54134",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2023-54134-2972@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54135",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2023-54135-ffa3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54136",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2023-54136-b58d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54137",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54137-1873@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54138",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54138-188c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54139",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54139-ce08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54140",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54140-4841@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54141",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54141-86e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54142",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54142-fd19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54143",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54143-adb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54144",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54144-f3be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54145",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54145-421d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54146",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54146-1510@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54147",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54147-dafb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54148",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54148-569b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54149",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54149-e39f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54150",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54150-dbc1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54151",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54151-854b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54152",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54152-5e4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54153",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54153-63a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54154",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54154-bc1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54155",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54155-e238@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54156",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54156-832a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54157",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54157-c0c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54158",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54158-0a83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54159",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54159-5908@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54160",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54160-ed90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54161",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54161-53d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68735",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2025-68735-dce5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68736",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2025-68736-30ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68737",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2025-68737-596a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68738",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2025-68738-79ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68739",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2025-68739-b2a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68740",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2025-68740-dcfd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68741",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2025-68741-894a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68742",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2025-68742-367d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68743",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2025-68743-f0bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68744",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2025-68744-bf55@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68745",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2025-68745-69b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68746",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2025-68746-bd3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68747",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2025-68747-572e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68748",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2025-68748-45cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68749",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2025-68749-1160@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68750",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2025-68750-7ff1@gregkh/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10039-1 vom 2026-01-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNRBJ6HLDODCC2A4DQ3QHZ6XBQSZQO26/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0263-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0317-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0350-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0352-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023998.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0369-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8016-1 vom 2026-02-04",
"url": "https://ubuntu.com/security/notices/USN-8016-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20228-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20220-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6126 vom 2026-02-09",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6127 vom 2026-02-10",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0411-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-1 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4476 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0474-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0496-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-4 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-3 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-2 vom 2026-02-18",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-113 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-113.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-6 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-3 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-1 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-19T23:00:00.000+00:00",
"generator": {
"date": "2026-02-20T09:20:47.321+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2929",
"initial_release_date": "2025-12-28T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Debian und Ubuntu aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "17"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028463",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50712",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50712"
},
{
"cve": "CVE-2022-50713",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50713"
},
{
"cve": "CVE-2022-50714",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50714"
},
{
"cve": "CVE-2022-50715",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50715"
},
{
"cve": "CVE-2022-50716",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50716"
},
{
"cve": "CVE-2022-50717",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50717"
},
{
"cve": "CVE-2022-50718",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50718"
},
{
"cve": "CVE-2022-50719",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50719"
},
{
"cve": "CVE-2022-50720",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50720"
},
{
"cve": "CVE-2022-50721",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50721"
},
{
"cve": "CVE-2022-50722",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50722"
},
{
"cve": "CVE-2022-50723",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50723"
},
{
"cve": "CVE-2022-50724",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50724"
},
{
"cve": "CVE-2022-50725",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50725"
},
{
"cve": "CVE-2022-50726",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50726"
},
{
"cve": "CVE-2022-50727",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50727"
},
{
"cve": "CVE-2022-50728",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50728"
},
{
"cve": "CVE-2022-50729",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50729"
},
{
"cve": "CVE-2022-50730",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50730"
},
{
"cve": "CVE-2022-50731",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50731"
},
{
"cve": "CVE-2022-50732",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50732"
},
{
"cve": "CVE-2022-50733",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50733"
},
{
"cve": "CVE-2022-50734",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50734"
},
{
"cve": "CVE-2022-50735",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50735"
},
{
"cve": "CVE-2022-50736",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50736"
},
{
"cve": "CVE-2022-50737",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50737"
},
{
"cve": "CVE-2022-50738",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50738"
},
{
"cve": "CVE-2022-50739",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50739"
},
{
"cve": "CVE-2022-50740",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50740"
},
{
"cve": "CVE-2022-50741",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50741"
},
{
"cve": "CVE-2022-50742",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50742"
},
{
"cve": "CVE-2022-50743",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50743"
},
{
"cve": "CVE-2022-50744",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50744"
},
{
"cve": "CVE-2022-50745",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50745"
},
{
"cve": "CVE-2022-50746",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50746"
},
{
"cve": "CVE-2022-50747",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50747"
},
{
"cve": "CVE-2022-50748",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50748"
},
{
"cve": "CVE-2022-50749",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50749"
},
{
"cve": "CVE-2022-50750",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50750"
},
{
"cve": "CVE-2022-50751",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50751"
},
{
"cve": "CVE-2022-50752",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50752"
},
{
"cve": "CVE-2022-50753",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50753"
},
{
"cve": "CVE-2022-50754",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50754"
},
{
"cve": "CVE-2022-50755",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50755"
},
{
"cve": "CVE-2022-50756",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50756"
},
{
"cve": "CVE-2022-50757",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50757"
},
{
"cve": "CVE-2022-50758",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50758"
},
{
"cve": "CVE-2022-50759",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50759"
},
{
"cve": "CVE-2022-50760",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50760"
},
{
"cve": "CVE-2022-50761",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50761"
},
{
"cve": "CVE-2022-50762",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50762"
},
{
"cve": "CVE-2022-50763",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50763"
},
{
"cve": "CVE-2022-50764",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50764"
},
{
"cve": "CVE-2022-50765",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50765"
},
{
"cve": "CVE-2022-50766",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50766"
},
{
"cve": "CVE-2022-50767",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50767"
},
{
"cve": "CVE-2022-50768",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50768"
},
{
"cve": "CVE-2022-50769",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50769"
},
{
"cve": "CVE-2022-50770",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50770"
},
{
"cve": "CVE-2022-50771",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50771"
},
{
"cve": "CVE-2022-50772",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50772"
},
{
"cve": "CVE-2022-50773",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50773"
},
{
"cve": "CVE-2022-50774",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50774"
},
{
"cve": "CVE-2022-50775",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50775"
},
{
"cve": "CVE-2022-50776",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50776"
},
{
"cve": "CVE-2022-50777",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50777"
},
{
"cve": "CVE-2022-50778",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50778"
},
{
"cve": "CVE-2022-50779",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50779"
},
{
"cve": "CVE-2022-50780",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50780"
},
{
"cve": "CVE-2022-50781",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50781"
},
{
"cve": "CVE-2022-50782",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50782"
},
{
"cve": "CVE-2022-50783",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50783"
},
{
"cve": "CVE-2023-54043",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54043"
},
{
"cve": "CVE-2023-54044",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54044"
},
{
"cve": "CVE-2023-54045",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54045"
},
{
"cve": "CVE-2023-54046",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54046"
},
{
"cve": "CVE-2023-54047",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54047"
},
{
"cve": "CVE-2023-54048",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54048"
},
{
"cve": "CVE-2023-54049",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54049"
},
{
"cve": "CVE-2023-54050",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54050"
},
{
"cve": "CVE-2023-54051",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54051"
},
{
"cve": "CVE-2023-54052",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54052"
},
{
"cve": "CVE-2023-54053",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54053"
},
{
"cve": "CVE-2023-54054",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54054"
},
{
"cve": "CVE-2023-54055",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54055"
},
{
"cve": "CVE-2023-54056",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54056"
},
{
"cve": "CVE-2023-54057",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54057"
},
{
"cve": "CVE-2023-54058",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54058"
},
{
"cve": "CVE-2023-54059",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54059"
},
{
"cve": "CVE-2023-54060",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54060"
},
{
"cve": "CVE-2023-54061",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54061"
},
{
"cve": "CVE-2023-54062",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54062"
},
{
"cve": "CVE-2023-54063",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54063"
},
{
"cve": "CVE-2023-54064",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54064"
},
{
"cve": "CVE-2023-54065",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54065"
},
{
"cve": "CVE-2023-54066",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54066"
},
{
"cve": "CVE-2023-54067",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54067"
},
{
"cve": "CVE-2023-54068",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54068"
},
{
"cve": "CVE-2023-54069",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54069"
},
{
"cve": "CVE-2023-54070",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54070"
},
{
"cve": "CVE-2023-54071",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54071"
},
{
"cve": "CVE-2023-54072",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54072"
},
{
"cve": "CVE-2023-54073",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54073"
},
{
"cve": "CVE-2023-54074",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54074"
},
{
"cve": "CVE-2023-54075",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54075"
},
{
"cve": "CVE-2023-54076",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54076"
},
{
"cve": "CVE-2023-54077",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54077"
},
{
"cve": "CVE-2023-54078",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54078"
},
{
"cve": "CVE-2023-54079",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54079"
},
{
"cve": "CVE-2023-54080",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54080"
},
{
"cve": "CVE-2023-54081",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54081"
},
{
"cve": "CVE-2023-54082",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54082"
},
{
"cve": "CVE-2023-54083",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54083"
},
{
"cve": "CVE-2023-54084",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54084"
},
{
"cve": "CVE-2023-54085",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54085"
},
{
"cve": "CVE-2023-54086",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54086"
},
{
"cve": "CVE-2023-54087",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54087"
},
{
"cve": "CVE-2023-54088",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54088"
},
{
"cve": "CVE-2023-54089",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54089"
},
{
"cve": "CVE-2023-54090",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54090"
},
{
"cve": "CVE-2023-54091",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54091"
},
{
"cve": "CVE-2023-54092",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54092"
},
{
"cve": "CVE-2023-54093",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54093"
},
{
"cve": "CVE-2023-54094",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54094"
},
{
"cve": "CVE-2023-54095",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54095"
},
{
"cve": "CVE-2023-54096",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54096"
},
{
"cve": "CVE-2023-54097",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54097"
},
{
"cve": "CVE-2023-54098",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54098"
},
{
"cve": "CVE-2023-54099",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54099"
},
{
"cve": "CVE-2023-54100",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54100"
},
{
"cve": "CVE-2023-54101",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54101"
},
{
"cve": "CVE-2023-54102",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54102"
},
{
"cve": "CVE-2023-54103",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54103"
},
{
"cve": "CVE-2023-54104",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54104"
},
{
"cve": "CVE-2023-54105",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54105"
},
{
"cve": "CVE-2023-54106",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54106"
},
{
"cve": "CVE-2023-54107",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54107"
},
{
"cve": "CVE-2023-54108",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54108"
},
{
"cve": "CVE-2023-54109",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54109"
},
{
"cve": "CVE-2023-54110",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54110"
},
{
"cve": "CVE-2023-54111",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54111"
},
{
"cve": "CVE-2023-54112",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54112"
},
{
"cve": "CVE-2023-54113",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54113"
},
{
"cve": "CVE-2023-54114",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54114"
},
{
"cve": "CVE-2023-54115",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54115"
},
{
"cve": "CVE-2023-54116",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54116"
},
{
"cve": "CVE-2023-54117",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54117"
},
{
"cve": "CVE-2023-54118",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54118"
},
{
"cve": "CVE-2023-54119",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54119"
},
{
"cve": "CVE-2023-54120",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54120"
},
{
"cve": "CVE-2023-54121",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54121"
},
{
"cve": "CVE-2023-54122",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54122"
},
{
"cve": "CVE-2023-54123",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54123"
},
{
"cve": "CVE-2023-54124",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54124"
},
{
"cve": "CVE-2023-54125",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54125"
},
{
"cve": "CVE-2023-54126",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54126"
},
{
"cve": "CVE-2023-54127",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54127"
},
{
"cve": "CVE-2023-54128",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54128"
},
{
"cve": "CVE-2023-54129",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54129"
},
{
"cve": "CVE-2023-54130",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54130"
},
{
"cve": "CVE-2023-54131",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54131"
},
{
"cve": "CVE-2023-54132",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54132"
},
{
"cve": "CVE-2023-54133",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54133"
},
{
"cve": "CVE-2023-54134",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54134"
},
{
"cve": "CVE-2023-54135",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54135"
},
{
"cve": "CVE-2023-54136",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54136"
},
{
"cve": "CVE-2023-54137",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54137"
},
{
"cve": "CVE-2023-54138",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54138"
},
{
"cve": "CVE-2023-54139",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54139"
},
{
"cve": "CVE-2023-54140",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54140"
},
{
"cve": "CVE-2023-54141",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54141"
},
{
"cve": "CVE-2023-54142",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54142"
},
{
"cve": "CVE-2023-54143",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54143"
},
{
"cve": "CVE-2023-54144",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54144"
},
{
"cve": "CVE-2023-54145",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54145"
},
{
"cve": "CVE-2023-54146",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54146"
},
{
"cve": "CVE-2023-54147",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54147"
},
{
"cve": "CVE-2023-54148",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54148"
},
{
"cve": "CVE-2023-54149",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54149"
},
{
"cve": "CVE-2023-54150",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54150"
},
{
"cve": "CVE-2023-54151",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54151"
},
{
"cve": "CVE-2023-54152",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54152"
},
{
"cve": "CVE-2023-54153",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54153"
},
{
"cve": "CVE-2023-54154",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54154"
},
{
"cve": "CVE-2023-54155",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54155"
},
{
"cve": "CVE-2023-54156",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54156"
},
{
"cve": "CVE-2023-54157",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54157"
},
{
"cve": "CVE-2023-54158",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54158"
},
{
"cve": "CVE-2023-54159",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54159"
},
{
"cve": "CVE-2023-54160",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54160"
},
{
"cve": "CVE-2023-54161",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54161"
},
{
"cve": "CVE-2025-68735",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68735"
},
{
"cve": "CVE-2025-68736",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68736"
},
{
"cve": "CVE-2025-68737",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68737"
},
{
"cve": "CVE-2025-68738",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68738"
},
{
"cve": "CVE-2025-68739",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68739"
},
{
"cve": "CVE-2025-68740",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68740"
},
{
"cve": "CVE-2025-68741",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68741"
},
{
"cve": "CVE-2025-68742",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68742"
},
{
"cve": "CVE-2025-68743",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68743"
},
{
"cve": "CVE-2025-68744",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68744"
},
{
"cve": "CVE-2025-68745",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68745"
},
{
"cve": "CVE-2025-68746",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68746"
},
{
"cve": "CVE-2025-68747",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68747"
},
{
"cve": "CVE-2025-68748",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68748"
},
{
"cve": "CVE-2025-68749",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68749"
},
{
"cve": "CVE-2025-68750",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68750"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…