Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-50442 (GCVE-0-2022-50442)
Vulnerability from cvelistv5 – Published: 2025-10-01 11:42 – Updated: 2025-10-02 07:04| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
4534a70b7056fd4b9a1c6db5a4ce3c98546b291e , < 3cd9e5b41b83bb57ac3cf9888f9fef2a6ef8ed96
(git)
Affected: 4534a70b7056fd4b9a1c6db5a4ce3c98546b291e , < b15374365c9d10445ea7d66cdf885457a0223fc2 (git) Affected: 4534a70b7056fd4b9a1c6db5a4ce3c98546b291e , < 3f6f75e8863f41c8b3dbfd9d99e3963aaca42601 (git) Affected: 4534a70b7056fd4b9a1c6db5a4ce3c98546b291e , < 4d42ecda239cc13738d6fd84d098a32e67b368b9 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/ntfs3/index.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "3cd9e5b41b83bb57ac3cf9888f9fef2a6ef8ed96",
"status": "affected",
"version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e",
"versionType": "git"
},
{
"lessThan": "b15374365c9d10445ea7d66cdf885457a0223fc2",
"status": "affected",
"version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e",
"versionType": "git"
},
{
"lessThan": "3f6f75e8863f41c8b3dbfd9d99e3963aaca42601",
"status": "affected",
"version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e",
"versionType": "git"
},
{
"lessThan": "4d42ecda239cc13738d6fd84d098a32e67b368b9",
"status": "affected",
"version": "4534a70b7056fd4b9a1c6db5a4ce3c98546b291e",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/ntfs3/index.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.15"
},
{
"lessThan": "5.15",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.87",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.0.*",
"status": "unaffected",
"version": "6.0.17",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.2",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.87",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.17",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.3",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"versionStartIncluding": "5.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate buffer length while parsing index\n\nindx_read is called when we have some NTFS directory operations that\nneed more information from the index buffers. This adds a sanity check\nto make sure the returned index buffer length is legit, or we may have\nsome out-of-bound memory accesses.\n\n[ 560.897595] BUG: KASAN: slab-out-of-bounds in hdr_find_e.isra.0+0x10c/0x320\n[ 560.898321] Read of size 2 at addr ffff888009497238 by task exp/245\n[ 560.898760]\n[ 560.899129] CPU: 0 PID: 245 Comm: exp Not tainted 6.0.0-rc6 #37\n[ 560.899505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 560.900170] Call Trace:\n[ 560.900407] \u003cTASK\u003e\n[ 560.900732] dump_stack_lvl+0x49/0x63\n[ 560.901108] print_report.cold+0xf5/0x689\n[ 560.901395] ? hdr_find_e.isra.0+0x10c/0x320\n[ 560.901716] kasan_report+0xa7/0x130\n[ 560.901950] ? hdr_find_e.isra.0+0x10c/0x320\n[ 560.902208] __asan_load2+0x68/0x90\n[ 560.902427] hdr_find_e.isra.0+0x10c/0x320\n[ 560.902846] ? cmp_uints+0xe0/0xe0\n[ 560.903363] ? cmp_sdh+0x90/0x90\n[ 560.903883] ? ntfs_bread_run+0x190/0x190\n[ 560.904196] ? rwsem_down_read_slowpath+0x750/0x750\n[ 560.904969] ? ntfs_fix_post_read+0xe0/0x130\n[ 560.905259] ? __kasan_check_write+0x14/0x20\n[ 560.905599] ? up_read+0x1a/0x90\n[ 560.905853] ? indx_read+0x22c/0x380\n[ 560.906096] indx_find+0x2ef/0x470\n[ 560.906352] ? indx_find_buffer+0x2d0/0x2d0\n[ 560.906692] ? __kasan_kmalloc+0x88/0xb0\n[ 560.906977] dir_search_u+0x196/0x2f0\n[ 560.907220] ? ntfs_nls_to_utf16+0x450/0x450\n[ 560.907464] ? __kasan_check_write+0x14/0x20\n[ 560.907747] ? mutex_lock+0x8f/0xe0\n[ 560.907970] ? __mutex_lock_slowpath+0x20/0x20\n[ 560.908214] ? kmem_cache_alloc+0x143/0x4b0\n[ 560.908459] ntfs_lookup+0xe0/0x100\n[ 560.908788] __lookup_slow+0x116/0x220\n[ 560.909050] ? lookup_fast+0x1b0/0x1b0\n[ 560.909309] ? lookup_fast+0x13f/0x1b0\n[ 560.909601] walk_component+0x187/0x230\n[ 560.909944] link_path_walk.part.0+0x3f0/0x660\n[ 560.910285] ? handle_lookup_down+0x90/0x90\n[ 560.910618] ? path_init+0x642/0x6e0\n[ 560.911084] ? percpu_counter_add_batch+0x6e/0xf0\n[ 560.912559] ? __alloc_file+0x114/0x170\n[ 560.913008] path_openat+0x19c/0x1d10\n[ 560.913419] ? getname_flags+0x73/0x2b0\n[ 560.913815] ? kasan_save_stack+0x3a/0x50\n[ 560.914125] ? kasan_save_stack+0x26/0x50\n[ 560.914542] ? __kasan_slab_alloc+0x6d/0x90\n[ 560.914924] ? kmem_cache_alloc+0x143/0x4b0\n[ 560.915339] ? getname_flags+0x73/0x2b0\n[ 560.915647] ? getname+0x12/0x20\n[ 560.916114] ? __x64_sys_open+0x4c/0x60\n[ 560.916460] ? path_lookupat.isra.0+0x230/0x230\n[ 560.916867] ? __isolate_free_page+0x2e0/0x2e0\n[ 560.917194] do_filp_open+0x15c/0x1f0\n[ 560.917448] ? may_open_dev+0x60/0x60\n[ 560.917696] ? expand_files+0xa4/0x3a0\n[ 560.917923] ? __kasan_check_write+0x14/0x20\n[ 560.918185] ? _raw_spin_lock+0x88/0xdb\n[ 560.918409] ? _raw_spin_lock_irqsave+0x100/0x100\n[ 560.918783] ? _find_next_bit+0x4a/0x130\n[ 560.919026] ? _raw_spin_unlock+0x19/0x40\n[ 560.919276] ? alloc_fd+0x14b/0x2d0\n[ 560.919635] do_sys_openat2+0x32a/0x4b0\n[ 560.920035] ? file_open_root+0x230/0x230\n[ 560.920336] ? __rcu_read_unlock+0x5b/0x280\n[ 560.920813] do_sys_open+0x99/0xf0\n[ 560.921208] ? filp_open+0x60/0x60\n[ 560.921482] ? exit_to_user_mode_prepare+0x49/0x180\n[ 560.921867] __x64_sys_open+0x4c/0x60\n[ 560.922128] do_syscall_64+0x3b/0x90\n[ 560.922369] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 560.923030] RIP: 0033:0x7f7dff2e4469\n[ 560.923681] Code: 00 f3 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 088\n[ 560.924451] RSP: 002b:00007ffd41a210b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000002\n[ 560.925168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7dff2e4469\n[ 560.925655] RDX: 0000000000000000 RSI: 0000000000000002 RDI:\n---truncated---"
}
],
"providerMetadata": {
"dateUpdated": "2025-10-02T07:04:16.226Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/3cd9e5b41b83bb57ac3cf9888f9fef2a6ef8ed96"
},
{
"url": "https://git.kernel.org/stable/c/b15374365c9d10445ea7d66cdf885457a0223fc2"
},
{
"url": "https://git.kernel.org/stable/c/3f6f75e8863f41c8b3dbfd9d99e3963aaca42601"
},
{
"url": "https://git.kernel.org/stable/c/4d42ecda239cc13738d6fd84d098a32e67b368b9"
}
],
"title": "fs/ntfs3: Validate buffer length while parsing index",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2022-50442",
"datePublished": "2025-10-01T11:42:18.012Z",
"dateReserved": "2025-09-17T14:53:07.010Z",
"dateUpdated": "2025-10-02T07:04:16.226Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-50442\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-01T12:15:36.433\",\"lastModified\":\"2026-01-20T15:58:51.973\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfs/ntfs3: Validate buffer length while parsing index\\n\\nindx_read is called when we have some NTFS directory operations that\\nneed more information from the index buffers. This adds a sanity check\\nto make sure the returned index buffer length is legit, or we may have\\nsome out-of-bound memory accesses.\\n\\n[ 560.897595] BUG: KASAN: slab-out-of-bounds in hdr_find_e.isra.0+0x10c/0x320\\n[ 560.898321] Read of size 2 at addr ffff888009497238 by task exp/245\\n[ 560.898760]\\n[ 560.899129] CPU: 0 PID: 245 Comm: exp Not tainted 6.0.0-rc6 #37\\n[ 560.899505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\\n[ 560.900170] Call Trace:\\n[ 560.900407] \u003cTASK\u003e\\n[ 560.900732] dump_stack_lvl+0x49/0x63\\n[ 560.901108] print_report.cold+0xf5/0x689\\n[ 560.901395] ? hdr_find_e.isra.0+0x10c/0x320\\n[ 560.901716] kasan_report+0xa7/0x130\\n[ 560.901950] ? hdr_find_e.isra.0+0x10c/0x320\\n[ 560.902208] __asan_load2+0x68/0x90\\n[ 560.902427] hdr_find_e.isra.0+0x10c/0x320\\n[ 560.902846] ? cmp_uints+0xe0/0xe0\\n[ 560.903363] ? cmp_sdh+0x90/0x90\\n[ 560.903883] ? ntfs_bread_run+0x190/0x190\\n[ 560.904196] ? rwsem_down_read_slowpath+0x750/0x750\\n[ 560.904969] ? ntfs_fix_post_read+0xe0/0x130\\n[ 560.905259] ? __kasan_check_write+0x14/0x20\\n[ 560.905599] ? up_read+0x1a/0x90\\n[ 560.905853] ? indx_read+0x22c/0x380\\n[ 560.906096] indx_find+0x2ef/0x470\\n[ 560.906352] ? indx_find_buffer+0x2d0/0x2d0\\n[ 560.906692] ? __kasan_kmalloc+0x88/0xb0\\n[ 560.906977] dir_search_u+0x196/0x2f0\\n[ 560.907220] ? ntfs_nls_to_utf16+0x450/0x450\\n[ 560.907464] ? __kasan_check_write+0x14/0x20\\n[ 560.907747] ? mutex_lock+0x8f/0xe0\\n[ 560.907970] ? __mutex_lock_slowpath+0x20/0x20\\n[ 560.908214] ? kmem_cache_alloc+0x143/0x4b0\\n[ 560.908459] ntfs_lookup+0xe0/0x100\\n[ 560.908788] __lookup_slow+0x116/0x220\\n[ 560.909050] ? lookup_fast+0x1b0/0x1b0\\n[ 560.909309] ? lookup_fast+0x13f/0x1b0\\n[ 560.909601] walk_component+0x187/0x230\\n[ 560.909944] link_path_walk.part.0+0x3f0/0x660\\n[ 560.910285] ? handle_lookup_down+0x90/0x90\\n[ 560.910618] ? path_init+0x642/0x6e0\\n[ 560.911084] ? percpu_counter_add_batch+0x6e/0xf0\\n[ 560.912559] ? __alloc_file+0x114/0x170\\n[ 560.913008] path_openat+0x19c/0x1d10\\n[ 560.913419] ? getname_flags+0x73/0x2b0\\n[ 560.913815] ? kasan_save_stack+0x3a/0x50\\n[ 560.914125] ? kasan_save_stack+0x26/0x50\\n[ 560.914542] ? __kasan_slab_alloc+0x6d/0x90\\n[ 560.914924] ? kmem_cache_alloc+0x143/0x4b0\\n[ 560.915339] ? getname_flags+0x73/0x2b0\\n[ 560.915647] ? getname+0x12/0x20\\n[ 560.916114] ? __x64_sys_open+0x4c/0x60\\n[ 560.916460] ? path_lookupat.isra.0+0x230/0x230\\n[ 560.916867] ? __isolate_free_page+0x2e0/0x2e0\\n[ 560.917194] do_filp_open+0x15c/0x1f0\\n[ 560.917448] ? may_open_dev+0x60/0x60\\n[ 560.917696] ? expand_files+0xa4/0x3a0\\n[ 560.917923] ? __kasan_check_write+0x14/0x20\\n[ 560.918185] ? _raw_spin_lock+0x88/0xdb\\n[ 560.918409] ? _raw_spin_lock_irqsave+0x100/0x100\\n[ 560.918783] ? _find_next_bit+0x4a/0x130\\n[ 560.919026] ? _raw_spin_unlock+0x19/0x40\\n[ 560.919276] ? alloc_fd+0x14b/0x2d0\\n[ 560.919635] do_sys_openat2+0x32a/0x4b0\\n[ 560.920035] ? file_open_root+0x230/0x230\\n[ 560.920336] ? __rcu_read_unlock+0x5b/0x280\\n[ 560.920813] do_sys_open+0x99/0xf0\\n[ 560.921208] ? filp_open+0x60/0x60\\n[ 560.921482] ? exit_to_user_mode_prepare+0x49/0x180\\n[ 560.921867] __x64_sys_open+0x4c/0x60\\n[ 560.922128] do_syscall_64+0x3b/0x90\\n[ 560.922369] entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n[ 560.923030] RIP: 0033:0x7f7dff2e4469\\n[ 560.923681] Code: 00 f3 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 088\\n[ 560.924451] RSP: 002b:00007ffd41a210b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000002\\n[ 560.925168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7dff2e4469\\n[ 560.925655] RDX: 0000000000000000 RSI: 0000000000000002 RDI:\\n---truncated---\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15\",\"versionEndExcluding\":\"5.15.87\",\"matchCriteriaId\":\"AF34DC7D-4D5D-4D9C-B1B4-FAE010E910F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.0.17\",\"matchCriteriaId\":\"05B2AE8A-556C-47C1-9119-DBAC5EB60947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1\",\"versionEndExcluding\":\"6.1.3\",\"matchCriteriaId\":\"70594F60-3413-4969-AFD7-965266760EA6\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3cd9e5b41b83bb57ac3cf9888f9fef2a6ef8ed96\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3f6f75e8863f41c8b3dbfd9d99e3963aaca42601\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4d42ecda239cc13738d6fd84d098a32e67b368b9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b15374365c9d10445ea7d66cdf885457a0223fc2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
GHSA-QQGG-499C-J47V
Vulnerability from github – Published: 2025-10-01 12:30 – Updated: 2026-01-20 18:31In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Validate buffer length while parsing index
indx_read is called when we have some NTFS directory operations that need more information from the index buffers. This adds a sanity check to make sure the returned index buffer length is legit, or we may have some out-of-bound memory accesses.
[ 560.897595] BUG: KASAN: slab-out-of-bounds in hdr_find_e.isra.0+0x10c/0x320 [ 560.898321] Read of size 2 at addr ffff888009497238 by task exp/245 [ 560.898760] [ 560.899129] CPU: 0 PID: 245 Comm: exp Not tainted 6.0.0-rc6 #37 [ 560.899505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 560.900170] Call Trace: [ 560.900407] [ 560.900732] dump_stack_lvl+0x49/0x63 [ 560.901108] print_report.cold+0xf5/0x689 [ 560.901395] ? hdr_find_e.isra.0+0x10c/0x320 [ 560.901716] kasan_report+0xa7/0x130 [ 560.901950] ? hdr_find_e.isra.0+0x10c/0x320 [ 560.902208] __asan_load2+0x68/0x90 [ 560.902427] hdr_find_e.isra.0+0x10c/0x320 [ 560.902846] ? cmp_uints+0xe0/0xe0 [ 560.903363] ? cmp_sdh+0x90/0x90 [ 560.903883] ? ntfs_bread_run+0x190/0x190 [ 560.904196] ? rwsem_down_read_slowpath+0x750/0x750 [ 560.904969] ? ntfs_fix_post_read+0xe0/0x130 [ 560.905259] ? __kasan_check_write+0x14/0x20 [ 560.905599] ? up_read+0x1a/0x90 [ 560.905853] ? indx_read+0x22c/0x380 [ 560.906096] indx_find+0x2ef/0x470 [ 560.906352] ? indx_find_buffer+0x2d0/0x2d0 [ 560.906692] ? __kasan_kmalloc+0x88/0xb0 [ 560.906977] dir_search_u+0x196/0x2f0 [ 560.907220] ? ntfs_nls_to_utf16+0x450/0x450 [ 560.907464] ? __kasan_check_write+0x14/0x20 [ 560.907747] ? mutex_lock+0x8f/0xe0 [ 560.907970] ? __mutex_lock_slowpath+0x20/0x20 [ 560.908214] ? kmem_cache_alloc+0x143/0x4b0 [ 560.908459] ntfs_lookup+0xe0/0x100 [ 560.908788] __lookup_slow+0x116/0x220 [ 560.909050] ? lookup_fast+0x1b0/0x1b0 [ 560.909309] ? lookup_fast+0x13f/0x1b0 [ 560.909601] walk_component+0x187/0x230 [ 560.909944] link_path_walk.part.0+0x3f0/0x660 [ 560.910285] ? handle_lookup_down+0x90/0x90 [ 560.910618] ? path_init+0x642/0x6e0 [ 560.911084] ? percpu_counter_add_batch+0x6e/0xf0 [ 560.912559] ? __alloc_file+0x114/0x170 [ 560.913008] path_openat+0x19c/0x1d10 [ 560.913419] ? getname_flags+0x73/0x2b0 [ 560.913815] ? kasan_save_stack+0x3a/0x50 [ 560.914125] ? kasan_save_stack+0x26/0x50 [ 560.914542] ? __kasan_slab_alloc+0x6d/0x90 [ 560.914924] ? kmem_cache_alloc+0x143/0x4b0 [ 560.915339] ? getname_flags+0x73/0x2b0 [ 560.915647] ? getname+0x12/0x20 [ 560.916114] ? __x64_sys_open+0x4c/0x60 [ 560.916460] ? path_lookupat.isra.0+0x230/0x230 [ 560.916867] ? __isolate_free_page+0x2e0/0x2e0 [ 560.917194] do_filp_open+0x15c/0x1f0 [ 560.917448] ? may_open_dev+0x60/0x60 [ 560.917696] ? expand_files+0xa4/0x3a0 [ 560.917923] ? __kasan_check_write+0x14/0x20 [ 560.918185] ? _raw_spin_lock+0x88/0xdb [ 560.918409] ? _raw_spin_lock_irqsave+0x100/0x100 [ 560.918783] ? _find_next_bit+0x4a/0x130 [ 560.919026] ? _raw_spin_unlock+0x19/0x40 [ 560.919276] ? alloc_fd+0x14b/0x2d0 [ 560.919635] do_sys_openat2+0x32a/0x4b0 [ 560.920035] ? file_open_root+0x230/0x230 [ 560.920336] ? __rcu_read_unlock+0x5b/0x280 [ 560.920813] do_sys_open+0x99/0xf0 [ 560.921208] ? filp_open+0x60/0x60 [ 560.921482] ? exit_to_user_mode_prepare+0x49/0x180 [ 560.921867] __x64_sys_open+0x4c/0x60 [ 560.922128] do_syscall_64+0x3b/0x90 [ 560.922369] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 560.923030] RIP: 0033:0x7f7dff2e4469 [ 560.923681] Code: 00 f3 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 088 [ 560.924451] RSP: 002b:00007ffd41a210b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000002 [ 560.925168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7dff2e4469 [ 560.925655] RDX: 0000000000000000 RSI: 0000000000000002 RDI: ---truncated---
{
"affected": [],
"aliases": [
"CVE-2022-50442"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-01T12:15:36Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate buffer length while parsing index\n\nindx_read is called when we have some NTFS directory operations that\nneed more information from the index buffers. This adds a sanity check\nto make sure the returned index buffer length is legit, or we may have\nsome out-of-bound memory accesses.\n\n[ 560.897595] BUG: KASAN: slab-out-of-bounds in hdr_find_e.isra.0+0x10c/0x320\n[ 560.898321] Read of size 2 at addr ffff888009497238 by task exp/245\n[ 560.898760]\n[ 560.899129] CPU: 0 PID: 245 Comm: exp Not tainted 6.0.0-rc6 #37\n[ 560.899505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 560.900170] Call Trace:\n[ 560.900407] \u003cTASK\u003e\n[ 560.900732] dump_stack_lvl+0x49/0x63\n[ 560.901108] print_report.cold+0xf5/0x689\n[ 560.901395] ? hdr_find_e.isra.0+0x10c/0x320\n[ 560.901716] kasan_report+0xa7/0x130\n[ 560.901950] ? hdr_find_e.isra.0+0x10c/0x320\n[ 560.902208] __asan_load2+0x68/0x90\n[ 560.902427] hdr_find_e.isra.0+0x10c/0x320\n[ 560.902846] ? cmp_uints+0xe0/0xe0\n[ 560.903363] ? cmp_sdh+0x90/0x90\n[ 560.903883] ? ntfs_bread_run+0x190/0x190\n[ 560.904196] ? rwsem_down_read_slowpath+0x750/0x750\n[ 560.904969] ? ntfs_fix_post_read+0xe0/0x130\n[ 560.905259] ? __kasan_check_write+0x14/0x20\n[ 560.905599] ? up_read+0x1a/0x90\n[ 560.905853] ? indx_read+0x22c/0x380\n[ 560.906096] indx_find+0x2ef/0x470\n[ 560.906352] ? indx_find_buffer+0x2d0/0x2d0\n[ 560.906692] ? __kasan_kmalloc+0x88/0xb0\n[ 560.906977] dir_search_u+0x196/0x2f0\n[ 560.907220] ? ntfs_nls_to_utf16+0x450/0x450\n[ 560.907464] ? __kasan_check_write+0x14/0x20\n[ 560.907747] ? mutex_lock+0x8f/0xe0\n[ 560.907970] ? __mutex_lock_slowpath+0x20/0x20\n[ 560.908214] ? kmem_cache_alloc+0x143/0x4b0\n[ 560.908459] ntfs_lookup+0xe0/0x100\n[ 560.908788] __lookup_slow+0x116/0x220\n[ 560.909050] ? lookup_fast+0x1b0/0x1b0\n[ 560.909309] ? lookup_fast+0x13f/0x1b0\n[ 560.909601] walk_component+0x187/0x230\n[ 560.909944] link_path_walk.part.0+0x3f0/0x660\n[ 560.910285] ? handle_lookup_down+0x90/0x90\n[ 560.910618] ? path_init+0x642/0x6e0\n[ 560.911084] ? percpu_counter_add_batch+0x6e/0xf0\n[ 560.912559] ? __alloc_file+0x114/0x170\n[ 560.913008] path_openat+0x19c/0x1d10\n[ 560.913419] ? getname_flags+0x73/0x2b0\n[ 560.913815] ? kasan_save_stack+0x3a/0x50\n[ 560.914125] ? kasan_save_stack+0x26/0x50\n[ 560.914542] ? __kasan_slab_alloc+0x6d/0x90\n[ 560.914924] ? kmem_cache_alloc+0x143/0x4b0\n[ 560.915339] ? getname_flags+0x73/0x2b0\n[ 560.915647] ? getname+0x12/0x20\n[ 560.916114] ? __x64_sys_open+0x4c/0x60\n[ 560.916460] ? path_lookupat.isra.0+0x230/0x230\n[ 560.916867] ? __isolate_free_page+0x2e0/0x2e0\n[ 560.917194] do_filp_open+0x15c/0x1f0\n[ 560.917448] ? may_open_dev+0x60/0x60\n[ 560.917696] ? expand_files+0xa4/0x3a0\n[ 560.917923] ? __kasan_check_write+0x14/0x20\n[ 560.918185] ? _raw_spin_lock+0x88/0xdb\n[ 560.918409] ? _raw_spin_lock_irqsave+0x100/0x100\n[ 560.918783] ? _find_next_bit+0x4a/0x130\n[ 560.919026] ? _raw_spin_unlock+0x19/0x40\n[ 560.919276] ? alloc_fd+0x14b/0x2d0\n[ 560.919635] do_sys_openat2+0x32a/0x4b0\n[ 560.920035] ? file_open_root+0x230/0x230\n[ 560.920336] ? __rcu_read_unlock+0x5b/0x280\n[ 560.920813] do_sys_open+0x99/0xf0\n[ 560.921208] ? filp_open+0x60/0x60\n[ 560.921482] ? exit_to_user_mode_prepare+0x49/0x180\n[ 560.921867] __x64_sys_open+0x4c/0x60\n[ 560.922128] do_syscall_64+0x3b/0x90\n[ 560.922369] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 560.923030] RIP: 0033:0x7f7dff2e4469\n[ 560.923681] Code: 00 f3 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 088\n[ 560.924451] RSP: 002b:00007ffd41a210b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000002\n[ 560.925168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7dff2e4469\n[ 560.925655] RDX: 0000000000000000 RSI: 0000000000000002 RDI:\n---truncated---",
"id": "GHSA-qqgg-499c-j47v",
"modified": "2026-01-20T18:31:51Z",
"published": "2025-10-01T12:30:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50442"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/3cd9e5b41b83bb57ac3cf9888f9fef2a6ef8ed96"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/3f6f75e8863f41c8b3dbfd9d99e3963aaca42601"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/4d42ecda239cc13738d6fd84d098a32e67b368b9"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/b15374365c9d10445ea7d66cdf885457a0223fc2"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2022-50442
Vulnerability from fkie_nvd - Published: 2025-10-01 12:15 - Updated: 2026-01-20 15:58| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF34DC7D-4D5D-4D9C-B1B4-FAE010E910F2",
"versionEndExcluding": "5.15.87",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05B2AE8A-556C-47C1-9119-DBAC5EB60947",
"versionEndExcluding": "6.0.17",
"versionStartIncluding": "5.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70594F60-3413-4969-AFD7-965266760EA6",
"versionEndExcluding": "6.1.3",
"versionStartIncluding": "6.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate buffer length while parsing index\n\nindx_read is called when we have some NTFS directory operations that\nneed more information from the index buffers. This adds a sanity check\nto make sure the returned index buffer length is legit, or we may have\nsome out-of-bound memory accesses.\n\n[ 560.897595] BUG: KASAN: slab-out-of-bounds in hdr_find_e.isra.0+0x10c/0x320\n[ 560.898321] Read of size 2 at addr ffff888009497238 by task exp/245\n[ 560.898760]\n[ 560.899129] CPU: 0 PID: 245 Comm: exp Not tainted 6.0.0-rc6 #37\n[ 560.899505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 560.900170] Call Trace:\n[ 560.900407] \u003cTASK\u003e\n[ 560.900732] dump_stack_lvl+0x49/0x63\n[ 560.901108] print_report.cold+0xf5/0x689\n[ 560.901395] ? hdr_find_e.isra.0+0x10c/0x320\n[ 560.901716] kasan_report+0xa7/0x130\n[ 560.901950] ? hdr_find_e.isra.0+0x10c/0x320\n[ 560.902208] __asan_load2+0x68/0x90\n[ 560.902427] hdr_find_e.isra.0+0x10c/0x320\n[ 560.902846] ? cmp_uints+0xe0/0xe0\n[ 560.903363] ? cmp_sdh+0x90/0x90\n[ 560.903883] ? ntfs_bread_run+0x190/0x190\n[ 560.904196] ? rwsem_down_read_slowpath+0x750/0x750\n[ 560.904969] ? ntfs_fix_post_read+0xe0/0x130\n[ 560.905259] ? __kasan_check_write+0x14/0x20\n[ 560.905599] ? up_read+0x1a/0x90\n[ 560.905853] ? indx_read+0x22c/0x380\n[ 560.906096] indx_find+0x2ef/0x470\n[ 560.906352] ? indx_find_buffer+0x2d0/0x2d0\n[ 560.906692] ? __kasan_kmalloc+0x88/0xb0\n[ 560.906977] dir_search_u+0x196/0x2f0\n[ 560.907220] ? ntfs_nls_to_utf16+0x450/0x450\n[ 560.907464] ? __kasan_check_write+0x14/0x20\n[ 560.907747] ? mutex_lock+0x8f/0xe0\n[ 560.907970] ? __mutex_lock_slowpath+0x20/0x20\n[ 560.908214] ? kmem_cache_alloc+0x143/0x4b0\n[ 560.908459] ntfs_lookup+0xe0/0x100\n[ 560.908788] __lookup_slow+0x116/0x220\n[ 560.909050] ? lookup_fast+0x1b0/0x1b0\n[ 560.909309] ? lookup_fast+0x13f/0x1b0\n[ 560.909601] walk_component+0x187/0x230\n[ 560.909944] link_path_walk.part.0+0x3f0/0x660\n[ 560.910285] ? handle_lookup_down+0x90/0x90\n[ 560.910618] ? path_init+0x642/0x6e0\n[ 560.911084] ? percpu_counter_add_batch+0x6e/0xf0\n[ 560.912559] ? __alloc_file+0x114/0x170\n[ 560.913008] path_openat+0x19c/0x1d10\n[ 560.913419] ? getname_flags+0x73/0x2b0\n[ 560.913815] ? kasan_save_stack+0x3a/0x50\n[ 560.914125] ? kasan_save_stack+0x26/0x50\n[ 560.914542] ? __kasan_slab_alloc+0x6d/0x90\n[ 560.914924] ? kmem_cache_alloc+0x143/0x4b0\n[ 560.915339] ? getname_flags+0x73/0x2b0\n[ 560.915647] ? getname+0x12/0x20\n[ 560.916114] ? __x64_sys_open+0x4c/0x60\n[ 560.916460] ? path_lookupat.isra.0+0x230/0x230\n[ 560.916867] ? __isolate_free_page+0x2e0/0x2e0\n[ 560.917194] do_filp_open+0x15c/0x1f0\n[ 560.917448] ? may_open_dev+0x60/0x60\n[ 560.917696] ? expand_files+0xa4/0x3a0\n[ 560.917923] ? __kasan_check_write+0x14/0x20\n[ 560.918185] ? _raw_spin_lock+0x88/0xdb\n[ 560.918409] ? _raw_spin_lock_irqsave+0x100/0x100\n[ 560.918783] ? _find_next_bit+0x4a/0x130\n[ 560.919026] ? _raw_spin_unlock+0x19/0x40\n[ 560.919276] ? alloc_fd+0x14b/0x2d0\n[ 560.919635] do_sys_openat2+0x32a/0x4b0\n[ 560.920035] ? file_open_root+0x230/0x230\n[ 560.920336] ? __rcu_read_unlock+0x5b/0x280\n[ 560.920813] do_sys_open+0x99/0xf0\n[ 560.921208] ? filp_open+0x60/0x60\n[ 560.921482] ? exit_to_user_mode_prepare+0x49/0x180\n[ 560.921867] __x64_sys_open+0x4c/0x60\n[ 560.922128] do_syscall_64+0x3b/0x90\n[ 560.922369] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 560.923030] RIP: 0033:0x7f7dff2e4469\n[ 560.923681] Code: 00 f3 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 088\n[ 560.924451] RSP: 002b:00007ffd41a210b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000002\n[ 560.925168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7dff2e4469\n[ 560.925655] RDX: 0000000000000000 RSI: 0000000000000002 RDI:\n---truncated---"
}
],
"id": "CVE-2022-50442",
"lastModified": "2026-01-20T15:58:51.973",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-10-01T12:15:36.433",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/3cd9e5b41b83bb57ac3cf9888f9fef2a6ef8ed96"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/3f6f75e8863f41c8b3dbfd9d99e3963aaca42601"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/4d42ecda239cc13738d6fd84d098a32e67b368b9"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/b15374365c9d10445ea7d66cdf885457a0223fc2"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2025-2187
Vulnerability from csaf_certbund - Published: 2025-10-01 22:00 - Updated: 2026-02-15 23:00{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und um nicht n\u00e4here beschriebene Effekte zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2187 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2187.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2187 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2187"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2021-4460",
"url": "https://lore.kernel.org/linux-cve-announce/2025100114-CVE-2021-4460-aa71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50420",
"url": "https://lore.kernel.org/linux-cve-announce/2025100152-CVE-2022-50420-1d36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50421",
"url": "https://lore.kernel.org/linux-cve-announce/2025100155-CVE-2022-50421-8bdc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50422",
"url": "https://lore.kernel.org/linux-cve-announce/2025100155-CVE-2022-50422-287b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50423",
"url": "https://lore.kernel.org/linux-cve-announce/2025100155-CVE-2022-50423-5a66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50424",
"url": "https://lore.kernel.org/linux-cve-announce/2025100156-CVE-2022-50424-049f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50425",
"url": "https://lore.kernel.org/linux-cve-announce/2025100156-CVE-2022-50425-6722@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50426",
"url": "https://lore.kernel.org/linux-cve-announce/2025100156-CVE-2022-50426-a61b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50427",
"url": "https://lore.kernel.org/linux-cve-announce/2025100157-CVE-2022-50427-87b9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50428",
"url": "https://lore.kernel.org/linux-cve-announce/2025100157-CVE-2022-50428-0c76@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50429",
"url": "https://lore.kernel.org/linux-cve-announce/2025100157-CVE-2022-50429-4bc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50430",
"url": "https://lore.kernel.org/linux-cve-announce/2025100157-CVE-2022-50430-568d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50431",
"url": "https://lore.kernel.org/linux-cve-announce/2025100158-CVE-2022-50431-b165@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50432",
"url": "https://lore.kernel.org/linux-cve-announce/2025100158-CVE-2022-50432-bb35@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50433",
"url": "https://lore.kernel.org/linux-cve-announce/2025100158-CVE-2022-50433-440b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50434",
"url": "https://lore.kernel.org/linux-cve-announce/2025100159-CVE-2022-50434-e4db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50435",
"url": "https://lore.kernel.org/linux-cve-announce/2025100159-CVE-2022-50435-f6c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50436",
"url": "https://lore.kernel.org/linux-cve-announce/2025100159-CVE-2022-50436-ad37@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50437",
"url": "https://lore.kernel.org/linux-cve-announce/2025100100-CVE-2022-50437-440f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50438",
"url": "https://lore.kernel.org/linux-cve-announce/2025100100-CVE-2022-50438-1760@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50439",
"url": "https://lore.kernel.org/linux-cve-announce/2025100100-CVE-2022-50439-6054@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50440",
"url": "https://lore.kernel.org/linux-cve-announce/2025100101-CVE-2022-50440-1afd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50441",
"url": "https://lore.kernel.org/linux-cve-announce/2025100101-CVE-2022-50441-e2e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50442",
"url": "https://lore.kernel.org/linux-cve-announce/2025100101-CVE-2022-50442-c0fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50443",
"url": "https://lore.kernel.org/linux-cve-announce/2025100102-CVE-2022-50443-c1d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50444",
"url": "https://lore.kernel.org/linux-cve-announce/2025100102-CVE-2022-50444-9b11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50445",
"url": "https://lore.kernel.org/linux-cve-announce/2025100115-CVE-2022-50445-5873@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50446",
"url": "https://lore.kernel.org/linux-cve-announce/2025100115-CVE-2022-50446-94be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50447",
"url": "https://lore.kernel.org/linux-cve-announce/2025100115-CVE-2022-50447-4de6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50448",
"url": "https://lore.kernel.org/linux-cve-announce/2025100116-CVE-2022-50448-922e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50449",
"url": "https://lore.kernel.org/linux-cve-announce/2025100116-CVE-2022-50449-214c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50450",
"url": "https://lore.kernel.org/linux-cve-announce/2025100116-CVE-2022-50450-7ef7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50451",
"url": "https://lore.kernel.org/linux-cve-announce/2025100117-CVE-2022-50451-418f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50452",
"url": "https://lore.kernel.org/linux-cve-announce/2025100117-CVE-2022-50452-055d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50453",
"url": "https://lore.kernel.org/linux-cve-announce/2025100117-CVE-2022-50453-204a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50454",
"url": "https://lore.kernel.org/linux-cve-announce/2025100118-CVE-2022-50454-9c7d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50455",
"url": "https://lore.kernel.org/linux-cve-announce/2025100118-CVE-2022-50455-24fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50456",
"url": "https://lore.kernel.org/linux-cve-announce/2025100118-CVE-2022-50456-f0d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50457",
"url": "https://lore.kernel.org/linux-cve-announce/2025100118-CVE-2022-50457-da35@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50458",
"url": "https://lore.kernel.org/linux-cve-announce/2025100119-CVE-2022-50458-4fa8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50459",
"url": "https://lore.kernel.org/linux-cve-announce/2025100119-CVE-2022-50459-2340@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50460",
"url": "https://lore.kernel.org/linux-cve-announce/2025100119-CVE-2022-50460-2149@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50461",
"url": "https://lore.kernel.org/linux-cve-announce/2025100120-CVE-2022-50461-5ee8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50462",
"url": "https://lore.kernel.org/linux-cve-announce/2025100120-CVE-2022-50462-a935@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50463",
"url": "https://lore.kernel.org/linux-cve-announce/2025100120-CVE-2022-50463-9ae6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50464",
"url": "https://lore.kernel.org/linux-cve-announce/2025100121-CVE-2022-50464-3c96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50465",
"url": "https://lore.kernel.org/linux-cve-announce/2025100121-CVE-2022-50465-fb12@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50466",
"url": "https://lore.kernel.org/linux-cve-announce/2025100121-CVE-2022-50466-b59c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50467",
"url": "https://lore.kernel.org/linux-cve-announce/2025100122-CVE-2022-50467-13ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50468",
"url": "https://lore.kernel.org/linux-cve-announce/2025100122-CVE-2022-50468-3196@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50469",
"url": "https://lore.kernel.org/linux-cve-announce/2025100122-CVE-2022-50469-bbc4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53448",
"url": "https://lore.kernel.org/linux-cve-announce/2025100102-CVE-2023-53448-e125@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53449",
"url": "https://lore.kernel.org/linux-cve-announce/2025100103-CVE-2023-53449-b49f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53450",
"url": "https://lore.kernel.org/linux-cve-announce/2025100103-CVE-2023-53450-35c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53451",
"url": "https://lore.kernel.org/linux-cve-announce/2025100103-CVE-2023-53451-bb02@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53452",
"url": "https://lore.kernel.org/linux-cve-announce/2025100104-CVE-2023-53452-f6e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53453",
"url": "https://lore.kernel.org/linux-cve-announce/2025100104-CVE-2023-53453-c36d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53454",
"url": "https://lore.kernel.org/linux-cve-announce/2025100104-CVE-2023-53454-5ee6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53455",
"url": "https://lore.kernel.org/linux-cve-announce/2025100104-CVE-2023-53455-3efb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53456",
"url": "https://lore.kernel.org/linux-cve-announce/2025100105-CVE-2023-53456-b77a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53457",
"url": "https://lore.kernel.org/linux-cve-announce/2025100105-CVE-2023-53457-629a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53458",
"url": "https://lore.kernel.org/linux-cve-announce/2025100105-CVE-2023-53458-8239@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53459",
"url": "https://lore.kernel.org/linux-cve-announce/2025100106-CVE-2023-53459-48f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53460",
"url": "https://lore.kernel.org/linux-cve-announce/2025100106-CVE-2023-53460-cdc8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53461",
"url": "https://lore.kernel.org/linux-cve-announce/2025100106-CVE-2023-53461-b02b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53462",
"url": "https://lore.kernel.org/linux-cve-announce/2025100107-CVE-2023-53462-7a33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53463",
"url": "https://lore.kernel.org/linux-cve-announce/2025100107-CVE-2023-53463-49fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53464",
"url": "https://lore.kernel.org/linux-cve-announce/2025100107-CVE-2023-53464-a397@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53465",
"url": "https://lore.kernel.org/linux-cve-announce/2025100108-CVE-2023-53465-eb0b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53466",
"url": "https://lore.kernel.org/linux-cve-announce/2025100108-CVE-2023-53466-dcff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53467",
"url": "https://lore.kernel.org/linux-cve-announce/2025100108-CVE-2023-53467-fa4b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53468",
"url": "https://lore.kernel.org/linux-cve-announce/2025100109-CVE-2023-53468-8dea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53469",
"url": "https://lore.kernel.org/linux-cve-announce/2025100109-CVE-2023-53469-e372@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53470",
"url": "https://lore.kernel.org/linux-cve-announce/2025100109-CVE-2023-53470-8c6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53471",
"url": "https://lore.kernel.org/linux-cve-announce/2025100110-CVE-2023-53471-09f6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53472",
"url": "https://lore.kernel.org/linux-cve-announce/2025100110-CVE-2023-53472-93cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53473",
"url": "https://lore.kernel.org/linux-cve-announce/2025100110-CVE-2023-53473-bf5d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53474",
"url": "https://lore.kernel.org/linux-cve-announce/2025100110-CVE-2023-53474-b2ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53475",
"url": "https://lore.kernel.org/linux-cve-announce/2025100111-CVE-2023-53475-b007@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53476",
"url": "https://lore.kernel.org/linux-cve-announce/2025100111-CVE-2023-53476-d6d3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53477",
"url": "https://lore.kernel.org/linux-cve-announce/2025100111-CVE-2023-53477-93d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53478",
"url": "https://lore.kernel.org/linux-cve-announce/2025100112-CVE-2023-53478-3da0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53479",
"url": "https://lore.kernel.org/linux-cve-announce/2025100112-CVE-2023-53479-5c70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53480",
"url": "https://lore.kernel.org/linux-cve-announce/2025100112-CVE-2023-53480-95ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53481",
"url": "https://lore.kernel.org/linux-cve-announce/2025100113-CVE-2023-53481-cddb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53482",
"url": "https://lore.kernel.org/linux-cve-announce/2025100113-CVE-2023-53482-ade3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53483",
"url": "https://lore.kernel.org/linux-cve-announce/2025100113-CVE-2023-53483-cf50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53484",
"url": "https://lore.kernel.org/linux-cve-announce/2025100114-CVE-2023-53484-d863@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53485",
"url": "https://lore.kernel.org/linux-cve-announce/2025100114-CVE-2023-53485-672c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53486",
"url": "https://lore.kernel.org/linux-cve-announce/2025100114-CVE-2023-53486-455f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53487",
"url": "https://lore.kernel.org/linux-cve-announce/2025100115-CVE-2023-53487-c3f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53488",
"url": "https://lore.kernel.org/linux-cve-announce/2025100123-CVE-2023-53488-2533@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53489",
"url": "https://lore.kernel.org/linux-cve-announce/2025100123-CVE-2023-53489-eec5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53490",
"url": "https://lore.kernel.org/linux-cve-announce/2025100123-CVE-2023-53490-c90f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53491",
"url": "https://lore.kernel.org/linux-cve-announce/2025100123-CVE-2023-53491-2d8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53492",
"url": "https://lore.kernel.org/linux-cve-announce/2025100124-CVE-2023-53492-18fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53493",
"url": "https://lore.kernel.org/linux-cve-announce/2025100124-CVE-2023-53493-ef00@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53494",
"url": "https://lore.kernel.org/linux-cve-announce/2025100124-CVE-2023-53494-6542@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53495",
"url": "https://lore.kernel.org/linux-cve-announce/2025100125-CVE-2023-53495-3cce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53496",
"url": "https://lore.kernel.org/linux-cve-announce/2025100125-CVE-2023-53496-b145@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53497",
"url": "https://lore.kernel.org/linux-cve-announce/2025100125-CVE-2023-53497-e3a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53498",
"url": "https://lore.kernel.org/linux-cve-announce/2025100126-CVE-2023-53498-3f4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53499",
"url": "https://lore.kernel.org/linux-cve-announce/2025100126-CVE-2023-53499-0e6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53500",
"url": "https://lore.kernel.org/linux-cve-announce/2025100126-CVE-2023-53500-61b6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53501",
"url": "https://lore.kernel.org/linux-cve-announce/2025100127-CVE-2023-53501-5859@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53502",
"url": "https://lore.kernel.org/linux-cve-announce/2025100127-CVE-2023-53502-aa6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53503",
"url": "https://lore.kernel.org/linux-cve-announce/2025100127-CVE-2023-53503-d86c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53504",
"url": "https://lore.kernel.org/linux-cve-announce/2025100128-CVE-2023-53504-ccc8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53505",
"url": "https://lore.kernel.org/linux-cve-announce/2025100128-CVE-2023-53505-69f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53506",
"url": "https://lore.kernel.org/linux-cve-announce/2025100128-CVE-2023-53506-2778@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53507",
"url": "https://lore.kernel.org/linux-cve-announce/2025100129-CVE-2023-53507-1165@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53508",
"url": "https://lore.kernel.org/linux-cve-announce/2025100129-CVE-2023-53508-20d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53509",
"url": "https://lore.kernel.org/linux-cve-announce/2025100129-CVE-2023-53509-2b4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53510",
"url": "https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53510-9e6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53511",
"url": "https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53511-99e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53512",
"url": "https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53512-10c7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53513",
"url": "https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53513-4667@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53514",
"url": "https://lore.kernel.org/linux-cve-announce/2025100131-CVE-2023-53514-bcd5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53515",
"url": "https://lore.kernel.org/linux-cve-announce/2025100131-CVE-2023-53515-abe8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53516",
"url": "https://lore.kernel.org/linux-cve-announce/2025100131-CVE-2023-53516-ca63@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53517",
"url": "https://lore.kernel.org/linux-cve-announce/2025100132-CVE-2023-53517-da77@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53518",
"url": "https://lore.kernel.org/linux-cve-announce/2025100132-CVE-2023-53518-64e1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53519",
"url": "https://lore.kernel.org/linux-cve-announce/2025100132-CVE-2023-53519-de9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53520",
"url": "https://lore.kernel.org/linux-cve-announce/2025100133-CVE-2023-53520-a542@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53521",
"url": "https://lore.kernel.org/linux-cve-announce/2025100133-CVE-2023-53521-15e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53522",
"url": "https://lore.kernel.org/linux-cve-announce/2025100133-CVE-2023-53522-4e19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53523",
"url": "https://lore.kernel.org/linux-cve-announce/2025100134-CVE-2023-53523-f4d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53524",
"url": "https://lore.kernel.org/linux-cve-announce/2025100134-CVE-2023-53524-d438@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53525",
"url": "https://lore.kernel.org/linux-cve-announce/2025100134-CVE-2023-53525-ee57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53526",
"url": "https://lore.kernel.org/linux-cve-announce/2025100135-CVE-2023-53526-ee71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53527",
"url": "https://lore.kernel.org/linux-cve-announce/2025100135-CVE-2023-53527-3ce7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53528",
"url": "https://lore.kernel.org/linux-cve-announce/2025100135-CVE-2023-53528-0572@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53529",
"url": "https://lore.kernel.org/linux-cve-announce/2025100136-CVE-2023-53529-db9a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53530",
"url": "https://lore.kernel.org/linux-cve-announce/2025100136-CVE-2023-53530-853b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53531",
"url": "https://lore.kernel.org/linux-cve-announce/2025100136-CVE-2023-53531-3c7c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53532",
"url": "https://lore.kernel.org/linux-cve-announce/2025100137-CVE-2023-53532-1627@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-281 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-281.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-273 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-273.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-272 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-272.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-274 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-274.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-109 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-109.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-271 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-271.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-113 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-113.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3053 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3053.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-280 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-280.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-275 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-275.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-276 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-276.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-282 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-282.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-279 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-279.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-278 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-278.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-277 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-277.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19409 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19409"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19409 vom 2025-11-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-19409.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21051 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21051"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21091 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21091"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21128 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21128"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21112 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21112"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21136 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21136"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4111-1 vom 2025-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4135-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21760 vom 2025-11-19",
"url": "https://access.redhat.com/errata/RHSA-2025:21760"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4139-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4149-1 vom 2025-11-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4188-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVPUJWNDCBFGM2O2EFX4S5QBPKDARVQ7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4213-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BMIF3SMKFBUMCZYFRUM2RM62ZVJXJF7B/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4203-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VT2ZCGNR6WCCH4AKUSKN3OANW5W3U3LW/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22095 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22095"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22124 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22124"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21926 vom 2025-11-26",
"url": "http://linux.oracle.com/errata/ELSA-2025-21926.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21112 vom 2025-11-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-21112.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21469 vom 2025-11-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-21469.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4285-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023421.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22387 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22387"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22388 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22388"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22388 vom 2025-12-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-22388.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22387 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22387"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22388 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22388"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4320-1 vom 2025-12-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23424 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23424"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23426 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23426"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7255154 vom 2025-12-17",
"url": "https://www.ibm.com/support/pages/node/7255154"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0533 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0533"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0534 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0534"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0535 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0535"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0532 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0532"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0536 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0536"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-030 vom 2026-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20332-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20316-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2026-02-15T23:00:00.000+00:00",
"generator": {
"date": "2026-02-16T11:40:27.738+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2187",
"initial_release_date": "2025-10-01T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-02T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-20T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "34"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vProxy \u003c19.14",
"product": {
"name": "Dell NetWorker vProxy \u003c19.14",
"product_id": "T050451"
}
},
{
"category": "product_version",
"name": "vProxy 19.14",
"product": {
"name": "Dell NetWorker vProxy 19.14",
"product_id": "T050451-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.14"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF03",
"product_id": "T049499"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF03",
"product_id": "T049499-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if03"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4460",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2021-4460"
},
{
"cve": "CVE-2022-50420",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50420"
},
{
"cve": "CVE-2022-50421",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50421"
},
{
"cve": "CVE-2022-50422",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50422"
},
{
"cve": "CVE-2022-50423",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50423"
},
{
"cve": "CVE-2022-50424",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50424"
},
{
"cve": "CVE-2022-50425",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50425"
},
{
"cve": "CVE-2022-50426",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50426"
},
{
"cve": "CVE-2022-50427",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50427"
},
{
"cve": "CVE-2022-50428",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50428"
},
{
"cve": "CVE-2022-50429",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50429"
},
{
"cve": "CVE-2022-50430",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50430"
},
{
"cve": "CVE-2022-50431",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50431"
},
{
"cve": "CVE-2022-50432",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50432"
},
{
"cve": "CVE-2022-50433",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50433"
},
{
"cve": "CVE-2022-50434",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50434"
},
{
"cve": "CVE-2022-50435",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50435"
},
{
"cve": "CVE-2022-50436",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50436"
},
{
"cve": "CVE-2022-50437",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50437"
},
{
"cve": "CVE-2022-50438",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50438"
},
{
"cve": "CVE-2022-50439",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50439"
},
{
"cve": "CVE-2022-50440",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50440"
},
{
"cve": "CVE-2022-50441",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50441"
},
{
"cve": "CVE-2022-50442",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50442"
},
{
"cve": "CVE-2022-50443",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50443"
},
{
"cve": "CVE-2022-50444",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50444"
},
{
"cve": "CVE-2022-50445",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50445"
},
{
"cve": "CVE-2022-50446",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50446"
},
{
"cve": "CVE-2022-50447",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50447"
},
{
"cve": "CVE-2022-50448",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50448"
},
{
"cve": "CVE-2022-50449",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50449"
},
{
"cve": "CVE-2022-50450",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50450"
},
{
"cve": "CVE-2022-50451",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50451"
},
{
"cve": "CVE-2022-50452",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50452"
},
{
"cve": "CVE-2022-50453",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50453"
},
{
"cve": "CVE-2022-50454",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50454"
},
{
"cve": "CVE-2022-50455",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50455"
},
{
"cve": "CVE-2022-50456",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50456"
},
{
"cve": "CVE-2022-50457",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50457"
},
{
"cve": "CVE-2022-50458",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50458"
},
{
"cve": "CVE-2022-50459",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50459"
},
{
"cve": "CVE-2022-50460",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50460"
},
{
"cve": "CVE-2022-50461",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50461"
},
{
"cve": "CVE-2022-50462",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50462"
},
{
"cve": "CVE-2022-50463",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50463"
},
{
"cve": "CVE-2022-50464",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50464"
},
{
"cve": "CVE-2022-50465",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50465"
},
{
"cve": "CVE-2022-50466",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50466"
},
{
"cve": "CVE-2022-50467",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50467"
},
{
"cve": "CVE-2022-50468",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50468"
},
{
"cve": "CVE-2022-50469",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50469"
},
{
"cve": "CVE-2023-34319",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-34319"
},
{
"cve": "CVE-2023-3773",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-3773"
},
{
"cve": "CVE-2023-53448",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53448"
},
{
"cve": "CVE-2023-53449",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53449"
},
{
"cve": "CVE-2023-53450",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53450"
},
{
"cve": "CVE-2023-53451",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53451"
},
{
"cve": "CVE-2023-53452",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53452"
},
{
"cve": "CVE-2023-53453",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53453"
},
{
"cve": "CVE-2023-53454",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53454"
},
{
"cve": "CVE-2023-53455",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53455"
},
{
"cve": "CVE-2023-53456",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53456"
},
{
"cve": "CVE-2023-53457",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53457"
},
{
"cve": "CVE-2023-53458",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53458"
},
{
"cve": "CVE-2023-53459",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53459"
},
{
"cve": "CVE-2023-53460",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53460"
},
{
"cve": "CVE-2023-53461",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53461"
},
{
"cve": "CVE-2023-53462",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53462"
},
{
"cve": "CVE-2023-53463",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53463"
},
{
"cve": "CVE-2023-53464",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53464"
},
{
"cve": "CVE-2023-53465",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53465"
},
{
"cve": "CVE-2023-53466",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53466"
},
{
"cve": "CVE-2023-53467",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53467"
},
{
"cve": "CVE-2023-53468",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53468"
},
{
"cve": "CVE-2023-53469",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53469"
},
{
"cve": "CVE-2023-53470",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53470"
},
{
"cve": "CVE-2023-53471",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53471"
},
{
"cve": "CVE-2023-53472",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53472"
},
{
"cve": "CVE-2023-53473",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53473"
},
{
"cve": "CVE-2023-53474",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53474"
},
{
"cve": "CVE-2023-53475",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53475"
},
{
"cve": "CVE-2023-53476",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53476"
},
{
"cve": "CVE-2023-53477",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53477"
},
{
"cve": "CVE-2023-53478",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53478"
},
{
"cve": "CVE-2023-53479",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53479"
},
{
"cve": "CVE-2023-53480",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53480"
},
{
"cve": "CVE-2023-53481",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53481"
},
{
"cve": "CVE-2023-53482",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53482"
},
{
"cve": "CVE-2023-53483",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53483"
},
{
"cve": "CVE-2023-53484",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53484"
},
{
"cve": "CVE-2023-53485",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53485"
},
{
"cve": "CVE-2023-53486",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53486"
},
{
"cve": "CVE-2023-53487",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53487"
},
{
"cve": "CVE-2023-53488",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53488"
},
{
"cve": "CVE-2023-53489",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53489"
},
{
"cve": "CVE-2023-53490",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53490"
},
{
"cve": "CVE-2023-53491",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53491"
},
{
"cve": "CVE-2023-53492",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53492"
},
{
"cve": "CVE-2023-53493",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53493"
},
{
"cve": "CVE-2023-53494",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53494"
},
{
"cve": "CVE-2023-53495",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53495"
},
{
"cve": "CVE-2023-53496",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53496"
},
{
"cve": "CVE-2023-53497",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53497"
},
{
"cve": "CVE-2023-53498",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53498"
},
{
"cve": "CVE-2023-53499",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53499"
},
{
"cve": "CVE-2023-53500",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53500"
},
{
"cve": "CVE-2023-53501",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53501"
},
{
"cve": "CVE-2023-53502",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53502"
},
{
"cve": "CVE-2023-53503",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53503"
},
{
"cve": "CVE-2023-53504",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53504"
},
{
"cve": "CVE-2023-53505",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53505"
},
{
"cve": "CVE-2023-53506",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53506"
},
{
"cve": "CVE-2023-53507",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53507"
},
{
"cve": "CVE-2023-53508",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53508"
},
{
"cve": "CVE-2023-53509",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53509"
},
{
"cve": "CVE-2023-53510",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53510"
},
{
"cve": "CVE-2023-53511",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53511"
},
{
"cve": "CVE-2023-53512",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53512"
},
{
"cve": "CVE-2023-53513",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53513"
},
{
"cve": "CVE-2023-53514",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53514"
},
{
"cve": "CVE-2023-53515",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53515"
},
{
"cve": "CVE-2023-53516",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53516"
},
{
"cve": "CVE-2023-53517",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53517"
},
{
"cve": "CVE-2023-53518",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53518"
},
{
"cve": "CVE-2023-53519",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53519"
},
{
"cve": "CVE-2023-53520",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53520"
},
{
"cve": "CVE-2023-53521",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53521"
},
{
"cve": "CVE-2023-53522",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53522"
},
{
"cve": "CVE-2023-53523",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53523"
},
{
"cve": "CVE-2023-53524",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53524"
},
{
"cve": "CVE-2023-53525",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53525"
},
{
"cve": "CVE-2023-53526",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53526"
},
{
"cve": "CVE-2023-53527",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53527"
},
{
"cve": "CVE-2023-53528",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53528"
},
{
"cve": "CVE-2023-53529",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53529"
},
{
"cve": "CVE-2023-53530",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53530"
},
{
"cve": "CVE-2023-53531",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53531"
},
{
"cve": "CVE-2023-53532",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T049499",
"398363",
"T004914",
"T050451",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53532"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.