Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-50737 (GCVE-0-2022-50737)
Vulnerability from cvelistv5 – Published: 2025-12-24 13:05 – Updated: 2026-01-02 15:04| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
82cae269cfa953032fbb8980a7d554d60fb00b17 , < d7ce7bb6881aae186e50f57eea935cff8d504751
(git)
Affected: 82cae269cfa953032fbb8980a7d554d60fb00b17 , < 24ee53c6bce15500db22f2a7aee9dd830e806c90 (git) Affected: 82cae269cfa953032fbb8980a7d554d60fb00b17 , < d6379ce242960a8e9ecd6ff76f476d9336c21f16 (git) Affected: 82cae269cfa953032fbb8980a7d554d60fb00b17 , < bfcdbae0523bd95eb75a739ffb6221a37109881e (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/ntfs3/fsntfs.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "d7ce7bb6881aae186e50f57eea935cff8d504751",
"status": "affected",
"version": "82cae269cfa953032fbb8980a7d554d60fb00b17",
"versionType": "git"
},
{
"lessThan": "24ee53c6bce15500db22f2a7aee9dd830e806c90",
"status": "affected",
"version": "82cae269cfa953032fbb8980a7d554d60fb00b17",
"versionType": "git"
},
{
"lessThan": "d6379ce242960a8e9ecd6ff76f476d9336c21f16",
"status": "affected",
"version": "82cae269cfa953032fbb8980a7d554d60fb00b17",
"versionType": "git"
},
{
"lessThan": "bfcdbae0523bd95eb75a739ffb6221a37109881e",
"status": "affected",
"version": "82cae269cfa953032fbb8980a7d554d60fb00b17",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/ntfs3/fsntfs.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.15"
},
{
"lessThan": "5.15",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.87",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.0.*",
"status": "unaffected",
"version": "6.0.17",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.2",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.87",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.17",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.3",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"versionStartIncluding": "5.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate index root when initialize NTFS security\n\nThis enhances the sanity check for $SDH and $SII while initializing NTFS\nsecurity, guarantees these index root are legit.\n\n[ 162.459513] BUG: KASAN: use-after-free in hdr_find_e.isra.0+0x10c/0x320\n[ 162.460176] Read of size 2 at addr ffff8880037bca99 by task mount/243\n[ 162.460851]\n[ 162.461252] CPU: 0 PID: 243 Comm: mount Not tainted 6.0.0-rc7 #42\n[ 162.461744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 162.462609] Call Trace:\n[ 162.462954] \u003cTASK\u003e\n[ 162.463276] dump_stack_lvl+0x49/0x63\n[ 162.463822] print_report.cold+0xf5/0x689\n[ 162.464608] ? unwind_get_return_address+0x3a/0x60\n[ 162.465766] ? hdr_find_e.isra.0+0x10c/0x320\n[ 162.466975] kasan_report+0xa7/0x130\n[ 162.467506] ? _raw_spin_lock_irq+0xc0/0xf0\n[ 162.467998] ? hdr_find_e.isra.0+0x10c/0x320\n[ 162.468536] __asan_load2+0x68/0x90\n[ 162.468923] hdr_find_e.isra.0+0x10c/0x320\n[ 162.469282] ? cmp_uints+0xe0/0xe0\n[ 162.469557] ? cmp_sdh+0x90/0x90\n[ 162.469864] ? ni_find_attr+0x214/0x300\n[ 162.470217] ? ni_load_mi+0x80/0x80\n[ 162.470479] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 162.470931] ? ntfs_bread_run+0x190/0x190\n[ 162.471307] ? indx_get_root+0xe4/0x190\n[ 162.471556] ? indx_get_root+0x140/0x190\n[ 162.471833] ? indx_init+0x1e0/0x1e0\n[ 162.472069] ? fnd_clear+0x115/0x140\n[ 162.472363] ? _raw_spin_lock_irqsave+0x100/0x100\n[ 162.472731] indx_find+0x184/0x470\n[ 162.473461] ? sysvec_apic_timer_interrupt+0x57/0xc0\n[ 162.474429] ? indx_find_buffer+0x2d0/0x2d0\n[ 162.474704] ? do_syscall_64+0x3b/0x90\n[ 162.474962] dir_search_u+0x196/0x2f0\n[ 162.475381] ? ntfs_nls_to_utf16+0x450/0x450\n[ 162.475661] ? ntfs_security_init+0x3d6/0x440\n[ 162.475906] ? is_sd_valid+0x180/0x180\n[ 162.476191] ntfs_extend_init+0x13f/0x2c0\n[ 162.476496] ? ntfs_fix_post_read+0x130/0x130\n[ 162.476861] ? iput.part.0+0x286/0x320\n[ 162.477325] ntfs_fill_super+0x11e0/0x1b50\n[ 162.477709] ? put_ntfs+0x1d0/0x1d0\n[ 162.477970] ? vsprintf+0x20/0x20\n[ 162.478258] ? set_blocksize+0x95/0x150\n[ 162.478538] get_tree_bdev+0x232/0x370\n[ 162.478789] ? put_ntfs+0x1d0/0x1d0\n[ 162.479038] ntfs_fs_get_tree+0x15/0x20\n[ 162.479374] vfs_get_tree+0x4c/0x130\n[ 162.479729] path_mount+0x654/0xfe0\n[ 162.480124] ? putname+0x80/0xa0\n[ 162.480484] ? finish_automount+0x2e0/0x2e0\n[ 162.480894] ? putname+0x80/0xa0\n[ 162.481467] ? kmem_cache_free+0x1c4/0x440\n[ 162.482280] ? putname+0x80/0xa0\n[ 162.482714] do_mount+0xd6/0xf0\n[ 162.483264] ? path_mount+0xfe0/0xfe0\n[ 162.484782] ? __kasan_check_write+0x14/0x20\n[ 162.485593] __x64_sys_mount+0xca/0x110\n[ 162.486024] do_syscall_64+0x3b/0x90\n[ 162.486543] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 162.487141] RIP: 0033:0x7f9d374e948a\n[ 162.488324] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[ 162.489728] RSP: 002b:00007ffe30e73d18 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5\n[ 162.490971] RAX: ffffffffffffffda RBX: 0000561cdb43a060 RCX: 00007f9d374e948a\n[ 162.491669] RDX: 0000561cdb43a260 RSI: 0000561cdb43a2e0 RDI: 0000561cdb442af0\n[ 162.492050] RBP: 0000000000000000 R08: 0000561cdb43a280 R09: 0000000000000020\n[ 162.492459] R10: 00000000c0ed0000 R11: 0000000000000206 R12: 0000561cdb442af0\n[ 162.493183] R13: 0000561cdb43a260 R14: 0000000000000000 R15: 00000000ffffffff\n[ 162.493644] \u003c/TASK\u003e\n[ 162.493908]\n[ 162.494214] The buggy address belongs to the physical page:\n[ 162.494761] page:000000003e38a3d5 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x37bc\n[ 162.496064] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff)\n[ 162.497278] raw: 000fffffc0000000 ffffea00000df1c8 ffffea00000df008 0000000000000000\n[ 162.498928] raw: 0000000000000000 0000000000240000 0\n---truncated---"
}
],
"providerMetadata": {
"dateUpdated": "2026-01-02T15:04:12.717Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/d7ce7bb6881aae186e50f57eea935cff8d504751"
},
{
"url": "https://git.kernel.org/stable/c/24ee53c6bce15500db22f2a7aee9dd830e806c90"
},
{
"url": "https://git.kernel.org/stable/c/d6379ce242960a8e9ecd6ff76f476d9336c21f16"
},
{
"url": "https://git.kernel.org/stable/c/bfcdbae0523bd95eb75a739ffb6221a37109881e"
}
],
"title": "fs/ntfs3: Validate index root when initialize NTFS security",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2022-50737",
"datePublished": "2025-12-24T13:05:36.025Z",
"dateReserved": "2025-12-24T13:02:21.542Z",
"dateUpdated": "2026-01-02T15:04:12.717Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-50737\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-24T13:16:00.397\",\"lastModified\":\"2025-12-29T15:58:34.503\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfs/ntfs3: Validate index root when initialize NTFS security\\n\\nThis enhances the sanity check for $SDH and $SII while initializing NTFS\\nsecurity, guarantees these index root are legit.\\n\\n[ 162.459513] BUG: KASAN: use-after-free in hdr_find_e.isra.0+0x10c/0x320\\n[ 162.460176] Read of size 2 at addr ffff8880037bca99 by task mount/243\\n[ 162.460851]\\n[ 162.461252] CPU: 0 PID: 243 Comm: mount Not tainted 6.0.0-rc7 #42\\n[ 162.461744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\\n[ 162.462609] Call Trace:\\n[ 162.462954] \u003cTASK\u003e\\n[ 162.463276] dump_stack_lvl+0x49/0x63\\n[ 162.463822] print_report.cold+0xf5/0x689\\n[ 162.464608] ? unwind_get_return_address+0x3a/0x60\\n[ 162.465766] ? hdr_find_e.isra.0+0x10c/0x320\\n[ 162.466975] kasan_report+0xa7/0x130\\n[ 162.467506] ? _raw_spin_lock_irq+0xc0/0xf0\\n[ 162.467998] ? hdr_find_e.isra.0+0x10c/0x320\\n[ 162.468536] __asan_load2+0x68/0x90\\n[ 162.468923] hdr_find_e.isra.0+0x10c/0x320\\n[ 162.469282] ? cmp_uints+0xe0/0xe0\\n[ 162.469557] ? cmp_sdh+0x90/0x90\\n[ 162.469864] ? ni_find_attr+0x214/0x300\\n[ 162.470217] ? ni_load_mi+0x80/0x80\\n[ 162.470479] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n[ 162.470931] ? ntfs_bread_run+0x190/0x190\\n[ 162.471307] ? indx_get_root+0xe4/0x190\\n[ 162.471556] ? indx_get_root+0x140/0x190\\n[ 162.471833] ? indx_init+0x1e0/0x1e0\\n[ 162.472069] ? fnd_clear+0x115/0x140\\n[ 162.472363] ? _raw_spin_lock_irqsave+0x100/0x100\\n[ 162.472731] indx_find+0x184/0x470\\n[ 162.473461] ? sysvec_apic_timer_interrupt+0x57/0xc0\\n[ 162.474429] ? indx_find_buffer+0x2d0/0x2d0\\n[ 162.474704] ? do_syscall_64+0x3b/0x90\\n[ 162.474962] dir_search_u+0x196/0x2f0\\n[ 162.475381] ? ntfs_nls_to_utf16+0x450/0x450\\n[ 162.475661] ? ntfs_security_init+0x3d6/0x440\\n[ 162.475906] ? is_sd_valid+0x180/0x180\\n[ 162.476191] ntfs_extend_init+0x13f/0x2c0\\n[ 162.476496] ? ntfs_fix_post_read+0x130/0x130\\n[ 162.476861] ? iput.part.0+0x286/0x320\\n[ 162.477325] ntfs_fill_super+0x11e0/0x1b50\\n[ 162.477709] ? put_ntfs+0x1d0/0x1d0\\n[ 162.477970] ? vsprintf+0x20/0x20\\n[ 162.478258] ? set_blocksize+0x95/0x150\\n[ 162.478538] get_tree_bdev+0x232/0x370\\n[ 162.478789] ? put_ntfs+0x1d0/0x1d0\\n[ 162.479038] ntfs_fs_get_tree+0x15/0x20\\n[ 162.479374] vfs_get_tree+0x4c/0x130\\n[ 162.479729] path_mount+0x654/0xfe0\\n[ 162.480124] ? putname+0x80/0xa0\\n[ 162.480484] ? finish_automount+0x2e0/0x2e0\\n[ 162.480894] ? putname+0x80/0xa0\\n[ 162.481467] ? kmem_cache_free+0x1c4/0x440\\n[ 162.482280] ? putname+0x80/0xa0\\n[ 162.482714] do_mount+0xd6/0xf0\\n[ 162.483264] ? path_mount+0xfe0/0xfe0\\n[ 162.484782] ? __kasan_check_write+0x14/0x20\\n[ 162.485593] __x64_sys_mount+0xca/0x110\\n[ 162.486024] do_syscall_64+0x3b/0x90\\n[ 162.486543] entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n[ 162.487141] RIP: 0033:0x7f9d374e948a\\n[ 162.488324] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\\n[ 162.489728] RSP: 002b:00007ffe30e73d18 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5\\n[ 162.490971] RAX: ffffffffffffffda RBX: 0000561cdb43a060 RCX: 00007f9d374e948a\\n[ 162.491669] RDX: 0000561cdb43a260 RSI: 0000561cdb43a2e0 RDI: 0000561cdb442af0\\n[ 162.492050] RBP: 0000000000000000 R08: 0000561cdb43a280 R09: 0000000000000020\\n[ 162.492459] R10: 00000000c0ed0000 R11: 0000000000000206 R12: 0000561cdb442af0\\n[ 162.493183] R13: 0000561cdb43a260 R14: 0000000000000000 R15: 00000000ffffffff\\n[ 162.493644] \u003c/TASK\u003e\\n[ 162.493908]\\n[ 162.494214] The buggy address belongs to the physical page:\\n[ 162.494761] page:000000003e38a3d5 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x37bc\\n[ 162.496064] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff)\\n[ 162.497278] raw: 000fffffc0000000 ffffea00000df1c8 ffffea00000df008 0000000000000000\\n[ 162.498928] raw: 0000000000000000 0000000000240000 0\\n---truncated---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/24ee53c6bce15500db22f2a7aee9dd830e806c90\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bfcdbae0523bd95eb75a739ffb6221a37109881e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d6379ce242960a8e9ecd6ff76f476d9336c21f16\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d7ce7bb6881aae186e50f57eea935cff8d504751\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
WID-SEC-W-2025-2929
Vulnerability from csaf_certbund - Published: 2025-12-28 23:00 - Updated: 2026-03-05 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2929 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2929.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2929 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2929"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50712",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2022-50712-6c0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50713",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2022-50713-24cc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50714",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50714-32b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50715",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50715-5640@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50716",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50716-88e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50717",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2022-50717-dc68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50718",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2022-50718-a890@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50719",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2022-50719-02d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50720",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50720-0297@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50721",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50721-9683@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50722",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50722-06c7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50723",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50723-a62d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50724",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50724-f625@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50725",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50725-967f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50726",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50726-2f42@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50727",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50727-95aa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50728",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50728-afa8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50729",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50729-f996@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50730",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50730-a4ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50731",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50731-a78b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50732",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50732-042c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50733",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50733-a587@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50734",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50734-96fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50735",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50735-2929@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50736",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2022-50736-1cb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50737",
"url": "https://lore.kernel.org/linux-cve-announce/2025122447-CVE-2022-50737-45ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50738",
"url": "https://lore.kernel.org/linux-cve-announce/2025122447-CVE-2022-50738-d561@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50739",
"url": "https://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50739-f061@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50740",
"url": "https://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50740-a780@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50741",
"url": "https://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50741-1736@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50742",
"url": "https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2022-50742-e130@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50743",
"url": "https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2022-50743-8e63@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50744",
"url": "https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2022-50744-bc80@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50745",
"url": "https://lore.kernel.org/linux-cve-announce/2025122450-CVE-2022-50745-af5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50746",
"url": "https://lore.kernel.org/linux-cve-announce/2025122450-CVE-2022-50746-7cbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50747",
"url": "https://lore.kernel.org/linux-cve-announce/2025122450-CVE-2022-50747-8937@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50748",
"url": "https://lore.kernel.org/linux-cve-announce/2025122451-CVE-2022-50748-0136@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50749",
"url": "https://lore.kernel.org/linux-cve-announce/2025122451-CVE-2022-50749-dae0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50750",
"url": "https://lore.kernel.org/linux-cve-announce/2025122451-CVE-2022-50750-5395@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50751",
"url": "https://lore.kernel.org/linux-cve-announce/2025122452-CVE-2022-50751-b5ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50752",
"url": "https://lore.kernel.org/linux-cve-announce/2025122452-CVE-2022-50752-fa82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50753",
"url": "https://lore.kernel.org/linux-cve-announce/2025122452-CVE-2022-50753-6266@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50754",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2022-50754-ec9a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50755",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2022-50755-f5d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50756",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2022-50756-ce43@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50757",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2022-50757-15f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50758",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2022-50758-800b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50759",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2022-50759-747e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50760",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2022-50760-b793@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50761",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2022-50761-0e67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50762",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2022-50762-282c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50763",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50763-923e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50764",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50764-45eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50765",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50765-356e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50766",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50766-0964@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50767",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2022-50767-9a13@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50768",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2022-50768-2703@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50769",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2022-50769-f4db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50770",
"url": "https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2022-50770-ba3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50771",
"url": "https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2022-50771-3440@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50772",
"url": "https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2022-50772-774d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50773",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2022-50773-b946@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50774",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2022-50774-73eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50775",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2022-50775-6733@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50776",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2022-50776-f275@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50777",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2022-50777-d1e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50778",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2022-50778-0b9a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50779",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2022-50779-fa1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50780",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2022-50780-bc90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50781",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2022-50781-3d18@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50782",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2022-50782-d849@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50783",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2022-50783-3109@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54043",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54043-16c8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54044",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54044-61d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54045",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54045-e0ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54046",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54046-aaf6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54047",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54047-42ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54048",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54048-ea7d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54049",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54049-79f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54050",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54050-737a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54051",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54051-b704@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54052",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54052-302d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54053",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54053-9a4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54054",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54054-292f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54055",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54055-3b5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54056",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54056-fd56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54057",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54057-f0c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54058",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54058-ce20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54059",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54059-c769@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54060",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54060-2029@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54061",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54061-5cd1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54062",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54062-d861@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54063",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54063-e78c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54064",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54064-7509@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54065",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54065-1de4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54066",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54066-8ff7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54067",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54067-46cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54068",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54068-dbe6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54069",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54069-1a17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54070",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54070-6104@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54071",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54071-b4c6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54072",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54072-4a34@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54073",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54073-249f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54074",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54074-cf89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54075",
"url": "https://lore.kernel.org/linux-cve-announce/2025122433-CVE-2023-54075-ab3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54076",
"url": "https://lore.kernel.org/linux-cve-announce/2025122433-CVE-2023-54076-e317@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54077",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54077-61a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54078",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2023-54078-03f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54079",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2023-54079-be62@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54080",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2023-54080-bec3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54081",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2023-54081-3fc3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54082",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2023-54082-4124@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54083",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2023-54083-fc0e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54084",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2023-54084-a862@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54085",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2023-54085-7e32@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54086",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2023-54086-d696@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54087",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2023-54087-38fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54088",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54088-f00f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54089",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54089-ddc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54090",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54090-2944@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54091",
"url": "https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2023-54091-577a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54092",
"url": "https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2023-54092-91ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54093",
"url": "https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2023-54093-fcea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54094",
"url": "https://lore.kernel.org/linux-cve-announce/2025122408-CVE-2023-54094-e8ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54095",
"url": "https://lore.kernel.org/linux-cve-announce/2025122408-CVE-2023-54095-7fe0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54096",
"url": "https://lore.kernel.org/linux-cve-announce/2025122408-CVE-2023-54096-efde@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54097",
"url": "https://lore.kernel.org/linux-cve-announce/2025122409-CVE-2023-54097-3fb1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54098",
"url": "https://lore.kernel.org/linux-cve-announce/2025122409-CVE-2023-54098-d7c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54099",
"url": "https://lore.kernel.org/linux-cve-announce/2025122409-CVE-2023-54099-4143@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54100",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2023-54100-91a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54101",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2023-54101-49f5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54102",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2023-54102-7dd5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54103",
"url": "https://lore.kernel.org/linux-cve-announce/2025122411-CVE-2023-54103-5493@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54104",
"url": "https://lore.kernel.org/linux-cve-announce/2025122411-CVE-2023-54104-32e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54105",
"url": "https://lore.kernel.org/linux-cve-announce/2025122411-CVE-2023-54105-fbe5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54106",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54106-b8da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54107",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54107-12ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54108",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54108-d5be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54109",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54109-714c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54110",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2023-54110-5816@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54111",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2023-54111-de3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54112",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2023-54112-71f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54113",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2023-54113-de5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54114",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2023-54114-8362@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54115",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2023-54115-19b7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54116",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2023-54116-886b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54117",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2023-54117-e980@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54118",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2023-54118-d92b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54119",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2023-54119-fbd4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54120",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2023-54120-d966@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54121",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2023-54121-691a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54122",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2023-54122-b6f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54123",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2023-54123-4e1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54124",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2023-54124-d6ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54125",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2023-54125-2085@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54126",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2023-54126-7e20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54127",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2023-54127-87e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54128",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2023-54128-a164@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54129",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2023-54129-8cb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54130",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2023-54130-3339@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54131",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2023-54131-87b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54132",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2023-54132-dd33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54133",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2023-54133-dc22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54134",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2023-54134-2972@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54135",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2023-54135-ffa3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54136",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2023-54136-b58d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54137",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54137-1873@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54138",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54138-188c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54139",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54139-ce08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54140",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54140-4841@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54141",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54141-86e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54142",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54142-fd19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54143",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54143-adb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54144",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54144-f3be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54145",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54145-421d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54146",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54146-1510@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54147",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54147-dafb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54148",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54148-569b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54149",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54149-e39f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54150",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54150-dbc1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54151",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54151-854b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54152",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54152-5e4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54153",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54153-63a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54154",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54154-bc1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54155",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54155-e238@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54156",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54156-832a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54157",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54157-c0c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54158",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54158-0a83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54159",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54159-5908@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54160",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54160-ed90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54161",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54161-53d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68735",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2025-68735-dce5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68736",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2025-68736-30ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68737",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2025-68737-596a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68738",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2025-68738-79ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68739",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2025-68739-b2a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68740",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2025-68740-dcfd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68741",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2025-68741-894a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68742",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2025-68742-367d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68743",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2025-68743-f0bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68744",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2025-68744-bf55@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68745",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2025-68745-69b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68746",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2025-68746-bd3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68747",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2025-68747-572e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68748",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2025-68748-45cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68749",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2025-68749-1160@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68750",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2025-68750-7ff1@gregkh/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10039-1 vom 2026-01-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNRBJ6HLDODCC2A4DQ3QHZ6XBQSZQO26/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0263-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0317-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0350-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0352-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023998.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0369-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8016-1 vom 2026-02-04",
"url": "https://ubuntu.com/security/notices/USN-8016-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20228-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20220-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6126 vom 2026-02-09",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6127 vom 2026-02-10",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0411-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-1 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4476 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0474-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0496-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-4 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-3 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-2 vom 2026-02-18",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-113 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-113.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-6 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-3 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-1 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50112 vom 2026-02-23",
"url": "https://linux.oracle.com/errata/ELSA-2026-50112.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-2 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-8 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3083 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3083.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20287-1 vom 2026-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7KIWX7XP3UMVFSHT47OOZ24TQQYNNHI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0734-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024508.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0731-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024509.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0727-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024510.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0725-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024511.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0713-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024512.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0711-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024513.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0710-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024514.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0707-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024515.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0700-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024516.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0696-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024519.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0698-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024518.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-2 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-098 vom 2026-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-098.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20615-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20570-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20599-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20564-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20555-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024590.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-05T23:00:00.000+00:00",
"generator": {
"date": "2026-03-06T10:24:38.179+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2929",
"initial_release_date": "2025-12-28T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Debian und Ubuntu aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
}
],
"status": "final",
"version": "23"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028463",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50712",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50712"
},
{
"cve": "CVE-2022-50713",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50713"
},
{
"cve": "CVE-2022-50714",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50714"
},
{
"cve": "CVE-2022-50715",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50715"
},
{
"cve": "CVE-2022-50716",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50716"
},
{
"cve": "CVE-2022-50717",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50717"
},
{
"cve": "CVE-2022-50718",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50718"
},
{
"cve": "CVE-2022-50719",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50719"
},
{
"cve": "CVE-2022-50720",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50720"
},
{
"cve": "CVE-2022-50721",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50721"
},
{
"cve": "CVE-2022-50722",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50722"
},
{
"cve": "CVE-2022-50723",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50723"
},
{
"cve": "CVE-2022-50724",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50724"
},
{
"cve": "CVE-2022-50725",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50725"
},
{
"cve": "CVE-2022-50726",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50726"
},
{
"cve": "CVE-2022-50727",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50727"
},
{
"cve": "CVE-2022-50728",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50728"
},
{
"cve": "CVE-2022-50729",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50729"
},
{
"cve": "CVE-2022-50730",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50730"
},
{
"cve": "CVE-2022-50731",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50731"
},
{
"cve": "CVE-2022-50732",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50732"
},
{
"cve": "CVE-2022-50733",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50733"
},
{
"cve": "CVE-2022-50734",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50734"
},
{
"cve": "CVE-2022-50735",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50735"
},
{
"cve": "CVE-2022-50736",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50736"
},
{
"cve": "CVE-2022-50737",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50737"
},
{
"cve": "CVE-2022-50738",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50738"
},
{
"cve": "CVE-2022-50739",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50739"
},
{
"cve": "CVE-2022-50740",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50740"
},
{
"cve": "CVE-2022-50741",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50741"
},
{
"cve": "CVE-2022-50742",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50742"
},
{
"cve": "CVE-2022-50743",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50743"
},
{
"cve": "CVE-2022-50744",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50744"
},
{
"cve": "CVE-2022-50745",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50745"
},
{
"cve": "CVE-2022-50746",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50746"
},
{
"cve": "CVE-2022-50747",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50747"
},
{
"cve": "CVE-2022-50748",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50748"
},
{
"cve": "CVE-2022-50749",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50749"
},
{
"cve": "CVE-2022-50750",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50750"
},
{
"cve": "CVE-2022-50751",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50751"
},
{
"cve": "CVE-2022-50752",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50752"
},
{
"cve": "CVE-2022-50753",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50753"
},
{
"cve": "CVE-2022-50754",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50754"
},
{
"cve": "CVE-2022-50755",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50755"
},
{
"cve": "CVE-2022-50756",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50756"
},
{
"cve": "CVE-2022-50757",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50757"
},
{
"cve": "CVE-2022-50758",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50758"
},
{
"cve": "CVE-2022-50759",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50759"
},
{
"cve": "CVE-2022-50760",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50760"
},
{
"cve": "CVE-2022-50761",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50761"
},
{
"cve": "CVE-2022-50762",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50762"
},
{
"cve": "CVE-2022-50763",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50763"
},
{
"cve": "CVE-2022-50764",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50764"
},
{
"cve": "CVE-2022-50765",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50765"
},
{
"cve": "CVE-2022-50766",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50766"
},
{
"cve": "CVE-2022-50767",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50767"
},
{
"cve": "CVE-2022-50768",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50768"
},
{
"cve": "CVE-2022-50769",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50769"
},
{
"cve": "CVE-2022-50770",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50770"
},
{
"cve": "CVE-2022-50771",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50771"
},
{
"cve": "CVE-2022-50772",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50772"
},
{
"cve": "CVE-2022-50773",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50773"
},
{
"cve": "CVE-2022-50774",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50774"
},
{
"cve": "CVE-2022-50775",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50775"
},
{
"cve": "CVE-2022-50776",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50776"
},
{
"cve": "CVE-2022-50777",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50777"
},
{
"cve": "CVE-2022-50778",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50778"
},
{
"cve": "CVE-2022-50779",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50779"
},
{
"cve": "CVE-2022-50780",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50780"
},
{
"cve": "CVE-2022-50781",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50781"
},
{
"cve": "CVE-2022-50782",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50782"
},
{
"cve": "CVE-2022-50783",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50783"
},
{
"cve": "CVE-2023-54043",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54043"
},
{
"cve": "CVE-2023-54044",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54044"
},
{
"cve": "CVE-2023-54045",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54045"
},
{
"cve": "CVE-2023-54046",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54046"
},
{
"cve": "CVE-2023-54047",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54047"
},
{
"cve": "CVE-2023-54048",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54048"
},
{
"cve": "CVE-2023-54049",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54049"
},
{
"cve": "CVE-2023-54050",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54050"
},
{
"cve": "CVE-2023-54051",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54051"
},
{
"cve": "CVE-2023-54052",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54052"
},
{
"cve": "CVE-2023-54053",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54053"
},
{
"cve": "CVE-2023-54054",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54054"
},
{
"cve": "CVE-2023-54055",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54055"
},
{
"cve": "CVE-2023-54056",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54056"
},
{
"cve": "CVE-2023-54057",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54057"
},
{
"cve": "CVE-2023-54058",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54058"
},
{
"cve": "CVE-2023-54059",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54059"
},
{
"cve": "CVE-2023-54060",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54060"
},
{
"cve": "CVE-2023-54061",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54061"
},
{
"cve": "CVE-2023-54062",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54062"
},
{
"cve": "CVE-2023-54063",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54063"
},
{
"cve": "CVE-2023-54064",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54064"
},
{
"cve": "CVE-2023-54065",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54065"
},
{
"cve": "CVE-2023-54066",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54066"
},
{
"cve": "CVE-2023-54067",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54067"
},
{
"cve": "CVE-2023-54068",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54068"
},
{
"cve": "CVE-2023-54069",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54069"
},
{
"cve": "CVE-2023-54070",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54070"
},
{
"cve": "CVE-2023-54071",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54071"
},
{
"cve": "CVE-2023-54072",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54072"
},
{
"cve": "CVE-2023-54073",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54073"
},
{
"cve": "CVE-2023-54074",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54074"
},
{
"cve": "CVE-2023-54075",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54075"
},
{
"cve": "CVE-2023-54076",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54076"
},
{
"cve": "CVE-2023-54077",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54077"
},
{
"cve": "CVE-2023-54078",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54078"
},
{
"cve": "CVE-2023-54079",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54079"
},
{
"cve": "CVE-2023-54080",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54080"
},
{
"cve": "CVE-2023-54081",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54081"
},
{
"cve": "CVE-2023-54082",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54082"
},
{
"cve": "CVE-2023-54083",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54083"
},
{
"cve": "CVE-2023-54084",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54084"
},
{
"cve": "CVE-2023-54085",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54085"
},
{
"cve": "CVE-2023-54086",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54086"
},
{
"cve": "CVE-2023-54087",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54087"
},
{
"cve": "CVE-2023-54088",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54088"
},
{
"cve": "CVE-2023-54089",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54089"
},
{
"cve": "CVE-2023-54090",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54090"
},
{
"cve": "CVE-2023-54091",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54091"
},
{
"cve": "CVE-2023-54092",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54092"
},
{
"cve": "CVE-2023-54093",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54093"
},
{
"cve": "CVE-2023-54094",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54094"
},
{
"cve": "CVE-2023-54095",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54095"
},
{
"cve": "CVE-2023-54096",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54096"
},
{
"cve": "CVE-2023-54097",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54097"
},
{
"cve": "CVE-2023-54098",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54098"
},
{
"cve": "CVE-2023-54099",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54099"
},
{
"cve": "CVE-2023-54100",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54100"
},
{
"cve": "CVE-2023-54101",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54101"
},
{
"cve": "CVE-2023-54102",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54102"
},
{
"cve": "CVE-2023-54103",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54103"
},
{
"cve": "CVE-2023-54104",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54104"
},
{
"cve": "CVE-2023-54105",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54105"
},
{
"cve": "CVE-2023-54106",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54106"
},
{
"cve": "CVE-2023-54107",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54107"
},
{
"cve": "CVE-2023-54108",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54108"
},
{
"cve": "CVE-2023-54109",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54109"
},
{
"cve": "CVE-2023-54110",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54110"
},
{
"cve": "CVE-2023-54111",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54111"
},
{
"cve": "CVE-2023-54112",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54112"
},
{
"cve": "CVE-2023-54113",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54113"
},
{
"cve": "CVE-2023-54114",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54114"
},
{
"cve": "CVE-2023-54115",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54115"
},
{
"cve": "CVE-2023-54116",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54116"
},
{
"cve": "CVE-2023-54117",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54117"
},
{
"cve": "CVE-2023-54118",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54118"
},
{
"cve": "CVE-2023-54119",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54119"
},
{
"cve": "CVE-2023-54120",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54120"
},
{
"cve": "CVE-2023-54121",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54121"
},
{
"cve": "CVE-2023-54122",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54122"
},
{
"cve": "CVE-2023-54123",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54123"
},
{
"cve": "CVE-2023-54124",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54124"
},
{
"cve": "CVE-2023-54125",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54125"
},
{
"cve": "CVE-2023-54126",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54126"
},
{
"cve": "CVE-2023-54127",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54127"
},
{
"cve": "CVE-2023-54128",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54128"
},
{
"cve": "CVE-2023-54129",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54129"
},
{
"cve": "CVE-2023-54130",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54130"
},
{
"cve": "CVE-2023-54131",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54131"
},
{
"cve": "CVE-2023-54132",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54132"
},
{
"cve": "CVE-2023-54133",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54133"
},
{
"cve": "CVE-2023-54134",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54134"
},
{
"cve": "CVE-2023-54135",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54135"
},
{
"cve": "CVE-2023-54136",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54136"
},
{
"cve": "CVE-2023-54137",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54137"
},
{
"cve": "CVE-2023-54138",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54138"
},
{
"cve": "CVE-2023-54139",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54139"
},
{
"cve": "CVE-2023-54140",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54140"
},
{
"cve": "CVE-2023-54141",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54141"
},
{
"cve": "CVE-2023-54142",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54142"
},
{
"cve": "CVE-2023-54143",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54143"
},
{
"cve": "CVE-2023-54144",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54144"
},
{
"cve": "CVE-2023-54145",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54145"
},
{
"cve": "CVE-2023-54146",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54146"
},
{
"cve": "CVE-2023-54147",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54147"
},
{
"cve": "CVE-2023-54148",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54148"
},
{
"cve": "CVE-2023-54149",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54149"
},
{
"cve": "CVE-2023-54150",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54150"
},
{
"cve": "CVE-2023-54151",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54151"
},
{
"cve": "CVE-2023-54152",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54152"
},
{
"cve": "CVE-2023-54153",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54153"
},
{
"cve": "CVE-2023-54154",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54154"
},
{
"cve": "CVE-2023-54155",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54155"
},
{
"cve": "CVE-2023-54156",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54156"
},
{
"cve": "CVE-2023-54157",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54157"
},
{
"cve": "CVE-2023-54158",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54158"
},
{
"cve": "CVE-2023-54159",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54159"
},
{
"cve": "CVE-2023-54160",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54160"
},
{
"cve": "CVE-2023-54161",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54161"
},
{
"cve": "CVE-2025-68735",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68735"
},
{
"cve": "CVE-2025-68736",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68736"
},
{
"cve": "CVE-2025-68737",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68737"
},
{
"cve": "CVE-2025-68738",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68738"
},
{
"cve": "CVE-2025-68739",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68739"
},
{
"cve": "CVE-2025-68740",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68740"
},
{
"cve": "CVE-2025-68741",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68741"
},
{
"cve": "CVE-2025-68742",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68742"
},
{
"cve": "CVE-2025-68743",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68743"
},
{
"cve": "CVE-2025-68744",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68744"
},
{
"cve": "CVE-2025-68745",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68745"
},
{
"cve": "CVE-2025-68746",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68746"
},
{
"cve": "CVE-2025-68747",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68747"
},
{
"cve": "CVE-2025-68748",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68748"
},
{
"cve": "CVE-2025-68749",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68749"
},
{
"cve": "CVE-2025-68750",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68750"
}
]
}
GHSA-H62J-73WJ-F3JQ
Vulnerability from github – Published: 2025-12-24 15:30 – Updated: 2025-12-24 15:30In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Validate index root when initialize NTFS security
This enhances the sanity check for $SDH and $SII while initializing NTFS security, guarantees these index root are legit.
[ 162.459513] BUG: KASAN: use-after-free in hdr_find_e.isra.0+0x10c/0x320 [ 162.460176] Read of size 2 at addr ffff8880037bca99 by task mount/243 [ 162.460851] [ 162.461252] CPU: 0 PID: 243 Comm: mount Not tainted 6.0.0-rc7 #42 [ 162.461744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 162.462609] Call Trace: [ 162.462954] [ 162.463276] dump_stack_lvl+0x49/0x63 [ 162.463822] print_report.cold+0xf5/0x689 [ 162.464608] ? unwind_get_return_address+0x3a/0x60 [ 162.465766] ? hdr_find_e.isra.0+0x10c/0x320 [ 162.466975] kasan_report+0xa7/0x130 [ 162.467506] ? _raw_spin_lock_irq+0xc0/0xf0 [ 162.467998] ? hdr_find_e.isra.0+0x10c/0x320 [ 162.468536] __asan_load2+0x68/0x90 [ 162.468923] hdr_find_e.isra.0+0x10c/0x320 [ 162.469282] ? cmp_uints+0xe0/0xe0 [ 162.469557] ? cmp_sdh+0x90/0x90 [ 162.469864] ? ni_find_attr+0x214/0x300 [ 162.470217] ? ni_load_mi+0x80/0x80 [ 162.470479] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 162.470931] ? ntfs_bread_run+0x190/0x190 [ 162.471307] ? indx_get_root+0xe4/0x190 [ 162.471556] ? indx_get_root+0x140/0x190 [ 162.471833] ? indx_init+0x1e0/0x1e0 [ 162.472069] ? fnd_clear+0x115/0x140 [ 162.472363] ? _raw_spin_lock_irqsave+0x100/0x100 [ 162.472731] indx_find+0x184/0x470 [ 162.473461] ? sysvec_apic_timer_interrupt+0x57/0xc0 [ 162.474429] ? indx_find_buffer+0x2d0/0x2d0 [ 162.474704] ? do_syscall_64+0x3b/0x90 [ 162.474962] dir_search_u+0x196/0x2f0 [ 162.475381] ? ntfs_nls_to_utf16+0x450/0x450 [ 162.475661] ? ntfs_security_init+0x3d6/0x440 [ 162.475906] ? is_sd_valid+0x180/0x180 [ 162.476191] ntfs_extend_init+0x13f/0x2c0 [ 162.476496] ? ntfs_fix_post_read+0x130/0x130 [ 162.476861] ? iput.part.0+0x286/0x320 [ 162.477325] ntfs_fill_super+0x11e0/0x1b50 [ 162.477709] ? put_ntfs+0x1d0/0x1d0 [ 162.477970] ? vsprintf+0x20/0x20 [ 162.478258] ? set_blocksize+0x95/0x150 [ 162.478538] get_tree_bdev+0x232/0x370 [ 162.478789] ? put_ntfs+0x1d0/0x1d0 [ 162.479038] ntfs_fs_get_tree+0x15/0x20 [ 162.479374] vfs_get_tree+0x4c/0x130 [ 162.479729] path_mount+0x654/0xfe0 [ 162.480124] ? putname+0x80/0xa0 [ 162.480484] ? finish_automount+0x2e0/0x2e0 [ 162.480894] ? putname+0x80/0xa0 [ 162.481467] ? kmem_cache_free+0x1c4/0x440 [ 162.482280] ? putname+0x80/0xa0 [ 162.482714] do_mount+0xd6/0xf0 [ 162.483264] ? path_mount+0xfe0/0xfe0 [ 162.484782] ? __kasan_check_write+0x14/0x20 [ 162.485593] __x64_sys_mount+0xca/0x110 [ 162.486024] do_syscall_64+0x3b/0x90 [ 162.486543] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 162.487141] RIP: 0033:0x7f9d374e948a [ 162.488324] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008 [ 162.489728] RSP: 002b:00007ffe30e73d18 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 162.490971] RAX: ffffffffffffffda RBX: 0000561cdb43a060 RCX: 00007f9d374e948a [ 162.491669] RDX: 0000561cdb43a260 RSI: 0000561cdb43a2e0 RDI: 0000561cdb442af0 [ 162.492050] RBP: 0000000000000000 R08: 0000561cdb43a280 R09: 0000000000000020 [ 162.492459] R10: 00000000c0ed0000 R11: 0000000000000206 R12: 0000561cdb442af0 [ 162.493183] R13: 0000561cdb43a260 R14: 0000000000000000 R15: 00000000ffffffff [ 162.493644] [ 162.493908] [ 162.494214] The buggy address belongs to the physical page: [ 162.494761] page:000000003e38a3d5 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x37bc [ 162.496064] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 162.497278] raw: 000fffffc0000000 ffffea00000df1c8 ffffea00000df008 0000000000000000 [ 162.498928] raw: 0000000000000000 0000000000240000 0 ---truncated---
{
"affected": [],
"aliases": [
"CVE-2022-50737"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-24T13:16:00Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate index root when initialize NTFS security\n\nThis enhances the sanity check for $SDH and $SII while initializing NTFS\nsecurity, guarantees these index root are legit.\n\n[ 162.459513] BUG: KASAN: use-after-free in hdr_find_e.isra.0+0x10c/0x320\n[ 162.460176] Read of size 2 at addr ffff8880037bca99 by task mount/243\n[ 162.460851]\n[ 162.461252] CPU: 0 PID: 243 Comm: mount Not tainted 6.0.0-rc7 #42\n[ 162.461744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 162.462609] Call Trace:\n[ 162.462954] \u003cTASK\u003e\n[ 162.463276] dump_stack_lvl+0x49/0x63\n[ 162.463822] print_report.cold+0xf5/0x689\n[ 162.464608] ? unwind_get_return_address+0x3a/0x60\n[ 162.465766] ? hdr_find_e.isra.0+0x10c/0x320\n[ 162.466975] kasan_report+0xa7/0x130\n[ 162.467506] ? _raw_spin_lock_irq+0xc0/0xf0\n[ 162.467998] ? hdr_find_e.isra.0+0x10c/0x320\n[ 162.468536] __asan_load2+0x68/0x90\n[ 162.468923] hdr_find_e.isra.0+0x10c/0x320\n[ 162.469282] ? cmp_uints+0xe0/0xe0\n[ 162.469557] ? cmp_sdh+0x90/0x90\n[ 162.469864] ? ni_find_attr+0x214/0x300\n[ 162.470217] ? ni_load_mi+0x80/0x80\n[ 162.470479] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 162.470931] ? ntfs_bread_run+0x190/0x190\n[ 162.471307] ? indx_get_root+0xe4/0x190\n[ 162.471556] ? indx_get_root+0x140/0x190\n[ 162.471833] ? indx_init+0x1e0/0x1e0\n[ 162.472069] ? fnd_clear+0x115/0x140\n[ 162.472363] ? _raw_spin_lock_irqsave+0x100/0x100\n[ 162.472731] indx_find+0x184/0x470\n[ 162.473461] ? sysvec_apic_timer_interrupt+0x57/0xc0\n[ 162.474429] ? indx_find_buffer+0x2d0/0x2d0\n[ 162.474704] ? do_syscall_64+0x3b/0x90\n[ 162.474962] dir_search_u+0x196/0x2f0\n[ 162.475381] ? ntfs_nls_to_utf16+0x450/0x450\n[ 162.475661] ? ntfs_security_init+0x3d6/0x440\n[ 162.475906] ? is_sd_valid+0x180/0x180\n[ 162.476191] ntfs_extend_init+0x13f/0x2c0\n[ 162.476496] ? ntfs_fix_post_read+0x130/0x130\n[ 162.476861] ? iput.part.0+0x286/0x320\n[ 162.477325] ntfs_fill_super+0x11e0/0x1b50\n[ 162.477709] ? put_ntfs+0x1d0/0x1d0\n[ 162.477970] ? vsprintf+0x20/0x20\n[ 162.478258] ? set_blocksize+0x95/0x150\n[ 162.478538] get_tree_bdev+0x232/0x370\n[ 162.478789] ? put_ntfs+0x1d0/0x1d0\n[ 162.479038] ntfs_fs_get_tree+0x15/0x20\n[ 162.479374] vfs_get_tree+0x4c/0x130\n[ 162.479729] path_mount+0x654/0xfe0\n[ 162.480124] ? putname+0x80/0xa0\n[ 162.480484] ? finish_automount+0x2e0/0x2e0\n[ 162.480894] ? putname+0x80/0xa0\n[ 162.481467] ? kmem_cache_free+0x1c4/0x440\n[ 162.482280] ? putname+0x80/0xa0\n[ 162.482714] do_mount+0xd6/0xf0\n[ 162.483264] ? path_mount+0xfe0/0xfe0\n[ 162.484782] ? __kasan_check_write+0x14/0x20\n[ 162.485593] __x64_sys_mount+0xca/0x110\n[ 162.486024] do_syscall_64+0x3b/0x90\n[ 162.486543] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 162.487141] RIP: 0033:0x7f9d374e948a\n[ 162.488324] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[ 162.489728] RSP: 002b:00007ffe30e73d18 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5\n[ 162.490971] RAX: ffffffffffffffda RBX: 0000561cdb43a060 RCX: 00007f9d374e948a\n[ 162.491669] RDX: 0000561cdb43a260 RSI: 0000561cdb43a2e0 RDI: 0000561cdb442af0\n[ 162.492050] RBP: 0000000000000000 R08: 0000561cdb43a280 R09: 0000000000000020\n[ 162.492459] R10: 00000000c0ed0000 R11: 0000000000000206 R12: 0000561cdb442af0\n[ 162.493183] R13: 0000561cdb43a260 R14: 0000000000000000 R15: 00000000ffffffff\n[ 162.493644] \u003c/TASK\u003e\n[ 162.493908]\n[ 162.494214] The buggy address belongs to the physical page:\n[ 162.494761] page:000000003e38a3d5 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x37bc\n[ 162.496064] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff)\n[ 162.497278] raw: 000fffffc0000000 ffffea00000df1c8 ffffea00000df008 0000000000000000\n[ 162.498928] raw: 0000000000000000 0000000000240000 0\n---truncated---",
"id": "GHSA-h62j-73wj-f3jq",
"modified": "2025-12-24T15:30:33Z",
"published": "2025-12-24T15:30:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50737"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/24ee53c6bce15500db22f2a7aee9dd830e806c90"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/bfcdbae0523bd95eb75a739ffb6221a37109881e"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d6379ce242960a8e9ecd6ff76f476d9336c21f16"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d7ce7bb6881aae186e50f57eea935cff8d504751"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2022-50737
Vulnerability from fkie_nvd - Published: 2025-12-24 13:16 - Updated: 2025-12-29 15:58| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/24ee53c6bce15500db22f2a7aee9dd830e806c90 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/bfcdbae0523bd95eb75a739ffb6221a37109881e | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d6379ce242960a8e9ecd6ff76f476d9336c21f16 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d7ce7bb6881aae186e50f57eea935cff8d504751 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Validate index root when initialize NTFS security\n\nThis enhances the sanity check for $SDH and $SII while initializing NTFS\nsecurity, guarantees these index root are legit.\n\n[ 162.459513] BUG: KASAN: use-after-free in hdr_find_e.isra.0+0x10c/0x320\n[ 162.460176] Read of size 2 at addr ffff8880037bca99 by task mount/243\n[ 162.460851]\n[ 162.461252] CPU: 0 PID: 243 Comm: mount Not tainted 6.0.0-rc7 #42\n[ 162.461744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 162.462609] Call Trace:\n[ 162.462954] \u003cTASK\u003e\n[ 162.463276] dump_stack_lvl+0x49/0x63\n[ 162.463822] print_report.cold+0xf5/0x689\n[ 162.464608] ? unwind_get_return_address+0x3a/0x60\n[ 162.465766] ? hdr_find_e.isra.0+0x10c/0x320\n[ 162.466975] kasan_report+0xa7/0x130\n[ 162.467506] ? _raw_spin_lock_irq+0xc0/0xf0\n[ 162.467998] ? hdr_find_e.isra.0+0x10c/0x320\n[ 162.468536] __asan_load2+0x68/0x90\n[ 162.468923] hdr_find_e.isra.0+0x10c/0x320\n[ 162.469282] ? cmp_uints+0xe0/0xe0\n[ 162.469557] ? cmp_sdh+0x90/0x90\n[ 162.469864] ? ni_find_attr+0x214/0x300\n[ 162.470217] ? ni_load_mi+0x80/0x80\n[ 162.470479] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 162.470931] ? ntfs_bread_run+0x190/0x190\n[ 162.471307] ? indx_get_root+0xe4/0x190\n[ 162.471556] ? indx_get_root+0x140/0x190\n[ 162.471833] ? indx_init+0x1e0/0x1e0\n[ 162.472069] ? fnd_clear+0x115/0x140\n[ 162.472363] ? _raw_spin_lock_irqsave+0x100/0x100\n[ 162.472731] indx_find+0x184/0x470\n[ 162.473461] ? sysvec_apic_timer_interrupt+0x57/0xc0\n[ 162.474429] ? indx_find_buffer+0x2d0/0x2d0\n[ 162.474704] ? do_syscall_64+0x3b/0x90\n[ 162.474962] dir_search_u+0x196/0x2f0\n[ 162.475381] ? ntfs_nls_to_utf16+0x450/0x450\n[ 162.475661] ? ntfs_security_init+0x3d6/0x440\n[ 162.475906] ? is_sd_valid+0x180/0x180\n[ 162.476191] ntfs_extend_init+0x13f/0x2c0\n[ 162.476496] ? ntfs_fix_post_read+0x130/0x130\n[ 162.476861] ? iput.part.0+0x286/0x320\n[ 162.477325] ntfs_fill_super+0x11e0/0x1b50\n[ 162.477709] ? put_ntfs+0x1d0/0x1d0\n[ 162.477970] ? vsprintf+0x20/0x20\n[ 162.478258] ? set_blocksize+0x95/0x150\n[ 162.478538] get_tree_bdev+0x232/0x370\n[ 162.478789] ? put_ntfs+0x1d0/0x1d0\n[ 162.479038] ntfs_fs_get_tree+0x15/0x20\n[ 162.479374] vfs_get_tree+0x4c/0x130\n[ 162.479729] path_mount+0x654/0xfe0\n[ 162.480124] ? putname+0x80/0xa0\n[ 162.480484] ? finish_automount+0x2e0/0x2e0\n[ 162.480894] ? putname+0x80/0xa0\n[ 162.481467] ? kmem_cache_free+0x1c4/0x440\n[ 162.482280] ? putname+0x80/0xa0\n[ 162.482714] do_mount+0xd6/0xf0\n[ 162.483264] ? path_mount+0xfe0/0xfe0\n[ 162.484782] ? __kasan_check_write+0x14/0x20\n[ 162.485593] __x64_sys_mount+0xca/0x110\n[ 162.486024] do_syscall_64+0x3b/0x90\n[ 162.486543] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 162.487141] RIP: 0033:0x7f9d374e948a\n[ 162.488324] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[ 162.489728] RSP: 002b:00007ffe30e73d18 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5\n[ 162.490971] RAX: ffffffffffffffda RBX: 0000561cdb43a060 RCX: 00007f9d374e948a\n[ 162.491669] RDX: 0000561cdb43a260 RSI: 0000561cdb43a2e0 RDI: 0000561cdb442af0\n[ 162.492050] RBP: 0000000000000000 R08: 0000561cdb43a280 R09: 0000000000000020\n[ 162.492459] R10: 00000000c0ed0000 R11: 0000000000000206 R12: 0000561cdb442af0\n[ 162.493183] R13: 0000561cdb43a260 R14: 0000000000000000 R15: 00000000ffffffff\n[ 162.493644] \u003c/TASK\u003e\n[ 162.493908]\n[ 162.494214] The buggy address belongs to the physical page:\n[ 162.494761] page:000000003e38a3d5 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x37bc\n[ 162.496064] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff)\n[ 162.497278] raw: 000fffffc0000000 ffffea00000df1c8 ffffea00000df008 0000000000000000\n[ 162.498928] raw: 0000000000000000 0000000000240000 0\n---truncated---"
}
],
"id": "CVE-2022-50737",
"lastModified": "2025-12-29T15:58:34.503",
"metrics": {},
"published": "2025-12-24T13:16:00.397",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/24ee53c6bce15500db22f2a7aee9dd830e806c90"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/bfcdbae0523bd95eb75a739ffb6221a37109881e"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/d6379ce242960a8e9ecd6ff76f476d9336c21f16"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/d7ce7bb6881aae186e50f57eea935cff8d504751"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.