Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-50739 (GCVE-0-2022-50739)
Vulnerability from cvelistv5 – Published: 2025-12-24 13:05 – Updated: 2026-01-02 15:04| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
82cae269cfa953032fbb8980a7d554d60fb00b17 , < f62506f5e45afbb01c84c3f28a2878b320a0b0f7
(git)
Affected: 82cae269cfa953032fbb8980a7d554d60fb00b17 , < 9f24743ddcdd3683b0a6b16e1439ad091dc3489b (git) Affected: 82cae269cfa953032fbb8980a7d554d60fb00b17 , < a7b23037b38b577d9a4372e0c6b7c9fe808070c1 (git) Affected: 82cae269cfa953032fbb8980a7d554d60fb00b17 , < c1ca8ef0262b25493631ecbd9cb8c9893e1481a1 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/ntfs3/super.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "f62506f5e45afbb01c84c3f28a2878b320a0b0f7",
"status": "affected",
"version": "82cae269cfa953032fbb8980a7d554d60fb00b17",
"versionType": "git"
},
{
"lessThan": "9f24743ddcdd3683b0a6b16e1439ad091dc3489b",
"status": "affected",
"version": "82cae269cfa953032fbb8980a7d554d60fb00b17",
"versionType": "git"
},
{
"lessThan": "a7b23037b38b577d9a4372e0c6b7c9fe808070c1",
"status": "affected",
"version": "82cae269cfa953032fbb8980a7d554d60fb00b17",
"versionType": "git"
},
{
"lessThan": "c1ca8ef0262b25493631ecbd9cb8c9893e1481a1",
"status": "affected",
"version": "82cae269cfa953032fbb8980a7d554d60fb00b17",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/ntfs3/super.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.15"
},
{
"lessThan": "5.15",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.87",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.0.*",
"status": "unaffected",
"version": "6.0.17",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.2",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.87",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.17",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.3",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"versionStartIncluding": "5.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Add null pointer check for inode operations\n\nThis adds a sanity check for the i_op pointer of the inode which is\nreturned after reading Root directory MFT record. We should check the\ni_op is valid before trying to create the root dentry, otherwise we may\nencounter a NPD while mounting a image with a funny Root directory MFT\nrecord.\n\n[ 114.484325] BUG: kernel NULL pointer dereference, address: 0000000000000008\n[ 114.484811] #PF: supervisor read access in kernel mode\n[ 114.485084] #PF: error_code(0x0000) - not-present page\n[ 114.485606] PGD 0 P4D 0\n[ 114.485975] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI\n[ 114.486570] CPU: 0 PID: 237 Comm: mount Tainted: G B 6.0.0-rc4 #28\n[ 114.486977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 114.488169] RIP: 0010:d_flags_for_inode+0xe0/0x110\n[ 114.488816] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241\n[ 114.490326] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296\n[ 114.490695] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea\n[ 114.490986] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff87abd020\n[ 114.491364] RBP: ffff8880065e7ac8 R08: 0000000000000001 R09: fffffbfff0f57a05\n[ 114.491675] R10: ffffffff87abd027 R11: fffffbfff0f57a04 R12: 0000000000000000\n[ 114.491954] R13: 0000000000000008 R14: 0000000000000000 R15: ffff888008ccd750\n[ 114.492397] FS: 00007fdc8a627e40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000\n[ 114.492797] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 114.493150] CR2: 0000000000000008 CR3: 00000000013ba000 CR4: 00000000000006f0\n[ 114.493671] Call Trace:\n[ 114.493890] \u003cTASK\u003e\n[ 114.494075] __d_instantiate+0x24/0x1c0\n[ 114.494505] d_instantiate.part.0+0x35/0x50\n[ 114.494754] d_make_root+0x53/0x80\n[ 114.494998] ntfs_fill_super+0x1232/0x1b50\n[ 114.495260] ? put_ntfs+0x1d0/0x1d0\n[ 114.495499] ? vsprintf+0x20/0x20\n[ 114.495723] ? set_blocksize+0x95/0x150\n[ 114.495964] get_tree_bdev+0x232/0x370\n[ 114.496272] ? put_ntfs+0x1d0/0x1d0\n[ 114.496502] ntfs_fs_get_tree+0x15/0x20\n[ 114.496859] vfs_get_tree+0x4c/0x130\n[ 114.497099] path_mount+0x654/0xfe0\n[ 114.497507] ? putname+0x80/0xa0\n[ 114.497933] ? finish_automount+0x2e0/0x2e0\n[ 114.498362] ? putname+0x80/0xa0\n[ 114.498571] ? kmem_cache_free+0x1c4/0x440\n[ 114.498819] ? putname+0x80/0xa0\n[ 114.499069] do_mount+0xd6/0xf0\n[ 114.499343] ? path_mount+0xfe0/0xfe0\n[ 114.499683] ? __kasan_check_write+0x14/0x20\n[ 114.500133] __x64_sys_mount+0xca/0x110\n[ 114.500592] do_syscall_64+0x3b/0x90\n[ 114.500930] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 114.501294] RIP: 0033:0x7fdc898e948a\n[ 114.501542] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[ 114.502716] RSP: 002b:00007ffd793e58f8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\n[ 114.503175] RAX: ffffffffffffffda RBX: 0000564b2228f060 RCX: 00007fdc898e948a\n[ 114.503588] RDX: 0000564b2228f260 RSI: 0000564b2228f2e0 RDI: 0000564b22297ce0\n[ 114.504925] RBP: 0000000000000000 R08: 0000564b2228f280 R09: 0000000000000020\n[ 114.505484] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564b22297ce0\n[ 114.505823] R13: 0000564b2228f260 R14: 0000000000000000 R15: 00000000ffffffff\n[ 114.506562] \u003c/TASK\u003e\n[ 114.506887] Modules linked in:\n[ 114.507648] CR2: 0000000000000008\n[ 114.508884] ---[ end trace 0000000000000000 ]---\n[ 114.509675] RIP: 0010:d_flags_for_inode+0xe0/0x110\n[ 114.510140] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241\n[ 114.511762] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296\n[ 114.512401] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea\n[ 114.51\n---truncated---"
}
],
"providerMetadata": {
"dateUpdated": "2026-01-02T15:04:19.065Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/f62506f5e45afbb01c84c3f28a2878b320a0b0f7"
},
{
"url": "https://git.kernel.org/stable/c/9f24743ddcdd3683b0a6b16e1439ad091dc3489b"
},
{
"url": "https://git.kernel.org/stable/c/a7b23037b38b577d9a4372e0c6b7c9fe808070c1"
},
{
"url": "https://git.kernel.org/stable/c/c1ca8ef0262b25493631ecbd9cb8c9893e1481a1"
}
],
"title": "fs/ntfs3: Add null pointer check for inode operations",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2022-50739",
"datePublished": "2025-12-24T13:05:37.468Z",
"dateReserved": "2025-12-24T13:02:21.542Z",
"dateUpdated": "2026-01-02T15:04:19.065Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-50739\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-24T13:16:00.603\",\"lastModified\":\"2025-12-29T15:58:34.503\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfs/ntfs3: Add null pointer check for inode operations\\n\\nThis adds a sanity check for the i_op pointer of the inode which is\\nreturned after reading Root directory MFT record. We should check the\\ni_op is valid before trying to create the root dentry, otherwise we may\\nencounter a NPD while mounting a image with a funny Root directory MFT\\nrecord.\\n\\n[ 114.484325] BUG: kernel NULL pointer dereference, address: 0000000000000008\\n[ 114.484811] #PF: supervisor read access in kernel mode\\n[ 114.485084] #PF: error_code(0x0000) - not-present page\\n[ 114.485606] PGD 0 P4D 0\\n[ 114.485975] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI\\n[ 114.486570] CPU: 0 PID: 237 Comm: mount Tainted: G B 6.0.0-rc4 #28\\n[ 114.486977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\\n[ 114.488169] RIP: 0010:d_flags_for_inode+0xe0/0x110\\n[ 114.488816] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241\\n[ 114.490326] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296\\n[ 114.490695] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea\\n[ 114.490986] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff87abd020\\n[ 114.491364] RBP: ffff8880065e7ac8 R08: 0000000000000001 R09: fffffbfff0f57a05\\n[ 114.491675] R10: ffffffff87abd027 R11: fffffbfff0f57a04 R12: 0000000000000000\\n[ 114.491954] R13: 0000000000000008 R14: 0000000000000000 R15: ffff888008ccd750\\n[ 114.492397] FS: 00007fdc8a627e40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000\\n[ 114.492797] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n[ 114.493150] CR2: 0000000000000008 CR3: 00000000013ba000 CR4: 00000000000006f0\\n[ 114.493671] Call Trace:\\n[ 114.493890] \u003cTASK\u003e\\n[ 114.494075] __d_instantiate+0x24/0x1c0\\n[ 114.494505] d_instantiate.part.0+0x35/0x50\\n[ 114.494754] d_make_root+0x53/0x80\\n[ 114.494998] ntfs_fill_super+0x1232/0x1b50\\n[ 114.495260] ? put_ntfs+0x1d0/0x1d0\\n[ 114.495499] ? vsprintf+0x20/0x20\\n[ 114.495723] ? set_blocksize+0x95/0x150\\n[ 114.495964] get_tree_bdev+0x232/0x370\\n[ 114.496272] ? put_ntfs+0x1d0/0x1d0\\n[ 114.496502] ntfs_fs_get_tree+0x15/0x20\\n[ 114.496859] vfs_get_tree+0x4c/0x130\\n[ 114.497099] path_mount+0x654/0xfe0\\n[ 114.497507] ? putname+0x80/0xa0\\n[ 114.497933] ? finish_automount+0x2e0/0x2e0\\n[ 114.498362] ? putname+0x80/0xa0\\n[ 114.498571] ? kmem_cache_free+0x1c4/0x440\\n[ 114.498819] ? putname+0x80/0xa0\\n[ 114.499069] do_mount+0xd6/0xf0\\n[ 114.499343] ? path_mount+0xfe0/0xfe0\\n[ 114.499683] ? __kasan_check_write+0x14/0x20\\n[ 114.500133] __x64_sys_mount+0xca/0x110\\n[ 114.500592] do_syscall_64+0x3b/0x90\\n[ 114.500930] entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n[ 114.501294] RIP: 0033:0x7fdc898e948a\\n[ 114.501542] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\\n[ 114.502716] RSP: 002b:00007ffd793e58f8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\\n[ 114.503175] RAX: ffffffffffffffda RBX: 0000564b2228f060 RCX: 00007fdc898e948a\\n[ 114.503588] RDX: 0000564b2228f260 RSI: 0000564b2228f2e0 RDI: 0000564b22297ce0\\n[ 114.504925] RBP: 0000000000000000 R08: 0000564b2228f280 R09: 0000000000000020\\n[ 114.505484] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564b22297ce0\\n[ 114.505823] R13: 0000564b2228f260 R14: 0000000000000000 R15: 00000000ffffffff\\n[ 114.506562] \u003c/TASK\u003e\\n[ 114.506887] Modules linked in:\\n[ 114.507648] CR2: 0000000000000008\\n[ 114.508884] ---[ end trace 0000000000000000 ]---\\n[ 114.509675] RIP: 0010:d_flags_for_inode+0xe0/0x110\\n[ 114.510140] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241\\n[ 114.511762] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296\\n[ 114.512401] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea\\n[ 114.51\\n---truncated---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/9f24743ddcdd3683b0a6b16e1439ad091dc3489b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a7b23037b38b577d9a4372e0c6b7c9fe808070c1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c1ca8ef0262b25493631ecbd9cb8c9893e1481a1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f62506f5e45afbb01c84c3f28a2878b320a0b0f7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
GHSA-9H8X-5G7F-6F2F
Vulnerability from github – Published: 2025-12-24 15:30 – Updated: 2025-12-24 15:30In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Add null pointer check for inode operations
This adds a sanity check for the i_op pointer of the inode which is returned after reading Root directory MFT record. We should check the i_op is valid before trying to create the root dentry, otherwise we may encounter a NPD while mounting a image with a funny Root directory MFT record.
[ 114.484325] BUG: kernel NULL pointer dereference, address: 0000000000000008 [ 114.484811] #PF: supervisor read access in kernel mode [ 114.485084] #PF: error_code(0x0000) - not-present page [ 114.485606] PGD 0 P4D 0 [ 114.485975] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 114.486570] CPU: 0 PID: 237 Comm: mount Tainted: G B 6.0.0-rc4 #28 [ 114.486977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 114.488169] RIP: 0010:d_flags_for_inode+0xe0/0x110 [ 114.488816] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241 [ 114.490326] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296 [ 114.490695] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea [ 114.490986] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff87abd020 [ 114.491364] RBP: ffff8880065e7ac8 R08: 0000000000000001 R09: fffffbfff0f57a05 [ 114.491675] R10: ffffffff87abd027 R11: fffffbfff0f57a04 R12: 0000000000000000 [ 114.491954] R13: 0000000000000008 R14: 0000000000000000 R15: ffff888008ccd750 [ 114.492397] FS: 00007fdc8a627e40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000 [ 114.492797] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 114.493150] CR2: 0000000000000008 CR3: 00000000013ba000 CR4: 00000000000006f0 [ 114.493671] Call Trace: [ 114.493890] [ 114.494075] __d_instantiate+0x24/0x1c0 [ 114.494505] d_instantiate.part.0+0x35/0x50 [ 114.494754] d_make_root+0x53/0x80 [ 114.494998] ntfs_fill_super+0x1232/0x1b50 [ 114.495260] ? put_ntfs+0x1d0/0x1d0 [ 114.495499] ? vsprintf+0x20/0x20 [ 114.495723] ? set_blocksize+0x95/0x150 [ 114.495964] get_tree_bdev+0x232/0x370 [ 114.496272] ? put_ntfs+0x1d0/0x1d0 [ 114.496502] ntfs_fs_get_tree+0x15/0x20 [ 114.496859] vfs_get_tree+0x4c/0x130 [ 114.497099] path_mount+0x654/0xfe0 [ 114.497507] ? putname+0x80/0xa0 [ 114.497933] ? finish_automount+0x2e0/0x2e0 [ 114.498362] ? putname+0x80/0xa0 [ 114.498571] ? kmem_cache_free+0x1c4/0x440 [ 114.498819] ? putname+0x80/0xa0 [ 114.499069] do_mount+0xd6/0xf0 [ 114.499343] ? path_mount+0xfe0/0xfe0 [ 114.499683] ? __kasan_check_write+0x14/0x20 [ 114.500133] __x64_sys_mount+0xca/0x110 [ 114.500592] do_syscall_64+0x3b/0x90 [ 114.500930] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 114.501294] RIP: 0033:0x7fdc898e948a [ 114.501542] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008 [ 114.502716] RSP: 002b:00007ffd793e58f8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 114.503175] RAX: ffffffffffffffda RBX: 0000564b2228f060 RCX: 00007fdc898e948a [ 114.503588] RDX: 0000564b2228f260 RSI: 0000564b2228f2e0 RDI: 0000564b22297ce0 [ 114.504925] RBP: 0000000000000000 R08: 0000564b2228f280 R09: 0000000000000020 [ 114.505484] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564b22297ce0 [ 114.505823] R13: 0000564b2228f260 R14: 0000000000000000 R15: 00000000ffffffff [ 114.506562] [ 114.506887] Modules linked in: [ 114.507648] CR2: 0000000000000008 [ 114.508884] ---[ end trace 0000000000000000 ]--- [ 114.509675] RIP: 0010:d_flags_for_inode+0xe0/0x110 [ 114.510140] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241 [ 114.511762] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296 [ 114.512401] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea [ 114.51 ---truncated---
{
"affected": [],
"aliases": [
"CVE-2022-50739"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-24T13:16:00Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Add null pointer check for inode operations\n\nThis adds a sanity check for the i_op pointer of the inode which is\nreturned after reading Root directory MFT record. We should check the\ni_op is valid before trying to create the root dentry, otherwise we may\nencounter a NPD while mounting a image with a funny Root directory MFT\nrecord.\n\n[ 114.484325] BUG: kernel NULL pointer dereference, address: 0000000000000008\n[ 114.484811] #PF: supervisor read access in kernel mode\n[ 114.485084] #PF: error_code(0x0000) - not-present page\n[ 114.485606] PGD 0 P4D 0\n[ 114.485975] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI\n[ 114.486570] CPU: 0 PID: 237 Comm: mount Tainted: G B 6.0.0-rc4 #28\n[ 114.486977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 114.488169] RIP: 0010:d_flags_for_inode+0xe0/0x110\n[ 114.488816] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241\n[ 114.490326] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296\n[ 114.490695] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea\n[ 114.490986] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff87abd020\n[ 114.491364] RBP: ffff8880065e7ac8 R08: 0000000000000001 R09: fffffbfff0f57a05\n[ 114.491675] R10: ffffffff87abd027 R11: fffffbfff0f57a04 R12: 0000000000000000\n[ 114.491954] R13: 0000000000000008 R14: 0000000000000000 R15: ffff888008ccd750\n[ 114.492397] FS: 00007fdc8a627e40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000\n[ 114.492797] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 114.493150] CR2: 0000000000000008 CR3: 00000000013ba000 CR4: 00000000000006f0\n[ 114.493671] Call Trace:\n[ 114.493890] \u003cTASK\u003e\n[ 114.494075] __d_instantiate+0x24/0x1c0\n[ 114.494505] d_instantiate.part.0+0x35/0x50\n[ 114.494754] d_make_root+0x53/0x80\n[ 114.494998] ntfs_fill_super+0x1232/0x1b50\n[ 114.495260] ? put_ntfs+0x1d0/0x1d0\n[ 114.495499] ? vsprintf+0x20/0x20\n[ 114.495723] ? set_blocksize+0x95/0x150\n[ 114.495964] get_tree_bdev+0x232/0x370\n[ 114.496272] ? put_ntfs+0x1d0/0x1d0\n[ 114.496502] ntfs_fs_get_tree+0x15/0x20\n[ 114.496859] vfs_get_tree+0x4c/0x130\n[ 114.497099] path_mount+0x654/0xfe0\n[ 114.497507] ? putname+0x80/0xa0\n[ 114.497933] ? finish_automount+0x2e0/0x2e0\n[ 114.498362] ? putname+0x80/0xa0\n[ 114.498571] ? kmem_cache_free+0x1c4/0x440\n[ 114.498819] ? putname+0x80/0xa0\n[ 114.499069] do_mount+0xd6/0xf0\n[ 114.499343] ? path_mount+0xfe0/0xfe0\n[ 114.499683] ? __kasan_check_write+0x14/0x20\n[ 114.500133] __x64_sys_mount+0xca/0x110\n[ 114.500592] do_syscall_64+0x3b/0x90\n[ 114.500930] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 114.501294] RIP: 0033:0x7fdc898e948a\n[ 114.501542] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[ 114.502716] RSP: 002b:00007ffd793e58f8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\n[ 114.503175] RAX: ffffffffffffffda RBX: 0000564b2228f060 RCX: 00007fdc898e948a\n[ 114.503588] RDX: 0000564b2228f260 RSI: 0000564b2228f2e0 RDI: 0000564b22297ce0\n[ 114.504925] RBP: 0000000000000000 R08: 0000564b2228f280 R09: 0000000000000020\n[ 114.505484] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564b22297ce0\n[ 114.505823] R13: 0000564b2228f260 R14: 0000000000000000 R15: 00000000ffffffff\n[ 114.506562] \u003c/TASK\u003e\n[ 114.506887] Modules linked in:\n[ 114.507648] CR2: 0000000000000008\n[ 114.508884] ---[ end trace 0000000000000000 ]---\n[ 114.509675] RIP: 0010:d_flags_for_inode+0xe0/0x110\n[ 114.510140] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241\n[ 114.511762] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296\n[ 114.512401] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea\n[ 114.51\n---truncated---",
"id": "GHSA-9h8x-5g7f-6f2f",
"modified": "2025-12-24T15:30:33Z",
"published": "2025-12-24T15:30:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50739"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/9f24743ddcdd3683b0a6b16e1439ad091dc3489b"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a7b23037b38b577d9a4372e0c6b7c9fe808070c1"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/c1ca8ef0262b25493631ecbd9cb8c9893e1481a1"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/f62506f5e45afbb01c84c3f28a2878b320a0b0f7"
}
],
"schema_version": "1.4.0",
"severity": []
}
BDU:2026-01143
Vulnerability from fstec - Published: 30.09.2022{
"CVSS 2.0": "AV:A/AC:H/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 5.16 \u0434\u043e 6.0.16 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 6.1 \u0434\u043e 6.1.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 5.15 \u0434\u043e 5.15.86 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50739-f061@gregkh/\nhttps://git.kernel.org/stable/c/f62506f5e45afbb01c84c3f28a2878b320a0b0f7\nhttps://git.kernel.org/stable/c/9f24743ddcdd3683b0a6b16e1439ad091dc3489b\nhttps://git.kernel.org/stable/c/a7b23037b38b577d9a4372e0c6b7c9fe808070c1\nhttps://git.kernel.org/stable/c/c1ca8ef0262b25493631ecbd9cb8c9893e1481a1\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.87\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.17\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.3",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "30.09.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "03.02.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "03.02.2026",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2026-01143",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-50739",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.16 \u0434\u043e 6.0.16 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.1 \u0434\u043e 6.1.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.15 \u0434\u043e 5.15.86 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ntfs_fill_super() \u043c\u043e\u0434\u0443\u043b\u044f fs/ntfs3/super.c \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b NTFS 3 \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f NULL (CWE-476)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ntfs_fill_super() \u043c\u043e\u0434\u0443\u043b\u044f fs/ntfs3/super.c \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b NTFS 3 \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u0435\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.cve.org/CVERecord?id=CVE-2022-50739\nhttps://git.kernel.org/stable/c/f62506f5e45afbb01c84c3f28a2878b320a0b0f7\nhttps://git.kernel.org/stable/c/9f24743ddcdd3683b0a6b16e1439ad091dc3489b\nhttps://git.kernel.org/stable/c/a7b23037b38b577d9a4372e0c6b7c9fe808070c1\nhttps://git.kernel.org/stable/c/c1ca8ef0262b25493631ecbd9cb8c9893e1481a1\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.87\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.17\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.3\nhttps://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50739-f061@gregkh/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-476",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,3)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,8)"
}
FKIE_CVE-2022-50739
Vulnerability from fkie_nvd - Published: 2025-12-24 13:16 - Updated: 2025-12-29 15:58| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Add null pointer check for inode operations\n\nThis adds a sanity check for the i_op pointer of the inode which is\nreturned after reading Root directory MFT record. We should check the\ni_op is valid before trying to create the root dentry, otherwise we may\nencounter a NPD while mounting a image with a funny Root directory MFT\nrecord.\n\n[ 114.484325] BUG: kernel NULL pointer dereference, address: 0000000000000008\n[ 114.484811] #PF: supervisor read access in kernel mode\n[ 114.485084] #PF: error_code(0x0000) - not-present page\n[ 114.485606] PGD 0 P4D 0\n[ 114.485975] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI\n[ 114.486570] CPU: 0 PID: 237 Comm: mount Tainted: G B 6.0.0-rc4 #28\n[ 114.486977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 114.488169] RIP: 0010:d_flags_for_inode+0xe0/0x110\n[ 114.488816] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241\n[ 114.490326] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296\n[ 114.490695] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea\n[ 114.490986] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff87abd020\n[ 114.491364] RBP: ffff8880065e7ac8 R08: 0000000000000001 R09: fffffbfff0f57a05\n[ 114.491675] R10: ffffffff87abd027 R11: fffffbfff0f57a04 R12: 0000000000000000\n[ 114.491954] R13: 0000000000000008 R14: 0000000000000000 R15: ffff888008ccd750\n[ 114.492397] FS: 00007fdc8a627e40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000\n[ 114.492797] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 114.493150] CR2: 0000000000000008 CR3: 00000000013ba000 CR4: 00000000000006f0\n[ 114.493671] Call Trace:\n[ 114.493890] \u003cTASK\u003e\n[ 114.494075] __d_instantiate+0x24/0x1c0\n[ 114.494505] d_instantiate.part.0+0x35/0x50\n[ 114.494754] d_make_root+0x53/0x80\n[ 114.494998] ntfs_fill_super+0x1232/0x1b50\n[ 114.495260] ? put_ntfs+0x1d0/0x1d0\n[ 114.495499] ? vsprintf+0x20/0x20\n[ 114.495723] ? set_blocksize+0x95/0x150\n[ 114.495964] get_tree_bdev+0x232/0x370\n[ 114.496272] ? put_ntfs+0x1d0/0x1d0\n[ 114.496502] ntfs_fs_get_tree+0x15/0x20\n[ 114.496859] vfs_get_tree+0x4c/0x130\n[ 114.497099] path_mount+0x654/0xfe0\n[ 114.497507] ? putname+0x80/0xa0\n[ 114.497933] ? finish_automount+0x2e0/0x2e0\n[ 114.498362] ? putname+0x80/0xa0\n[ 114.498571] ? kmem_cache_free+0x1c4/0x440\n[ 114.498819] ? putname+0x80/0xa0\n[ 114.499069] do_mount+0xd6/0xf0\n[ 114.499343] ? path_mount+0xfe0/0xfe0\n[ 114.499683] ? __kasan_check_write+0x14/0x20\n[ 114.500133] __x64_sys_mount+0xca/0x110\n[ 114.500592] do_syscall_64+0x3b/0x90\n[ 114.500930] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 114.501294] RIP: 0033:0x7fdc898e948a\n[ 114.501542] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[ 114.502716] RSP: 002b:00007ffd793e58f8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\n[ 114.503175] RAX: ffffffffffffffda RBX: 0000564b2228f060 RCX: 00007fdc898e948a\n[ 114.503588] RDX: 0000564b2228f260 RSI: 0000564b2228f2e0 RDI: 0000564b22297ce0\n[ 114.504925] RBP: 0000000000000000 R08: 0000564b2228f280 R09: 0000000000000020\n[ 114.505484] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564b22297ce0\n[ 114.505823] R13: 0000564b2228f260 R14: 0000000000000000 R15: 00000000ffffffff\n[ 114.506562] \u003c/TASK\u003e\n[ 114.506887] Modules linked in:\n[ 114.507648] CR2: 0000000000000008\n[ 114.508884] ---[ end trace 0000000000000000 ]---\n[ 114.509675] RIP: 0010:d_flags_for_inode+0xe0/0x110\n[ 114.510140] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241\n[ 114.511762] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296\n[ 114.512401] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea\n[ 114.51\n---truncated---"
}
],
"id": "CVE-2022-50739",
"lastModified": "2025-12-29T15:58:34.503",
"metrics": {},
"published": "2025-12-24T13:16:00.603",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/9f24743ddcdd3683b0a6b16e1439ad091dc3489b"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/a7b23037b38b577d9a4372e0c6b7c9fe808070c1"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/c1ca8ef0262b25493631ecbd9cb8c9893e1481a1"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/f62506f5e45afbb01c84c3f28a2878b320a0b0f7"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
WID-SEC-W-2025-2929
Vulnerability from csaf_certbund - Published: 2025-12-28 23:00 - Updated: 2026-03-05 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2929 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2929.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2929 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2929"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50712",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2022-50712-6c0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50713",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2022-50713-24cc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50714",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50714-32b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50715",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50715-5640@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50716",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2022-50716-88e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50717",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2022-50717-dc68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50718",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2022-50718-a890@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50719",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2022-50719-02d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50720",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50720-0297@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50721",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50721-9683@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50722",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50722-06c7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50723",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2022-50723-a62d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50724",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50724-f625@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50725",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50725-967f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50726",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2022-50726-2f42@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50727",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50727-95aa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50728",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50728-afa8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50729",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2022-50729-f996@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50730",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50730-a4ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50731",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50731-a78b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50732",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2022-50732-042c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50733",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50733-a587@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50734",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50734-96fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50735",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50735-2929@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50736",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2022-50736-1cb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50737",
"url": "https://lore.kernel.org/linux-cve-announce/2025122447-CVE-2022-50737-45ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50738",
"url": "https://lore.kernel.org/linux-cve-announce/2025122447-CVE-2022-50738-d561@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50739",
"url": "https://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50739-f061@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50740",
"url": "https://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50740-a780@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50741",
"url": "https://lore.kernel.org/linux-cve-announce/2025122448-CVE-2022-50741-1736@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50742",
"url": "https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2022-50742-e130@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50743",
"url": "https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2022-50743-8e63@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50744",
"url": "https://lore.kernel.org/linux-cve-announce/2025122449-CVE-2022-50744-bc80@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50745",
"url": "https://lore.kernel.org/linux-cve-announce/2025122450-CVE-2022-50745-af5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50746",
"url": "https://lore.kernel.org/linux-cve-announce/2025122450-CVE-2022-50746-7cbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50747",
"url": "https://lore.kernel.org/linux-cve-announce/2025122450-CVE-2022-50747-8937@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50748",
"url": "https://lore.kernel.org/linux-cve-announce/2025122451-CVE-2022-50748-0136@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50749",
"url": "https://lore.kernel.org/linux-cve-announce/2025122451-CVE-2022-50749-dae0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50750",
"url": "https://lore.kernel.org/linux-cve-announce/2025122451-CVE-2022-50750-5395@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50751",
"url": "https://lore.kernel.org/linux-cve-announce/2025122452-CVE-2022-50751-b5ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50752",
"url": "https://lore.kernel.org/linux-cve-announce/2025122452-CVE-2022-50752-fa82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50753",
"url": "https://lore.kernel.org/linux-cve-announce/2025122452-CVE-2022-50753-6266@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50754",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2022-50754-ec9a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50755",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2022-50755-f5d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50756",
"url": "https://lore.kernel.org/linux-cve-announce/2025122453-CVE-2022-50756-ce43@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50757",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2022-50757-15f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50758",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2022-50758-800b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50759",
"url": "https://lore.kernel.org/linux-cve-announce/2025122454-CVE-2022-50759-747e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50760",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2022-50760-b793@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50761",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2022-50761-0e67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50762",
"url": "https://lore.kernel.org/linux-cve-announce/2025122455-CVE-2022-50762-282c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50763",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50763-923e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50764",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50764-45eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50765",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50765-356e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50766",
"url": "https://lore.kernel.org/linux-cve-announce/2025122456-CVE-2022-50766-0964@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50767",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2022-50767-9a13@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50768",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2022-50768-2703@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50769",
"url": "https://lore.kernel.org/linux-cve-announce/2025122457-CVE-2022-50769-f4db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50770",
"url": "https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2022-50770-ba3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50771",
"url": "https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2022-50771-3440@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50772",
"url": "https://lore.kernel.org/linux-cve-announce/2025122458-CVE-2022-50772-774d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50773",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2022-50773-b946@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50774",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2022-50774-73eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50775",
"url": "https://lore.kernel.org/linux-cve-announce/2025122459-CVE-2022-50775-6733@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50776",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2022-50776-f275@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50777",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2022-50777-d1e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50778",
"url": "https://lore.kernel.org/linux-cve-announce/2025122400-CVE-2022-50778-0b9a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50779",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2022-50779-fa1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50780",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2022-50780-bc90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50781",
"url": "https://lore.kernel.org/linux-cve-announce/2025122401-CVE-2022-50781-3d18@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50782",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2022-50782-d849@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50783",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2022-50783-3109@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54043",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54043-16c8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54044",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54044-61d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54045",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54045-e0ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54046",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54046-aaf6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54047",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54047-42ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54048",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54048-ea7d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54049",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54049-79f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54050",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54050-737a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54051",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54051-b704@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54052",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54052-302d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54053",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54053-9a4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54054",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54054-292f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54055",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54055-3b5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54056",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54056-fd56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54057",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54057-f0c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54058",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54058-ce20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54059",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54059-c769@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54060",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54060-2029@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54061",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54061-5cd1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54062",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54062-d861@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54063",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54063-e78c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54064",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54064-7509@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54065",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54065-1de4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54066",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54066-8ff7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54067",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54067-46cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54068",
"url": "https://lore.kernel.org/linux-cve-announce/2025122430-CVE-2023-54068-dbe6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54069",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54069-1a17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54070",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54070-6104@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54071",
"url": "https://lore.kernel.org/linux-cve-announce/2025122431-CVE-2023-54071-b4c6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54072",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54072-4a34@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54073",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54073-249f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54074",
"url": "https://lore.kernel.org/linux-cve-announce/2025122432-CVE-2023-54074-cf89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54075",
"url": "https://lore.kernel.org/linux-cve-announce/2025122433-CVE-2023-54075-ab3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54076",
"url": "https://lore.kernel.org/linux-cve-announce/2025122433-CVE-2023-54076-e317@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54077",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54077-61a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54078",
"url": "https://lore.kernel.org/linux-cve-announce/2025122402-CVE-2023-54078-03f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54079",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2023-54079-be62@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54080",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2023-54080-bec3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54081",
"url": "https://lore.kernel.org/linux-cve-announce/2025122403-CVE-2023-54081-3fc3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54082",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2023-54082-4124@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54083",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2023-54083-fc0e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54084",
"url": "https://lore.kernel.org/linux-cve-announce/2025122404-CVE-2023-54084-a862@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54085",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2023-54085-7e32@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54086",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2023-54086-d696@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54087",
"url": "https://lore.kernel.org/linux-cve-announce/2025122405-CVE-2023-54087-38fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54088",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54088-f00f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54089",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54089-ddc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54090",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2023-54090-2944@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54091",
"url": "https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2023-54091-577a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54092",
"url": "https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2023-54092-91ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54093",
"url": "https://lore.kernel.org/linux-cve-announce/2025122407-CVE-2023-54093-fcea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54094",
"url": "https://lore.kernel.org/linux-cve-announce/2025122408-CVE-2023-54094-e8ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54095",
"url": "https://lore.kernel.org/linux-cve-announce/2025122408-CVE-2023-54095-7fe0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54096",
"url": "https://lore.kernel.org/linux-cve-announce/2025122408-CVE-2023-54096-efde@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54097",
"url": "https://lore.kernel.org/linux-cve-announce/2025122409-CVE-2023-54097-3fb1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54098",
"url": "https://lore.kernel.org/linux-cve-announce/2025122409-CVE-2023-54098-d7c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54099",
"url": "https://lore.kernel.org/linux-cve-announce/2025122409-CVE-2023-54099-4143@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54100",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2023-54100-91a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54101",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2023-54101-49f5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54102",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2023-54102-7dd5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54103",
"url": "https://lore.kernel.org/linux-cve-announce/2025122411-CVE-2023-54103-5493@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54104",
"url": "https://lore.kernel.org/linux-cve-announce/2025122411-CVE-2023-54104-32e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54105",
"url": "https://lore.kernel.org/linux-cve-announce/2025122411-CVE-2023-54105-fbe5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54106",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54106-b8da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54107",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54107-12ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54108",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54108-d5be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54109",
"url": "https://lore.kernel.org/linux-cve-announce/2025122412-CVE-2023-54109-714c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54110",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2023-54110-5816@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54111",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2023-54111-de3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54112",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2023-54112-71f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54113",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2023-54113-de5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54114",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2023-54114-8362@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54115",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2023-54115-19b7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54116",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2023-54116-886b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54117",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2023-54117-e980@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54118",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2023-54118-d92b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54119",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2023-54119-fbd4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54120",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2023-54120-d966@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54121",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2023-54121-691a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54122",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2023-54122-b6f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54123",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2023-54123-4e1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54124",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2023-54124-d6ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54125",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2023-54125-2085@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54126",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2023-54126-7e20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54127",
"url": "https://lore.kernel.org/linux-cve-announce/2025122418-CVE-2023-54127-87e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54128",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2023-54128-a164@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54129",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2023-54129-8cb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54130",
"url": "https://lore.kernel.org/linux-cve-announce/2025122419-CVE-2023-54130-3339@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54131",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2023-54131-87b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54132",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2023-54132-dd33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54133",
"url": "https://lore.kernel.org/linux-cve-announce/2025122420-CVE-2023-54133-dc22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54134",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2023-54134-2972@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54135",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2023-54135-ffa3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54136",
"url": "https://lore.kernel.org/linux-cve-announce/2025122421-CVE-2023-54136-b58d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54137",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54137-1873@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54138",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54138-188c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54139",
"url": "https://lore.kernel.org/linux-cve-announce/2025122422-CVE-2023-54139-ce08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54140",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54140-4841@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54141",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54141-86e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54142",
"url": "https://lore.kernel.org/linux-cve-announce/2025122423-CVE-2023-54142-fd19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54143",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54143-adb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54144",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54144-f3be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54145",
"url": "https://lore.kernel.org/linux-cve-announce/2025122424-CVE-2023-54145-421d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54146",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54146-1510@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54147",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54147-dafb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54148",
"url": "https://lore.kernel.org/linux-cve-announce/2025122425-CVE-2023-54148-569b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54149",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54149-e39f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54150",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54150-dbc1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54151",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54151-854b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54152",
"url": "https://lore.kernel.org/linux-cve-announce/2025122426-CVE-2023-54152-5e4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54153",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54153-63a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54154",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54154-bc1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54155",
"url": "https://lore.kernel.org/linux-cve-announce/2025122427-CVE-2023-54155-e238@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54156",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54156-832a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54157",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54157-c0c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54158",
"url": "https://lore.kernel.org/linux-cve-announce/2025122428-CVE-2023-54158-0a83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54159",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54159-5908@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54160",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54160-ed90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54161",
"url": "https://lore.kernel.org/linux-cve-announce/2025122429-CVE-2023-54161-53d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68735",
"url": "https://lore.kernel.org/linux-cve-announce/2025122410-CVE-2025-68735-dce5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68736",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2025-68736-30ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68737",
"url": "https://lore.kernel.org/linux-cve-announce/2025122413-CVE-2025-68737-596a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68738",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2025-68738-79ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68739",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2025-68739-b2a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68740",
"url": "https://lore.kernel.org/linux-cve-announce/2025122414-CVE-2025-68740-dcfd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68741",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2025-68741-894a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68742",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2025-68742-367d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68743",
"url": "https://lore.kernel.org/linux-cve-announce/2025122415-CVE-2025-68743-f0bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68744",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2025-68744-bf55@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68745",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2025-68745-69b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68746",
"url": "https://lore.kernel.org/linux-cve-announce/2025122416-CVE-2025-68746-bd3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68747",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2025-68747-572e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68748",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2025-68748-45cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68749",
"url": "https://lore.kernel.org/linux-cve-announce/2025122417-CVE-2025-68749-1160@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68750",
"url": "https://lore.kernel.org/linux-cve-announce/2025122406-CVE-2025-68750-7ff1@gregkh/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10039-1 vom 2026-01-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNRBJ6HLDODCC2A4DQ3QHZ6XBQSZQO26/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0263-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0317-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0350-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0352-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023998.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0369-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8016-1 vom 2026-02-04",
"url": "https://ubuntu.com/security/notices/USN-8016-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20228-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20220-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6126 vom 2026-02-09",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6127 vom 2026-02-10",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0411-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-1 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4476 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0474-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0496-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-4 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-3 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-2 vom 2026-02-18",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-113 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-113.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-6 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-3 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-1 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50112 vom 2026-02-23",
"url": "https://linux.oracle.com/errata/ELSA-2026-50112.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-2 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-8 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3083 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3083.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20287-1 vom 2026-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7KIWX7XP3UMVFSHT47OOZ24TQQYNNHI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0734-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024508.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0731-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024509.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0727-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024510.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0725-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024511.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0713-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024512.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0711-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024513.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0710-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024514.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0707-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024515.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0700-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024516.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0696-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024519.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0698-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024518.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-2 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-098 vom 2026-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-098.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20615-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20570-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20599-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20564-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20555-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024590.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-05T23:00:00.000+00:00",
"generator": {
"date": "2026-03-06T10:24:38.179+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2929",
"initial_release_date": "2025-12-28T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Debian und Ubuntu aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
}
],
"status": "final",
"version": "23"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028463",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50712",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50712"
},
{
"cve": "CVE-2022-50713",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50713"
},
{
"cve": "CVE-2022-50714",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50714"
},
{
"cve": "CVE-2022-50715",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50715"
},
{
"cve": "CVE-2022-50716",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50716"
},
{
"cve": "CVE-2022-50717",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50717"
},
{
"cve": "CVE-2022-50718",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50718"
},
{
"cve": "CVE-2022-50719",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50719"
},
{
"cve": "CVE-2022-50720",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50720"
},
{
"cve": "CVE-2022-50721",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50721"
},
{
"cve": "CVE-2022-50722",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50722"
},
{
"cve": "CVE-2022-50723",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50723"
},
{
"cve": "CVE-2022-50724",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50724"
},
{
"cve": "CVE-2022-50725",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50725"
},
{
"cve": "CVE-2022-50726",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50726"
},
{
"cve": "CVE-2022-50727",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50727"
},
{
"cve": "CVE-2022-50728",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50728"
},
{
"cve": "CVE-2022-50729",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50729"
},
{
"cve": "CVE-2022-50730",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50730"
},
{
"cve": "CVE-2022-50731",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50731"
},
{
"cve": "CVE-2022-50732",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50732"
},
{
"cve": "CVE-2022-50733",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50733"
},
{
"cve": "CVE-2022-50734",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50734"
},
{
"cve": "CVE-2022-50735",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50735"
},
{
"cve": "CVE-2022-50736",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50736"
},
{
"cve": "CVE-2022-50737",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50737"
},
{
"cve": "CVE-2022-50738",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50738"
},
{
"cve": "CVE-2022-50739",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50739"
},
{
"cve": "CVE-2022-50740",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50740"
},
{
"cve": "CVE-2022-50741",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50741"
},
{
"cve": "CVE-2022-50742",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50742"
},
{
"cve": "CVE-2022-50743",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50743"
},
{
"cve": "CVE-2022-50744",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50744"
},
{
"cve": "CVE-2022-50745",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50745"
},
{
"cve": "CVE-2022-50746",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50746"
},
{
"cve": "CVE-2022-50747",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50747"
},
{
"cve": "CVE-2022-50748",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50748"
},
{
"cve": "CVE-2022-50749",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50749"
},
{
"cve": "CVE-2022-50750",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50750"
},
{
"cve": "CVE-2022-50751",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50751"
},
{
"cve": "CVE-2022-50752",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50752"
},
{
"cve": "CVE-2022-50753",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50753"
},
{
"cve": "CVE-2022-50754",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50754"
},
{
"cve": "CVE-2022-50755",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50755"
},
{
"cve": "CVE-2022-50756",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50756"
},
{
"cve": "CVE-2022-50757",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50757"
},
{
"cve": "CVE-2022-50758",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50758"
},
{
"cve": "CVE-2022-50759",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50759"
},
{
"cve": "CVE-2022-50760",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50760"
},
{
"cve": "CVE-2022-50761",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50761"
},
{
"cve": "CVE-2022-50762",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50762"
},
{
"cve": "CVE-2022-50763",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50763"
},
{
"cve": "CVE-2022-50764",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50764"
},
{
"cve": "CVE-2022-50765",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50765"
},
{
"cve": "CVE-2022-50766",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50766"
},
{
"cve": "CVE-2022-50767",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50767"
},
{
"cve": "CVE-2022-50768",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50768"
},
{
"cve": "CVE-2022-50769",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50769"
},
{
"cve": "CVE-2022-50770",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50770"
},
{
"cve": "CVE-2022-50771",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50771"
},
{
"cve": "CVE-2022-50772",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50772"
},
{
"cve": "CVE-2022-50773",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50773"
},
{
"cve": "CVE-2022-50774",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50774"
},
{
"cve": "CVE-2022-50775",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50775"
},
{
"cve": "CVE-2022-50776",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50776"
},
{
"cve": "CVE-2022-50777",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50777"
},
{
"cve": "CVE-2022-50778",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50778"
},
{
"cve": "CVE-2022-50779",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50779"
},
{
"cve": "CVE-2022-50780",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50780"
},
{
"cve": "CVE-2022-50781",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50781"
},
{
"cve": "CVE-2022-50782",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50782"
},
{
"cve": "CVE-2022-50783",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2022-50783"
},
{
"cve": "CVE-2023-54043",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54043"
},
{
"cve": "CVE-2023-54044",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54044"
},
{
"cve": "CVE-2023-54045",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54045"
},
{
"cve": "CVE-2023-54046",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54046"
},
{
"cve": "CVE-2023-54047",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54047"
},
{
"cve": "CVE-2023-54048",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54048"
},
{
"cve": "CVE-2023-54049",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54049"
},
{
"cve": "CVE-2023-54050",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54050"
},
{
"cve": "CVE-2023-54051",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54051"
},
{
"cve": "CVE-2023-54052",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54052"
},
{
"cve": "CVE-2023-54053",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54053"
},
{
"cve": "CVE-2023-54054",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54054"
},
{
"cve": "CVE-2023-54055",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54055"
},
{
"cve": "CVE-2023-54056",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54056"
},
{
"cve": "CVE-2023-54057",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54057"
},
{
"cve": "CVE-2023-54058",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54058"
},
{
"cve": "CVE-2023-54059",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54059"
},
{
"cve": "CVE-2023-54060",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54060"
},
{
"cve": "CVE-2023-54061",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54061"
},
{
"cve": "CVE-2023-54062",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54062"
},
{
"cve": "CVE-2023-54063",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54063"
},
{
"cve": "CVE-2023-54064",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54064"
},
{
"cve": "CVE-2023-54065",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54065"
},
{
"cve": "CVE-2023-54066",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54066"
},
{
"cve": "CVE-2023-54067",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54067"
},
{
"cve": "CVE-2023-54068",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54068"
},
{
"cve": "CVE-2023-54069",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54069"
},
{
"cve": "CVE-2023-54070",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54070"
},
{
"cve": "CVE-2023-54071",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54071"
},
{
"cve": "CVE-2023-54072",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54072"
},
{
"cve": "CVE-2023-54073",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54073"
},
{
"cve": "CVE-2023-54074",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54074"
},
{
"cve": "CVE-2023-54075",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54075"
},
{
"cve": "CVE-2023-54076",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54076"
},
{
"cve": "CVE-2023-54077",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54077"
},
{
"cve": "CVE-2023-54078",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54078"
},
{
"cve": "CVE-2023-54079",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54079"
},
{
"cve": "CVE-2023-54080",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54080"
},
{
"cve": "CVE-2023-54081",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54081"
},
{
"cve": "CVE-2023-54082",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54082"
},
{
"cve": "CVE-2023-54083",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54083"
},
{
"cve": "CVE-2023-54084",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54084"
},
{
"cve": "CVE-2023-54085",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54085"
},
{
"cve": "CVE-2023-54086",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54086"
},
{
"cve": "CVE-2023-54087",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54087"
},
{
"cve": "CVE-2023-54088",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54088"
},
{
"cve": "CVE-2023-54089",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54089"
},
{
"cve": "CVE-2023-54090",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54090"
},
{
"cve": "CVE-2023-54091",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54091"
},
{
"cve": "CVE-2023-54092",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54092"
},
{
"cve": "CVE-2023-54093",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54093"
},
{
"cve": "CVE-2023-54094",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54094"
},
{
"cve": "CVE-2023-54095",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54095"
},
{
"cve": "CVE-2023-54096",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54096"
},
{
"cve": "CVE-2023-54097",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54097"
},
{
"cve": "CVE-2023-54098",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54098"
},
{
"cve": "CVE-2023-54099",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54099"
},
{
"cve": "CVE-2023-54100",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54100"
},
{
"cve": "CVE-2023-54101",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54101"
},
{
"cve": "CVE-2023-54102",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54102"
},
{
"cve": "CVE-2023-54103",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54103"
},
{
"cve": "CVE-2023-54104",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54104"
},
{
"cve": "CVE-2023-54105",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54105"
},
{
"cve": "CVE-2023-54106",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54106"
},
{
"cve": "CVE-2023-54107",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54107"
},
{
"cve": "CVE-2023-54108",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54108"
},
{
"cve": "CVE-2023-54109",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54109"
},
{
"cve": "CVE-2023-54110",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54110"
},
{
"cve": "CVE-2023-54111",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54111"
},
{
"cve": "CVE-2023-54112",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54112"
},
{
"cve": "CVE-2023-54113",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54113"
},
{
"cve": "CVE-2023-54114",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54114"
},
{
"cve": "CVE-2023-54115",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54115"
},
{
"cve": "CVE-2023-54116",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54116"
},
{
"cve": "CVE-2023-54117",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54117"
},
{
"cve": "CVE-2023-54118",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54118"
},
{
"cve": "CVE-2023-54119",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54119"
},
{
"cve": "CVE-2023-54120",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54120"
},
{
"cve": "CVE-2023-54121",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54121"
},
{
"cve": "CVE-2023-54122",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54122"
},
{
"cve": "CVE-2023-54123",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54123"
},
{
"cve": "CVE-2023-54124",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54124"
},
{
"cve": "CVE-2023-54125",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54125"
},
{
"cve": "CVE-2023-54126",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54126"
},
{
"cve": "CVE-2023-54127",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54127"
},
{
"cve": "CVE-2023-54128",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54128"
},
{
"cve": "CVE-2023-54129",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54129"
},
{
"cve": "CVE-2023-54130",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54130"
},
{
"cve": "CVE-2023-54131",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54131"
},
{
"cve": "CVE-2023-54132",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54132"
},
{
"cve": "CVE-2023-54133",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54133"
},
{
"cve": "CVE-2023-54134",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54134"
},
{
"cve": "CVE-2023-54135",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54135"
},
{
"cve": "CVE-2023-54136",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54136"
},
{
"cve": "CVE-2023-54137",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54137"
},
{
"cve": "CVE-2023-54138",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54138"
},
{
"cve": "CVE-2023-54139",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54139"
},
{
"cve": "CVE-2023-54140",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54140"
},
{
"cve": "CVE-2023-54141",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54141"
},
{
"cve": "CVE-2023-54142",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54142"
},
{
"cve": "CVE-2023-54143",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54143"
},
{
"cve": "CVE-2023-54144",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54144"
},
{
"cve": "CVE-2023-54145",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54145"
},
{
"cve": "CVE-2023-54146",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54146"
},
{
"cve": "CVE-2023-54147",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54147"
},
{
"cve": "CVE-2023-54148",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54148"
},
{
"cve": "CVE-2023-54149",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54149"
},
{
"cve": "CVE-2023-54150",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54150"
},
{
"cve": "CVE-2023-54151",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54151"
},
{
"cve": "CVE-2023-54152",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54152"
},
{
"cve": "CVE-2023-54153",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54153"
},
{
"cve": "CVE-2023-54154",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54154"
},
{
"cve": "CVE-2023-54155",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54155"
},
{
"cve": "CVE-2023-54156",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54156"
},
{
"cve": "CVE-2023-54157",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54157"
},
{
"cve": "CVE-2023-54158",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54158"
},
{
"cve": "CVE-2023-54159",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54159"
},
{
"cve": "CVE-2023-54160",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54160"
},
{
"cve": "CVE-2023-54161",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2023-54161"
},
{
"cve": "CVE-2025-68735",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68735"
},
{
"cve": "CVE-2025-68736",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68736"
},
{
"cve": "CVE-2025-68737",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68737"
},
{
"cve": "CVE-2025-68738",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68738"
},
{
"cve": "CVE-2025-68739",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68739"
},
{
"cve": "CVE-2025-68740",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68740"
},
{
"cve": "CVE-2025-68741",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68741"
},
{
"cve": "CVE-2025-68742",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68742"
},
{
"cve": "CVE-2025-68743",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68743"
},
{
"cve": "CVE-2025-68744",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68744"
},
{
"cve": "CVE-2025-68745",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68745"
},
{
"cve": "CVE-2025-68746",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68746"
},
{
"cve": "CVE-2025-68747",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68747"
},
{
"cve": "CVE-2025-68748",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68748"
},
{
"cve": "CVE-2025-68749",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68749"
},
{
"cve": "CVE-2025-68750",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T004914"
]
},
"release_date": "2025-12-28T23:00:00.000+00:00",
"title": "CVE-2025-68750"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.