Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53240 (GCVE-0-2023-53240)
Vulnerability from cvelistv5
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Version: 18b1ab7aa76bde181bdb1ab19a87fa9523c32f21 Version: 18b1ab7aa76bde181bdb1ab19a87fa9523c32f21 Version: 18b1ab7aa76bde181bdb1ab19a87fa9523c32f21 Version: ad7219cd8751bd258b9d1e69ae0654ec00f71875 Version: d1579253ffce39986e7a6ab757ac93b2680a665f Version: 8a2dea162b92c322f3e42eae0c4a74b8d20aa7a9 |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/xdp/xsk.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "cecc68559cd57fffb2be50685f262b9af2318e16",
"status": "affected",
"version": "18b1ab7aa76bde181bdb1ab19a87fa9523c32f21",
"versionType": "git"
},
{
"lessThan": "ffe19750e68d0bb21e8110b398346eef20b156a7",
"status": "affected",
"version": "18b1ab7aa76bde181bdb1ab19a87fa9523c32f21",
"versionType": "git"
},
{
"lessThan": "1596dae2f17ec5c6e8c8f0e3fec78c5ae55c1e0b",
"status": "affected",
"version": "18b1ab7aa76bde181bdb1ab19a87fa9523c32f21",
"versionType": "git"
},
{
"status": "affected",
"version": "ad7219cd8751bd258b9d1e69ae0654ec00f71875",
"versionType": "git"
},
{
"status": "affected",
"version": "d1579253ffce39986e7a6ab757ac93b2680a665f",
"versionType": "git"
},
{
"status": "affected",
"version": "8a2dea162b92c322f3e42eae0c4a74b8d20aa7a9",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"net/xdp/xsk.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.18"
},
{
"lessThan": "5.18",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.16",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.2.*",
"status": "unaffected",
"version": "6.2.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.3",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.16",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.3",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: check IFF_UP earlier in Tx path\n\nXsk Tx can be triggered via either sendmsg() or poll() syscalls. These\ntwo paths share a call to common function xsk_xmit() which has two\nsanity checks within. A pseudo code example to show the two paths:\n\n__xsk_sendmsg() : xsk_poll():\nif (unlikely(!xsk_is_bound(xs))) if (unlikely(!xsk_is_bound(xs)))\n return -ENXIO; return mask;\nif (unlikely(need_wait)) (...)\n return -EOPNOTSUPP; xsk_xmit()\nmark napi id\n(...)\nxsk_xmit()\n\nxsk_xmit():\nif (unlikely(!(xs-\u003edev-\u003eflags \u0026 IFF_UP)))\n\treturn -ENETDOWN;\nif (unlikely(!xs-\u003etx))\n\treturn -ENOBUFS;\n\nAs it can be observed above, in sendmsg() napi id can be marked on\ninterface that was not brought up and this causes a NULL ptr\ndereference:\n\n[31757.505631] BUG: kernel NULL pointer dereference, address: 0000000000000018\n[31757.512710] #PF: supervisor read access in kernel mode\n[31757.517936] #PF: error_code(0x0000) - not-present page\n[31757.523149] PGD 0 P4D 0\n[31757.525726] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[31757.530154] CPU: 26 PID: 95641 Comm: xdpsock Not tainted 6.2.0-rc5+ #40\n[31757.536871] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019\n[31757.547457] RIP: 0010:xsk_sendmsg+0xde/0x180\n[31757.551799] Code: 00 75 a2 48 8b 00 a8 04 75 9b 84 d2 74 69 8b 85 14 01 00 00 85 c0 75 1b 48 8b 85 28 03 00 00 48 8b 80 98 00 00 00 48 8b 40 20 \u003c8b\u003e 40 18 89 85 14 01 00 00 8b bd 14 01 00 00 81 ff 00 01 00 00 0f\n[31757.570840] RSP: 0018:ffffc90034f27dc0 EFLAGS: 00010246\n[31757.576143] RAX: 0000000000000000 RBX: ffffc90034f27e18 RCX: 0000000000000000\n[31757.583389] RDX: 0000000000000001 RSI: ffffc90034f27e18 RDI: ffff88984cf3c100\n[31757.590631] RBP: ffff88984714a800 R08: ffff88984714a800 R09: 0000000000000000\n[31757.597877] R10: 0000000000000001 R11: 0000000000000000 R12: 00000000fffffffa\n[31757.605123] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000000\n[31757.612364] FS: 00007fb4c5931180(0000) GS:ffff88afdfa00000(0000) knlGS:0000000000000000\n[31757.620571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[31757.626406] CR2: 0000000000000018 CR3: 000000184b41c003 CR4: 00000000007706e0\n[31757.633648] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[31757.640894] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[31757.648139] PKRU: 55555554\n[31757.650894] Call Trace:\n[31757.653385] \u003cTASK\u003e\n[31757.655524] sock_sendmsg+0x8f/0xa0\n[31757.659077] ? sockfd_lookup_light+0x12/0x70\n[31757.663416] __sys_sendto+0xfc/0x170\n[31757.667051] ? do_sched_setscheduler+0xdb/0x1b0\n[31757.671658] __x64_sys_sendto+0x20/0x30\n[31757.675557] do_syscall_64+0x38/0x90\n[31757.679197] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n[31757.687969] Code: 8e f6 ff 44 8b 4c 24 2c 4c 8b 44 24 20 41 89 c4 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 3a 44 89 e7 48 89 44 24 08 e8 b5 8e f6 ff 48\n[31757.707007] RSP: 002b:00007ffd49c73c70 EFLAGS: 00000293 ORIG_RAX: 000000000000002c\n[31757.714694] RAX: ffffffffffffffda RBX: 000055a996565380 RCX: 00007fb4c5727c16\n[31757.721939] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n[31757.729184] RBP: 0000000000000040 R08: 0000000000000000 R09: 0000000000000000\n[31757.736429] R10: 0000000000000040 R11: 0000000000000293 R12: 0000000000000000\n[31757.743673] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[31757.754940] \u003c/TASK\u003e\n\nTo fix this, let\u0027s make xsk_xmit a function that will be responsible for\ngeneric Tx, where RCU is handled accordingly and pull out sanity checks\nand xs-\u003ezc handling. Populate sanity checks to __xsk_sendmsg() and\nxsk_poll()."
}
],
"providerMetadata": {
"dateUpdated": "2025-09-15T14:22:14.241Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/cecc68559cd57fffb2be50685f262b9af2318e16"
},
{
"url": "https://git.kernel.org/stable/c/ffe19750e68d0bb21e8110b398346eef20b156a7"
},
{
"url": "https://git.kernel.org/stable/c/1596dae2f17ec5c6e8c8f0e3fec78c5ae55c1e0b"
}
],
"title": "xsk: check IFF_UP earlier in Tx path",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-53240",
"datePublished": "2025-09-15T14:22:14.241Z",
"dateReserved": "2025-09-15T14:19:21.848Z",
"dateUpdated": "2025-09-15T14:22:14.241Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-53240\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-15T15:15:51.120\",\"lastModified\":\"2025-12-03T20:41:59.990\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nxsk: check IFF_UP earlier in Tx path\\n\\nXsk Tx can be triggered via either sendmsg() or poll() syscalls. These\\ntwo paths share a call to common function xsk_xmit() which has two\\nsanity checks within. A pseudo code example to show the two paths:\\n\\n__xsk_sendmsg() : xsk_poll():\\nif (unlikely(!xsk_is_bound(xs))) if (unlikely(!xsk_is_bound(xs)))\\n return -ENXIO; return mask;\\nif (unlikely(need_wait)) (...)\\n return -EOPNOTSUPP; xsk_xmit()\\nmark napi id\\n(...)\\nxsk_xmit()\\n\\nxsk_xmit():\\nif (unlikely(!(xs-\u003edev-\u003eflags \u0026 IFF_UP)))\\n\\treturn -ENETDOWN;\\nif (unlikely(!xs-\u003etx))\\n\\treturn -ENOBUFS;\\n\\nAs it can be observed above, in sendmsg() napi id can be marked on\\ninterface that was not brought up and this causes a NULL ptr\\ndereference:\\n\\n[31757.505631] BUG: kernel NULL pointer dereference, address: 0000000000000018\\n[31757.512710] #PF: supervisor read access in kernel mode\\n[31757.517936] #PF: error_code(0x0000) - not-present page\\n[31757.523149] PGD 0 P4D 0\\n[31757.525726] Oops: 0000 [#1] PREEMPT SMP NOPTI\\n[31757.530154] CPU: 26 PID: 95641 Comm: xdpsock Not tainted 6.2.0-rc5+ #40\\n[31757.536871] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019\\n[31757.547457] RIP: 0010:xsk_sendmsg+0xde/0x180\\n[31757.551799] Code: 00 75 a2 48 8b 00 a8 04 75 9b 84 d2 74 69 8b 85 14 01 00 00 85 c0 75 1b 48 8b 85 28 03 00 00 48 8b 80 98 00 00 00 48 8b 40 20 \u003c8b\u003e 40 18 89 85 14 01 00 00 8b bd 14 01 00 00 81 ff 00 01 00 00 0f\\n[31757.570840] RSP: 0018:ffffc90034f27dc0 EFLAGS: 00010246\\n[31757.576143] RAX: 0000000000000000 RBX: ffffc90034f27e18 RCX: 0000000000000000\\n[31757.583389] RDX: 0000000000000001 RSI: ffffc90034f27e18 RDI: ffff88984cf3c100\\n[31757.590631] RBP: ffff88984714a800 R08: ffff88984714a800 R09: 0000000000000000\\n[31757.597877] R10: 0000000000000001 R11: 0000000000000000 R12: 00000000fffffffa\\n[31757.605123] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000000\\n[31757.612364] FS: 00007fb4c5931180(0000) GS:ffff88afdfa00000(0000) knlGS:0000000000000000\\n[31757.620571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n[31757.626406] CR2: 0000000000000018 CR3: 000000184b41c003 CR4: 00000000007706e0\\n[31757.633648] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\\n[31757.640894] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\\n[31757.648139] PKRU: 55555554\\n[31757.650894] Call Trace:\\n[31757.653385] \u003cTASK\u003e\\n[31757.655524] sock_sendmsg+0x8f/0xa0\\n[31757.659077] ? sockfd_lookup_light+0x12/0x70\\n[31757.663416] __sys_sendto+0xfc/0x170\\n[31757.667051] ? do_sched_setscheduler+0xdb/0x1b0\\n[31757.671658] __x64_sys_sendto+0x20/0x30\\n[31757.675557] do_syscall_64+0x38/0x90\\n[31757.679197] entry_SYSCALL_64_after_hwframe+0x72/0xdc\\n[31757.687969] Code: 8e f6 ff 44 8b 4c 24 2c 4c 8b 44 24 20 41 89 c4 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 3a 44 89 e7 48 89 44 24 08 e8 b5 8e f6 ff 48\\n[31757.707007] RSP: 002b:00007ffd49c73c70 EFLAGS: 00000293 ORIG_RAX: 000000000000002c\\n[31757.714694] RAX: ffffffffffffffda RBX: 000055a996565380 RCX: 00007fb4c5727c16\\n[31757.721939] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\\n[31757.729184] RBP: 0000000000000040 R08: 0000000000000000 R09: 0000000000000000\\n[31757.736429] R10: 0000000000000040 R11: 0000000000000293 R12: 0000000000000000\\n[31757.743673] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\\n[31757.754940] \u003c/TASK\u003e\\n\\nTo fix this, let\u0027s make xsk_xmit a function that will be responsible for\\ngeneric Tx, where RCU is handled accordingly and pull out sanity checks\\nand xs-\u003ezc handling. Populate sanity checks to __xsk_sendmsg() and\\nxsk_poll().\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.33\",\"versionEndExcluding\":\"5.16\",\"matchCriteriaId\":\"38E7A7B3-C56B-4D09-A3BC-1A47B10759B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16.19\",\"versionEndExcluding\":\"5.17\",\"matchCriteriaId\":\"D4ED89FC-18EE-445F-8FE2-A2B6A5F9BB13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.17.2\",\"versionEndExcluding\":\"6.1.16\",\"matchCriteriaId\":\"AD68A6E9-F664-4594-B8A0-ED32253D6067\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.2.3\",\"matchCriteriaId\":\"88C67289-22AD-4CA9-B202-5F5A80E5BA4B\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1596dae2f17ec5c6e8c8f0e3fec78c5ae55c1e0b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/cecc68559cd57fffb2be50685f262b9af2318e16\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ffe19750e68d0bb21e8110b398346eef20b156a7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
ghsa-5qr9-cjj5-7m79
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
xsk: check IFF_UP earlier in Tx path
Xsk Tx can be triggered via either sendmsg() or poll() syscalls. These two paths share a call to common function xsk_xmit() which has two sanity checks within. A pseudo code example to show the two paths:
__xsk_sendmsg() : xsk_poll(): if (unlikely(!xsk_is_bound(xs))) if (unlikely(!xsk_is_bound(xs))) return -ENXIO; return mask; if (unlikely(need_wait)) (...) return -EOPNOTSUPP; xsk_xmit() mark napi id (...) xsk_xmit()
xsk_xmit(): if (unlikely(!(xs->dev->flags & IFF_UP))) return -ENETDOWN; if (unlikely(!xs->tx)) return -ENOBUFS;
As it can be observed above, in sendmsg() napi id can be marked on interface that was not brought up and this causes a NULL ptr dereference:
[31757.505631] BUG: kernel NULL pointer dereference, address: 0000000000000018 [31757.512710] #PF: supervisor read access in kernel mode [31757.517936] #PF: error_code(0x0000) - not-present page [31757.523149] PGD 0 P4D 0 [31757.525726] Oops: 0000 [#1] PREEMPT SMP NOPTI [31757.530154] CPU: 26 PID: 95641 Comm: xdpsock Not tainted 6.2.0-rc5+ #40 [31757.536871] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019 [31757.547457] RIP: 0010:xsk_sendmsg+0xde/0x180 [31757.551799] Code: 00 75 a2 48 8b 00 a8 04 75 9b 84 d2 74 69 8b 85 14 01 00 00 85 c0 75 1b 48 8b 85 28 03 00 00 48 8b 80 98 00 00 00 48 8b 40 20 <8b> 40 18 89 85 14 01 00 00 8b bd 14 01 00 00 81 ff 00 01 00 00 0f [31757.570840] RSP: 0018:ffffc90034f27dc0 EFLAGS: 00010246 [31757.576143] RAX: 0000000000000000 RBX: ffffc90034f27e18 RCX: 0000000000000000 [31757.583389] RDX: 0000000000000001 RSI: ffffc90034f27e18 RDI: ffff88984cf3c100 [31757.590631] RBP: ffff88984714a800 R08: ffff88984714a800 R09: 0000000000000000 [31757.597877] R10: 0000000000000001 R11: 0000000000000000 R12: 00000000fffffffa [31757.605123] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000000 [31757.612364] FS: 00007fb4c5931180(0000) GS:ffff88afdfa00000(0000) knlGS:0000000000000000 [31757.620571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [31757.626406] CR2: 0000000000000018 CR3: 000000184b41c003 CR4: 00000000007706e0 [31757.633648] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [31757.640894] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [31757.648139] PKRU: 55555554 [31757.650894] Call Trace: [31757.653385] [31757.655524] sock_sendmsg+0x8f/0xa0 [31757.659077] ? sockfd_lookup_light+0x12/0x70 [31757.663416] __sys_sendto+0xfc/0x170 [31757.667051] ? do_sched_setscheduler+0xdb/0x1b0 [31757.671658] __x64_sys_sendto+0x20/0x30 [31757.675557] do_syscall_64+0x38/0x90 [31757.679197] entry_SYSCALL_64_after_hwframe+0x72/0xdc [31757.687969] Code: 8e f6 ff 44 8b 4c 24 2c 4c 8b 44 24 20 41 89 c4 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 3a 44 89 e7 48 89 44 24 08 e8 b5 8e f6 ff 48 [31757.707007] RSP: 002b:00007ffd49c73c70 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [31757.714694] RAX: ffffffffffffffda RBX: 000055a996565380 RCX: 00007fb4c5727c16 [31757.721939] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [31757.729184] RBP: 0000000000000040 R08: 0000000000000000 R09: 0000000000000000 [31757.736429] R10: 0000000000000040 R11: 0000000000000293 R12: 0000000000000000 [31757.743673] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [31757.754940]
To fix this, let's make xsk_xmit a function that will be responsible for generic Tx, where RCU is handled accordingly and pull out sanity checks and xs->zc handling. Populate sanity checks to __xsk_sendmsg() and xsk_poll().
{
"affected": [],
"aliases": [
"CVE-2023-53240"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-15T15:15:51Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: check IFF_UP earlier in Tx path\n\nXsk Tx can be triggered via either sendmsg() or poll() syscalls. These\ntwo paths share a call to common function xsk_xmit() which has two\nsanity checks within. A pseudo code example to show the two paths:\n\n__xsk_sendmsg() : xsk_poll():\nif (unlikely(!xsk_is_bound(xs))) if (unlikely(!xsk_is_bound(xs)))\n return -ENXIO; return mask;\nif (unlikely(need_wait)) (...)\n return -EOPNOTSUPP; xsk_xmit()\nmark napi id\n(...)\nxsk_xmit()\n\nxsk_xmit():\nif (unlikely(!(xs-\u003edev-\u003eflags \u0026 IFF_UP)))\n\treturn -ENETDOWN;\nif (unlikely(!xs-\u003etx))\n\treturn -ENOBUFS;\n\nAs it can be observed above, in sendmsg() napi id can be marked on\ninterface that was not brought up and this causes a NULL ptr\ndereference:\n\n[31757.505631] BUG: kernel NULL pointer dereference, address: 0000000000000018\n[31757.512710] #PF: supervisor read access in kernel mode\n[31757.517936] #PF: error_code(0x0000) - not-present page\n[31757.523149] PGD 0 P4D 0\n[31757.525726] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[31757.530154] CPU: 26 PID: 95641 Comm: xdpsock Not tainted 6.2.0-rc5+ #40\n[31757.536871] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019\n[31757.547457] RIP: 0010:xsk_sendmsg+0xde/0x180\n[31757.551799] Code: 00 75 a2 48 8b 00 a8 04 75 9b 84 d2 74 69 8b 85 14 01 00 00 85 c0 75 1b 48 8b 85 28 03 00 00 48 8b 80 98 00 00 00 48 8b 40 20 \u003c8b\u003e 40 18 89 85 14 01 00 00 8b bd 14 01 00 00 81 ff 00 01 00 00 0f\n[31757.570840] RSP: 0018:ffffc90034f27dc0 EFLAGS: 00010246\n[31757.576143] RAX: 0000000000000000 RBX: ffffc90034f27e18 RCX: 0000000000000000\n[31757.583389] RDX: 0000000000000001 RSI: ffffc90034f27e18 RDI: ffff88984cf3c100\n[31757.590631] RBP: ffff88984714a800 R08: ffff88984714a800 R09: 0000000000000000\n[31757.597877] R10: 0000000000000001 R11: 0000000000000000 R12: 00000000fffffffa\n[31757.605123] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000000\n[31757.612364] FS: 00007fb4c5931180(0000) GS:ffff88afdfa00000(0000) knlGS:0000000000000000\n[31757.620571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[31757.626406] CR2: 0000000000000018 CR3: 000000184b41c003 CR4: 00000000007706e0\n[31757.633648] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[31757.640894] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[31757.648139] PKRU: 55555554\n[31757.650894] Call Trace:\n[31757.653385] \u003cTASK\u003e\n[31757.655524] sock_sendmsg+0x8f/0xa0\n[31757.659077] ? sockfd_lookup_light+0x12/0x70\n[31757.663416] __sys_sendto+0xfc/0x170\n[31757.667051] ? do_sched_setscheduler+0xdb/0x1b0\n[31757.671658] __x64_sys_sendto+0x20/0x30\n[31757.675557] do_syscall_64+0x38/0x90\n[31757.679197] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n[31757.687969] Code: 8e f6 ff 44 8b 4c 24 2c 4c 8b 44 24 20 41 89 c4 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 3a 44 89 e7 48 89 44 24 08 e8 b5 8e f6 ff 48\n[31757.707007] RSP: 002b:00007ffd49c73c70 EFLAGS: 00000293 ORIG_RAX: 000000000000002c\n[31757.714694] RAX: ffffffffffffffda RBX: 000055a996565380 RCX: 00007fb4c5727c16\n[31757.721939] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n[31757.729184] RBP: 0000000000000040 R08: 0000000000000000 R09: 0000000000000000\n[31757.736429] R10: 0000000000000040 R11: 0000000000000293 R12: 0000000000000000\n[31757.743673] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[31757.754940] \u003c/TASK\u003e\n\nTo fix this, let\u0027s make xsk_xmit a function that will be responsible for\ngeneric Tx, where RCU is handled accordingly and pull out sanity checks\nand xs-\u003ezc handling. Populate sanity checks to __xsk_sendmsg() and\nxsk_poll().",
"id": "GHSA-5qr9-cjj5-7m79",
"modified": "2025-12-03T21:31:00Z",
"published": "2025-09-15T15:31:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53240"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/1596dae2f17ec5c6e8c8f0e3fec78c5ae55c1e0b"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/cecc68559cd57fffb2be50685f262b9af2318e16"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ffe19750e68d0bb21e8110b398346eef20b156a7"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2025-AVI-1070
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft CBL Mariner. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | CBL Mariner | cbl2 kernel 5.15.186.1-1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 kernel 5.15.186.1-1",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
}
],
"initial_release_date": "2025-12-05T00:00:00",
"last_revision_date": "2025-12-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1070",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft CBL Mariner. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft CBL Mariner",
"vendor_advisories": [
{
"published_at": "2025-12-03",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53178",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53178"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53149",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53149"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50256",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50256"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53248",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53248"
},
{
"published_at": "2025-12-04",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50266",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50266"
},
{
"published_at": "2025-12-04",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53261",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53261"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53254",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53254"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53247",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53247"
},
{
"published_at": "2025-12-03",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50350",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50350"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50316",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50316"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53218",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53218"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50260",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50260"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53221",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53221"
},
{
"published_at": "2025-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53240",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53240"
},
{
"published_at": "2025-12-04",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53292",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53292"
},
{
"published_at": "2025-12-03",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-53187",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53187"
}
]
}
wid-sec-w-2025-2053
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht n\u00e4her beschriebene Auswirkungen zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2053 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2053.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2053 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2053"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50234",
"url": "https://lore.kernel.org/linux-cve-announce/2025091545-CVE-2022-50234-bd01@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50235",
"url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50235-a5c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50236",
"url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50236-dc41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50239",
"url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50239-3908@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50240",
"url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50240-6e40@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50241",
"url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50241-0f92@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50242",
"url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50242-9a25@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50243",
"url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50243-4311@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50244",
"url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50244-4e09@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50245",
"url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50245-57e4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50246",
"url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50246-d173@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50247",
"url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50247-1ab7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50248",
"url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50248-edcb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50249",
"url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50249-bfbe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50250",
"url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50250-1be1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50251",
"url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50251-c216@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50252",
"url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50252-5c96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50253",
"url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50253-1ed7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50254",
"url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50254-c910@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50255",
"url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50255-c5ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50256",
"url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50256-069f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50257",
"url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50257-648e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50258",
"url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50258-1497@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50259",
"url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50259-6276@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50260",
"url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50260-a136@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50261",
"url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50261-9892@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50262",
"url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2022-50262-0645@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50263",
"url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2022-50263-040c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50264",
"url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50264-3988@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50265",
"url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50265-509d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50266",
"url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50266-9532@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50267",
"url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50267-2de9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50268",
"url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50268-bcdf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50269",
"url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50269-24d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50270",
"url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50270-5b28@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50271",
"url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50271-2175@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50272",
"url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50272-4120@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50273",
"url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50273-5521@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50274",
"url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50274-ad8d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50275",
"url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50275-2ef2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50276",
"url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50276-e9a6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50277",
"url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50277-085f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50278",
"url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50278-fcc9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50279",
"url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50279-412b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50280",
"url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50280-762f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50281",
"url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50281-f141@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50282",
"url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50282-322d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50283",
"url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50283-d21e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50284",
"url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50284-b5c2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50285",
"url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50285-955c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50286",
"url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50286-b313@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50287",
"url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50287-a3ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50288",
"url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50288-3421@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50289",
"url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50289-1532@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50290",
"url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50290-a7af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50291",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50291-82e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50292",
"url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50292-cb74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50293",
"url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50293-2dbe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50294",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50294-7c87@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50295",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50295-8141@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50296",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50296-7d7e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50297",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50297-974e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50298",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50298-06f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50299",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50299-9449@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50300",
"url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50300-203c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50301",
"url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50301-c26c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50302",
"url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50302-89ee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50303",
"url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50303-7759@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50304",
"url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50304-4b20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50305",
"url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50305-8aba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50306",
"url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50306-c1da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50307",
"url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50307-3240@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50308",
"url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50308-8b1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50309",
"url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50309-f82b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50310",
"url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50310-aa10@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50311",
"url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50311-0c21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50312",
"url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50312-105d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50313",
"url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50313-2fa9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50314",
"url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50314-9a10@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50315",
"url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50315-a3b8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50316",
"url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50316-6e9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50317",
"url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50317-6b3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50318",
"url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50318-6f5e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50319",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50319-6747@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50320",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50320-5ffa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50321",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50321-bba8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50322",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50322-079d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50323",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50323-a29f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50324",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50324-e9d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50325",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50325-d6bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50326",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50326-7ffc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50327",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50327-5d27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50328",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50328-f996@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50329",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50329-58ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50330",
"url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50330-cd49@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50331",
"url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50331-53e1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50332",
"url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50332-a052@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50333",
"url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50333-d81f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50334",
"url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50334-488d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50335",
"url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50335-141b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50336",
"url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50336-0b7e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50337",
"url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50337-42aa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50338",
"url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50338-506b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53147",
"url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2023-53147-8f20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53148",
"url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53148-e1b8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53149",
"url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53149-2f0a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53150",
"url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53150-29b0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53151",
"url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53151-263e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53152",
"url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53152-130d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53153",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53153-d85c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53163",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53163-860f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53164",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53164-3a5d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53165",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53165-a7c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53166",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53166-12e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53167",
"url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53167-3fb7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53168",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53168-7628@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53169",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53169-0678@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53170",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53170-d187@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53171",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53171-be9f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53172",
"url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53172-3f93@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53173",
"url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53173-4180@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53174",
"url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53174-ed92@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53175",
"url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53175-66fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53176",
"url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53176-4194@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53177",
"url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53177-9a91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53178",
"url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53178-9d27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53179",
"url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53179-eb55@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53180",
"url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53180-5e16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53181",
"url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53181-608c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53182",
"url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53182-dcdb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53183",
"url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53183-b15d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53184",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53184-3b7a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53185",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53185-2f8d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53186",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53186-25a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53187",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53187-fb77@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53188",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53188-373f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53189",
"url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53189-19c2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53190",
"url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53190-0dfe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53191",
"url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53191-7baa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53192",
"url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53192-5ca6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53193",
"url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53193-74f6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53194",
"url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53194-1804@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53195",
"url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53195-a853@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53196",
"url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53196-c59a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53197",
"url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53197-1f23@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53198",
"url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53198-094a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53199",
"url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53199-8a8c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53200",
"url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53200-a0c8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53201",
"url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53201-baf1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53202",
"url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53202-5e01@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53203",
"url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53203-4a9c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53204",
"url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53204-3e15@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53205",
"url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53205-9a2b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53206",
"url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53206-33fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53207",
"url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53207-5025@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53208",
"url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53208-b31d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53209",
"url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53209-ed9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53210",
"url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53210-0e06@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53211",
"url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53211-6015@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53212",
"url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53212-fdd4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53213",
"url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53213-dfc5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53214",
"url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53214-87f5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53215",
"url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53215-8895@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53216",
"url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53216-7693@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53217",
"url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53217-0de0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53218",
"url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53218-0fca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53219",
"url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53219-bd20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53220",
"url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53220-e514@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53221",
"url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53221-c23e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53222",
"url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53222-c1a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53223",
"url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53223-ee66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53224",
"url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53224-190d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53225",
"url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53225-5ed5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53226",
"url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53226-a44a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53227",
"url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53227-6a15@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53228",
"url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53228-441c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53229",
"url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53229-a0ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53230",
"url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53230-6c94@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53231",
"url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53231-7743@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53232",
"url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53232-39fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53233",
"url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53233-8c6b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53234",
"url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53234-5a07@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53235",
"url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53235-1104@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53236",
"url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53236-49ad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53237",
"url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53237-7d1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53238",
"url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53238-f8a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53239",
"url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53239-9ea0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53240",
"url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53240-c379@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53241",
"url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53241-c75a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53242",
"url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53242-b7c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53243",
"url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53243-bac7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53244",
"url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53244-197d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53245",
"url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53245-256b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53246",
"url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53246-a539@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53247",
"url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53247-60a0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53248",
"url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53248-aa39@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53249",
"url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53249-aab7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53250",
"url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53250-05ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53251",
"url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53251-8d43@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53252",
"url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53252-3a4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53253",
"url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53253-c59c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53254",
"url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53254-0aa0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53255",
"url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53255-ba5b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53256",
"url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53256-d5af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53257",
"url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53257-6162@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53258",
"url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53258-35f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53259",
"url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53259-5409@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53260",
"url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53260-2323@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53261",
"url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53261-6a1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53262",
"url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53262-822a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39800",
"url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2025-39800-6b30@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39801",
"url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39801-00f9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39802",
"url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39802-fba9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39803",
"url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39803-eb8e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39804",
"url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39804-bf3b@gregkh/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6009 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6008 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-090 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-106 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-106.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15585-1 vom 2025-09-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUHLDYQM4UZOZRCPRIEXRRIGQ4XKRHRT/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17734 vom 2025-10-13",
"url": "https://access.redhat.com/errata/RHSA-2025:17734"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4328 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17896 vom 2025-10-14",
"url": "https://access.redhat.com/errata/RHSA-2025:17896"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19103 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19103"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19102 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19102"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19102 vom 2025-10-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-19102.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19103 vom 2025-11-02",
"url": "https://errata.build.resf.org/RLSA-2025:19103"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19447 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19447"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19440 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19440"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19102 vom 2025-11-02",
"url": "https://errata.build.resf.org/RLSA-2025:19102"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3926-1 vom 2025-11-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023143.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19447 vom 2025-11-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-19447.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19886 vom 2025-11-06",
"url": "https://access.redhat.com/errata/RHSA-2025:19886"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19932 vom 2025-11-10",
"url": "https://access.redhat.com/errata/RHSA-2025:19932"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19931 vom 2025-11-10",
"url": "https://access.redhat.com/errata/RHSA-2025:19931"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4003-1 vom 2025-11-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQ7PALX2YQR3276WY4HDL5KSHY44V2SB/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4004-1 vom 2025-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023184.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4004-1 vom 2025-11-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52KJMC6KEJKOVV5Q6D5ZPOZA4APZFOKK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4036-1 vom 2025-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023194.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4031-1 vom 2025-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023188.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4024-1 vom 2025-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023189.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4040-1 vom 2025-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023198.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4016-1 vom 2025-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023187.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4046-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023199.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4043-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023200.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19931 vom 2025-11-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-19931.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21051 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21051"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21084 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21084"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4050-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023201.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4058-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023253.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4062-1 vom 2025-11-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJ2VEXZP2FCPHK5GUCIVCG6PCCNXFJQG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4059-1 vom 2025-11-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC7YTFXG3CODN5E4DDDIYLZW6DH3E2JX/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21083 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21083"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21091 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21091"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4064-1 vom 2025-11-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O3YV2NDOYYBTRM6AP6NX7CFZ2F2Q4JTS/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-25757.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4064-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023258.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21136 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21136"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21128 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21128"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4078-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023260.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19932 vom 2025-11-13",
"url": "https://errata.build.resf.org/RLSA-2025:19932"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19931 vom 2025-11-13",
"url": "https://errata.build.resf.org/RLSA-2025:19931"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4111-1 vom 2025-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4123-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4135-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4139-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4149-1 vom 2025-11-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22006 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22006"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4188-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVPUJWNDCBFGM2O2EFX4S5QBPKDARVQ7/"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-24T23:00:00.000+00:00",
"generator": {
"date": "2025-11-25T09:14:50.137+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2053",
"initial_release_date": "2025-09-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2023-59886, EUVD-2023-59887, EUVD-2023-59888, EUVD-2023-59889, EUVD-2023-59890, EUVD-2023-59891, EUVD-2023-59892, EUVD-2023-59913, EUVD-2023-59923"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-02T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux und Dell aufgenommen"
},
{
"date": "2025-11-05T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-09T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat, SUSE und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-20T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
}
],
"status": "final",
"version": "29"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028463",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50234",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50234"
},
{
"cve": "CVE-2022-50235",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50235"
},
{
"cve": "CVE-2022-50236",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50236"
},
{
"cve": "CVE-2022-50239",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50239"
},
{
"cve": "CVE-2022-50240",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50240"
},
{
"cve": "CVE-2022-50241",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50241"
},
{
"cve": "CVE-2022-50242",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50242"
},
{
"cve": "CVE-2022-50243",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50243"
},
{
"cve": "CVE-2022-50244",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50244"
},
{
"cve": "CVE-2022-50245",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50245"
},
{
"cve": "CVE-2022-50246",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50246"
},
{
"cve": "CVE-2022-50247",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50247"
},
{
"cve": "CVE-2022-50248",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50248"
},
{
"cve": "CVE-2022-50249",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50249"
},
{
"cve": "CVE-2022-50250",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50250"
},
{
"cve": "CVE-2022-50251",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50251"
},
{
"cve": "CVE-2022-50252",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50252"
},
{
"cve": "CVE-2022-50253",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2022-50254",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50254"
},
{
"cve": "CVE-2022-50255",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50255"
},
{
"cve": "CVE-2022-50256",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50256"
},
{
"cve": "CVE-2022-50257",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50257"
},
{
"cve": "CVE-2022-50258",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50258"
},
{
"cve": "CVE-2022-50259",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50259"
},
{
"cve": "CVE-2022-50260",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50260"
},
{
"cve": "CVE-2022-50261",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50261"
},
{
"cve": "CVE-2022-50262",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50262"
},
{
"cve": "CVE-2022-50263",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50263"
},
{
"cve": "CVE-2022-50264",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50264"
},
{
"cve": "CVE-2022-50265",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50265"
},
{
"cve": "CVE-2022-50266",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50266"
},
{
"cve": "CVE-2022-50267",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50267"
},
{
"cve": "CVE-2022-50268",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50268"
},
{
"cve": "CVE-2022-50269",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50269"
},
{
"cve": "CVE-2022-50270",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50270"
},
{
"cve": "CVE-2022-50271",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50271"
},
{
"cve": "CVE-2022-50272",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50272"
},
{
"cve": "CVE-2022-50273",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50273"
},
{
"cve": "CVE-2022-50274",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50274"
},
{
"cve": "CVE-2022-50275",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50275"
},
{
"cve": "CVE-2022-50276",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50276"
},
{
"cve": "CVE-2022-50277",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50277"
},
{
"cve": "CVE-2022-50278",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50278"
},
{
"cve": "CVE-2022-50279",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50279"
},
{
"cve": "CVE-2022-50280",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50280"
},
{
"cve": "CVE-2022-50281",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50281"
},
{
"cve": "CVE-2022-50282",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50282"
},
{
"cve": "CVE-2022-50283",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50283"
},
{
"cve": "CVE-2022-50284",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50284"
},
{
"cve": "CVE-2022-50285",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50285"
},
{
"cve": "CVE-2022-50286",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50286"
},
{
"cve": "CVE-2022-50287",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50287"
},
{
"cve": "CVE-2022-50288",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50288"
},
{
"cve": "CVE-2022-50289",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50289"
},
{
"cve": "CVE-2022-50290",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50290"
},
{
"cve": "CVE-2022-50291",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50291"
},
{
"cve": "CVE-2022-50292",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50292"
},
{
"cve": "CVE-2022-50293",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50293"
},
{
"cve": "CVE-2022-50294",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50294"
},
{
"cve": "CVE-2022-50295",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50295"
},
{
"cve": "CVE-2022-50296",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50296"
},
{
"cve": "CVE-2022-50297",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50297"
},
{
"cve": "CVE-2022-50298",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50298"
},
{
"cve": "CVE-2022-50299",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50299"
},
{
"cve": "CVE-2022-50300",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50300"
},
{
"cve": "CVE-2022-50301",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50301"
},
{
"cve": "CVE-2022-50302",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50302"
},
{
"cve": "CVE-2022-50303",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50303"
},
{
"cve": "CVE-2022-50304",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50304"
},
{
"cve": "CVE-2022-50305",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50305"
},
{
"cve": "CVE-2022-50306",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50306"
},
{
"cve": "CVE-2022-50307",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50307"
},
{
"cve": "CVE-2022-50308",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50308"
},
{
"cve": "CVE-2022-50309",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50309"
},
{
"cve": "CVE-2022-50310",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50310"
},
{
"cve": "CVE-2022-50311",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50311"
},
{
"cve": "CVE-2022-50312",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50312"
},
{
"cve": "CVE-2022-50313",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50313"
},
{
"cve": "CVE-2022-50314",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50314"
},
{
"cve": "CVE-2022-50315",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50315"
},
{
"cve": "CVE-2022-50316",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50316"
},
{
"cve": "CVE-2022-50317",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50317"
},
{
"cve": "CVE-2022-50318",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50318"
},
{
"cve": "CVE-2022-50319",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50319"
},
{
"cve": "CVE-2022-50320",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50320"
},
{
"cve": "CVE-2022-50321",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50321"
},
{
"cve": "CVE-2022-50322",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50322"
},
{
"cve": "CVE-2022-50323",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50323"
},
{
"cve": "CVE-2022-50324",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50324"
},
{
"cve": "CVE-2022-50325",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50325"
},
{
"cve": "CVE-2022-50326",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50326"
},
{
"cve": "CVE-2022-50327",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50327"
},
{
"cve": "CVE-2022-50328",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50328"
},
{
"cve": "CVE-2022-50329",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50329"
},
{
"cve": "CVE-2022-50330",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50330"
},
{
"cve": "CVE-2022-50331",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50331"
},
{
"cve": "CVE-2022-50332",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50332"
},
{
"cve": "CVE-2022-50333",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50333"
},
{
"cve": "CVE-2022-50334",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50334"
},
{
"cve": "CVE-2022-50335",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50335"
},
{
"cve": "CVE-2022-50336",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50336"
},
{
"cve": "CVE-2022-50337",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50337"
},
{
"cve": "CVE-2022-50338",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2022-50338"
},
{
"cve": "CVE-2023-3772",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-3772"
},
{
"cve": "CVE-2023-53147",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53147"
},
{
"cve": "CVE-2023-53148",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53148"
},
{
"cve": "CVE-2023-53149",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53149"
},
{
"cve": "CVE-2023-53150",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53150"
},
{
"cve": "CVE-2023-53151",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53151"
},
{
"cve": "CVE-2023-53152",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53152"
},
{
"cve": "CVE-2023-53153",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53153"
},
{
"cve": "CVE-2023-53163",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53163"
},
{
"cve": "CVE-2023-53164",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53164"
},
{
"cve": "CVE-2023-53165",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53165"
},
{
"cve": "CVE-2023-53166",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53166"
},
{
"cve": "CVE-2023-53167",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53167"
},
{
"cve": "CVE-2023-53168",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53168"
},
{
"cve": "CVE-2023-53169",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53169"
},
{
"cve": "CVE-2023-53170",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53170"
},
{
"cve": "CVE-2023-53171",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53171"
},
{
"cve": "CVE-2023-53172",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53172"
},
{
"cve": "CVE-2023-53173",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53173"
},
{
"cve": "CVE-2023-53174",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53174"
},
{
"cve": "CVE-2023-53175",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53175"
},
{
"cve": "CVE-2023-53176",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53176"
},
{
"cve": "CVE-2023-53177",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53177"
},
{
"cve": "CVE-2023-53178",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53178"
},
{
"cve": "CVE-2023-53179",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53179"
},
{
"cve": "CVE-2023-53180",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53180"
},
{
"cve": "CVE-2023-53181",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53181"
},
{
"cve": "CVE-2023-53182",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53182"
},
{
"cve": "CVE-2023-53183",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53183"
},
{
"cve": "CVE-2023-53184",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53184"
},
{
"cve": "CVE-2023-53185",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53185"
},
{
"cve": "CVE-2023-53186",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53186"
},
{
"cve": "CVE-2023-53187",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53187"
},
{
"cve": "CVE-2023-53188",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53188"
},
{
"cve": "CVE-2023-53189",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53189"
},
{
"cve": "CVE-2023-53190",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53190"
},
{
"cve": "CVE-2023-53191",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53191"
},
{
"cve": "CVE-2023-53192",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53192"
},
{
"cve": "CVE-2023-53193",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53193"
},
{
"cve": "CVE-2023-53194",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53194"
},
{
"cve": "CVE-2023-53195",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53195"
},
{
"cve": "CVE-2023-53196",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53196"
},
{
"cve": "CVE-2023-53197",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53197"
},
{
"cve": "CVE-2023-53198",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53198"
},
{
"cve": "CVE-2023-53199",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53199"
},
{
"cve": "CVE-2023-53200",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53200"
},
{
"cve": "CVE-2023-53201",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53201"
},
{
"cve": "CVE-2023-53202",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53202"
},
{
"cve": "CVE-2023-53203",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53203"
},
{
"cve": "CVE-2023-53204",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53204"
},
{
"cve": "CVE-2023-53205",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53205"
},
{
"cve": "CVE-2023-53206",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53206"
},
{
"cve": "CVE-2023-53207",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53207"
},
{
"cve": "CVE-2023-53208",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53208"
},
{
"cve": "CVE-2023-53209",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53209"
},
{
"cve": "CVE-2023-53210",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53210"
},
{
"cve": "CVE-2023-53211",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53211"
},
{
"cve": "CVE-2023-53212",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53212"
},
{
"cve": "CVE-2023-53213",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53213"
},
{
"cve": "CVE-2023-53214",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53214"
},
{
"cve": "CVE-2023-53215",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53215"
},
{
"cve": "CVE-2023-53216",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53216"
},
{
"cve": "CVE-2023-53217",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53217"
},
{
"cve": "CVE-2023-53218",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53218"
},
{
"cve": "CVE-2023-53219",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53219"
},
{
"cve": "CVE-2023-53220",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53220"
},
{
"cve": "CVE-2023-53221",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53221"
},
{
"cve": "CVE-2023-53222",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53222"
},
{
"cve": "CVE-2023-53223",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53223"
},
{
"cve": "CVE-2023-53224",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53224"
},
{
"cve": "CVE-2023-53225",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53225"
},
{
"cve": "CVE-2023-53226",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53226"
},
{
"cve": "CVE-2023-53227",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53227"
},
{
"cve": "CVE-2023-53228",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53228"
},
{
"cve": "CVE-2023-53229",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53229"
},
{
"cve": "CVE-2023-53230",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53230"
},
{
"cve": "CVE-2023-53231",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53231"
},
{
"cve": "CVE-2023-53232",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53232"
},
{
"cve": "CVE-2023-53233",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53233"
},
{
"cve": "CVE-2023-53234",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53234"
},
{
"cve": "CVE-2023-53235",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53235"
},
{
"cve": "CVE-2023-53236",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53236"
},
{
"cve": "CVE-2023-53237",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53237"
},
{
"cve": "CVE-2023-53238",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53238"
},
{
"cve": "CVE-2023-53239",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53239"
},
{
"cve": "CVE-2023-53240",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53240"
},
{
"cve": "CVE-2023-53241",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53241"
},
{
"cve": "CVE-2023-53242",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53242"
},
{
"cve": "CVE-2023-53243",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53243"
},
{
"cve": "CVE-2023-53244",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53244"
},
{
"cve": "CVE-2023-53245",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53245"
},
{
"cve": "CVE-2023-53246",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53246"
},
{
"cve": "CVE-2023-53247",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53247"
},
{
"cve": "CVE-2023-53248",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53248"
},
{
"cve": "CVE-2023-53249",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53249"
},
{
"cve": "CVE-2023-53250",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53250"
},
{
"cve": "CVE-2023-53251",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53251"
},
{
"cve": "CVE-2023-53252",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53252"
},
{
"cve": "CVE-2023-53253",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53253"
},
{
"cve": "CVE-2023-53254",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53254"
},
{
"cve": "CVE-2023-53255",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53255"
},
{
"cve": "CVE-2023-53256",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53256"
},
{
"cve": "CVE-2023-53257",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53257"
},
{
"cve": "CVE-2023-53258",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53258"
},
{
"cve": "CVE-2023-53259",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53259"
},
{
"cve": "CVE-2023-53260",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53260"
},
{
"cve": "CVE-2023-53261",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53261"
},
{
"cve": "CVE-2023-53262",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53262"
},
{
"cve": "CVE-2023-53263",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53263"
},
{
"cve": "CVE-2023-53264",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53264"
},
{
"cve": "CVE-2023-53265",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53265"
},
{
"cve": "CVE-2023-53266",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53266"
},
{
"cve": "CVE-2023-53267",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53267"
},
{
"cve": "CVE-2023-53268",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53268"
},
{
"cve": "CVE-2023-53269",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53269"
},
{
"cve": "CVE-2023-53270",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53270"
},
{
"cve": "CVE-2023-53271",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53271"
},
{
"cve": "CVE-2023-53272",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53272"
},
{
"cve": "CVE-2023-53273",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53273"
},
{
"cve": "CVE-2023-53274",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53274"
},
{
"cve": "CVE-2023-53275",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53275"
},
{
"cve": "CVE-2023-53276",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53276"
},
{
"cve": "CVE-2023-53277",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53277"
},
{
"cve": "CVE-2023-53278",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53278"
},
{
"cve": "CVE-2023-53279",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53279"
},
{
"cve": "CVE-2023-53280",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53280"
},
{
"cve": "CVE-2023-53281",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53281"
},
{
"cve": "CVE-2023-53282",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53282"
},
{
"cve": "CVE-2023-53283",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53283"
},
{
"cve": "CVE-2023-53284",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53284"
},
{
"cve": "CVE-2023-53285",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53285"
},
{
"cve": "CVE-2023-53286",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53286"
},
{
"cve": "CVE-2023-53287",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53287"
},
{
"cve": "CVE-2023-53288",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53288"
},
{
"cve": "CVE-2023-53289",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53289"
},
{
"cve": "CVE-2023-53290",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53290"
},
{
"cve": "CVE-2023-53291",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53291"
},
{
"cve": "CVE-2023-53292",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53292"
},
{
"cve": "CVE-2023-53293",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53293"
},
{
"cve": "CVE-2023-53294",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53294"
},
{
"cve": "CVE-2023-53295",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53295"
},
{
"cve": "CVE-2023-53296",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53296"
},
{
"cve": "CVE-2023-53297",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53297"
},
{
"cve": "CVE-2023-53298",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53298"
},
{
"cve": "CVE-2023-53299",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53299"
},
{
"cve": "CVE-2023-53300",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53300"
},
{
"cve": "CVE-2023-53301",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53301"
},
{
"cve": "CVE-2023-53302",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53302"
},
{
"cve": "CVE-2023-53303",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2023-53303"
},
{
"cve": "CVE-2025-39800",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-39800"
},
{
"cve": "CVE-2025-39801",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-39801"
},
{
"cve": "CVE-2025-39802",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-39802"
},
{
"cve": "CVE-2025-39803",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-39803"
},
{
"cve": "CVE-2025-39804",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T027843",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-39804"
}
]
}
fkie_cve-2023-53240
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/1596dae2f17ec5c6e8c8f0e3fec78c5ae55c1e0b | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/cecc68559cd57fffb2be50685f262b9af2318e16 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/ffe19750e68d0bb21e8110b398346eef20b156a7 | Patch |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38E7A7B3-C56B-4D09-A3BC-1A47B10759B8",
"versionEndExcluding": "5.16",
"versionStartIncluding": "5.15.33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4ED89FC-18EE-445F-8FE2-A2B6A5F9BB13",
"versionEndExcluding": "5.17",
"versionStartIncluding": "5.16.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD68A6E9-F664-4594-B8A0-ED32253D6067",
"versionEndExcluding": "6.1.16",
"versionStartIncluding": "5.17.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88C67289-22AD-4CA9-B202-5F5A80E5BA4B",
"versionEndExcluding": "6.2.3",
"versionStartIncluding": "6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: check IFF_UP earlier in Tx path\n\nXsk Tx can be triggered via either sendmsg() or poll() syscalls. These\ntwo paths share a call to common function xsk_xmit() which has two\nsanity checks within. A pseudo code example to show the two paths:\n\n__xsk_sendmsg() : xsk_poll():\nif (unlikely(!xsk_is_bound(xs))) if (unlikely(!xsk_is_bound(xs)))\n return -ENXIO; return mask;\nif (unlikely(need_wait)) (...)\n return -EOPNOTSUPP; xsk_xmit()\nmark napi id\n(...)\nxsk_xmit()\n\nxsk_xmit():\nif (unlikely(!(xs-\u003edev-\u003eflags \u0026 IFF_UP)))\n\treturn -ENETDOWN;\nif (unlikely(!xs-\u003etx))\n\treturn -ENOBUFS;\n\nAs it can be observed above, in sendmsg() napi id can be marked on\ninterface that was not brought up and this causes a NULL ptr\ndereference:\n\n[31757.505631] BUG: kernel NULL pointer dereference, address: 0000000000000018\n[31757.512710] #PF: supervisor read access in kernel mode\n[31757.517936] #PF: error_code(0x0000) - not-present page\n[31757.523149] PGD 0 P4D 0\n[31757.525726] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[31757.530154] CPU: 26 PID: 95641 Comm: xdpsock Not tainted 6.2.0-rc5+ #40\n[31757.536871] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019\n[31757.547457] RIP: 0010:xsk_sendmsg+0xde/0x180\n[31757.551799] Code: 00 75 a2 48 8b 00 a8 04 75 9b 84 d2 74 69 8b 85 14 01 00 00 85 c0 75 1b 48 8b 85 28 03 00 00 48 8b 80 98 00 00 00 48 8b 40 20 \u003c8b\u003e 40 18 89 85 14 01 00 00 8b bd 14 01 00 00 81 ff 00 01 00 00 0f\n[31757.570840] RSP: 0018:ffffc90034f27dc0 EFLAGS: 00010246\n[31757.576143] RAX: 0000000000000000 RBX: ffffc90034f27e18 RCX: 0000000000000000\n[31757.583389] RDX: 0000000000000001 RSI: ffffc90034f27e18 RDI: ffff88984cf3c100\n[31757.590631] RBP: ffff88984714a800 R08: ffff88984714a800 R09: 0000000000000000\n[31757.597877] R10: 0000000000000001 R11: 0000000000000000 R12: 00000000fffffffa\n[31757.605123] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000000\n[31757.612364] FS: 00007fb4c5931180(0000) GS:ffff88afdfa00000(0000) knlGS:0000000000000000\n[31757.620571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[31757.626406] CR2: 0000000000000018 CR3: 000000184b41c003 CR4: 00000000007706e0\n[31757.633648] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[31757.640894] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[31757.648139] PKRU: 55555554\n[31757.650894] Call Trace:\n[31757.653385] \u003cTASK\u003e\n[31757.655524] sock_sendmsg+0x8f/0xa0\n[31757.659077] ? sockfd_lookup_light+0x12/0x70\n[31757.663416] __sys_sendto+0xfc/0x170\n[31757.667051] ? do_sched_setscheduler+0xdb/0x1b0\n[31757.671658] __x64_sys_sendto+0x20/0x30\n[31757.675557] do_syscall_64+0x38/0x90\n[31757.679197] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n[31757.687969] Code: 8e f6 ff 44 8b 4c 24 2c 4c 8b 44 24 20 41 89 c4 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 3a 44 89 e7 48 89 44 24 08 e8 b5 8e f6 ff 48\n[31757.707007] RSP: 002b:00007ffd49c73c70 EFLAGS: 00000293 ORIG_RAX: 000000000000002c\n[31757.714694] RAX: ffffffffffffffda RBX: 000055a996565380 RCX: 00007fb4c5727c16\n[31757.721939] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n[31757.729184] RBP: 0000000000000040 R08: 0000000000000000 R09: 0000000000000000\n[31757.736429] R10: 0000000000000040 R11: 0000000000000293 R12: 0000000000000000\n[31757.743673] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[31757.754940] \u003c/TASK\u003e\n\nTo fix this, let\u0027s make xsk_xmit a function that will be responsible for\ngeneric Tx, where RCU is handled accordingly and pull out sanity checks\nand xs-\u003ezc handling. Populate sanity checks to __xsk_sendmsg() and\nxsk_poll()."
}
],
"id": "CVE-2023-53240",
"lastModified": "2025-12-03T20:41:59.990",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-09-15T15:15:51.120",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/1596dae2f17ec5c6e8c8f0e3fec78c5ae55c1e0b"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/cecc68559cd57fffb2be50685f262b9af2318e16"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ffe19750e68d0bb21e8110b398346eef20b156a7"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
msrc_cve-2023-53240
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-53240 xsk: check IFF_UP earlier in Tx path - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2023-53240.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "xsk: check IFF_UP earlier in Tx path",
"tracking": {
"current_release_date": "2025-12-05T01:02:17.000Z",
"generator": {
"date": "2025-12-05T08:19:55.275Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-53240",
"initial_release_date": "2025-09-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-12-05T01:02:17.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 kernel 5.15.186.1-1",
"product": {
"name": "cbl2 kernel 5.15.186.1-1",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kernel 5.15.186.1-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-53240",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-53240 xsk: check IFF_UP earlier in Tx path - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2023-53240.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2025-12-05T01:02:17.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-1"
]
}
],
"title": "xsk: check IFF_UP earlier in Tx path"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.