Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53712 (GCVE-0-2023-53712)
Vulnerability from cvelistv5 – Published: 2025-10-22 13:23 – Updated: 2026-01-05 10:32| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
b23065313297e750edd57ab6edfd36224826724e , < 46870eea5496ff277e86187a49ac5a667cfe60c4
(git)
Affected: b23065313297e750edd57ab6edfd36224826724e , < ee378f45a70d09b51373ba495d30d99ef12219c1 (git) Affected: b23065313297e750edd57ab6edfd36224826724e , < 5590ba4560eefbd19a4ed07c7e7c8e4c51ffc628 (git) Affected: b23065313297e750edd57ab6edfd36224826724e , < 8922ba71c969d2a0c01a94372a71477d879470de (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"arch/arm/kernel/machine_kexec.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "46870eea5496ff277e86187a49ac5a667cfe60c4",
"status": "affected",
"version": "b23065313297e750edd57ab6edfd36224826724e",
"versionType": "git"
},
{
"lessThan": "ee378f45a70d09b51373ba495d30d99ef12219c1",
"status": "affected",
"version": "b23065313297e750edd57ab6edfd36224826724e",
"versionType": "git"
},
{
"lessThan": "5590ba4560eefbd19a4ed07c7e7c8e4c51ffc628",
"status": "affected",
"version": "b23065313297e750edd57ab6edfd36224826724e",
"versionType": "git"
},
{
"lessThan": "8922ba71c969d2a0c01a94372a71477d879470de",
"status": "affected",
"version": "b23065313297e750edd57ab6edfd36224826724e",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"arch/arm/kernel/machine_kexec.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "2.6.38"
},
{
"lessThan": "2.6.38",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.133",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.55",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.5.*",
"status": "unaffected",
"version": "6.5.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.6",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.133",
"versionStartIncluding": "2.6.38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.55",
"versionStartIncluding": "2.6.38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.5",
"versionStartIncluding": "2.6.38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6",
"versionStartIncluding": "2.6.38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9317/1: kexec: Make smp stop calls asynchronous\n\nIf a panic is triggered by a hrtimer interrupt all online cpus will be\nnotified and set offline. But as highlighted by commit 19dbdcb8039c\n(\"smp: Warn on function calls from softirq context\") this call should\nnot be made synchronous with disabled interrupts:\n\n softdog: Initiating panic\n Kernel panic - not syncing: Software Watchdog Timer expired\n WARNING: CPU: 1 PID: 0 at kernel/smp.c:753 smp_call_function_many_cond\n unwind_backtrace:\n show_stack\n dump_stack_lvl\n __warn\n warn_slowpath_fmt\n smp_call_function_many_cond\n smp_call_function\n crash_smp_send_stop.part.0\n machine_crash_shutdown\n __crash_kexec\n panic\n softdog_fire\n __hrtimer_run_queues\n hrtimer_interrupt\n\nMake the smp call for machine_crash_nonpanic_core() asynchronous."
}
],
"providerMetadata": {
"dateUpdated": "2026-01-05T10:32:29.018Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/46870eea5496ff277e86187a49ac5a667cfe60c4"
},
{
"url": "https://git.kernel.org/stable/c/ee378f45a70d09b51373ba495d30d99ef12219c1"
},
{
"url": "https://git.kernel.org/stable/c/5590ba4560eefbd19a4ed07c7e7c8e4c51ffc628"
},
{
"url": "https://git.kernel.org/stable/c/8922ba71c969d2a0c01a94372a71477d879470de"
}
],
"title": "ARM: 9317/1: kexec: Make smp stop calls asynchronous",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-53712",
"datePublished": "2025-10-22T13:23:47.100Z",
"dateReserved": "2025-10-22T13:21:37.346Z",
"dateUpdated": "2026-01-05T10:32:29.018Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-53712\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-22T14:15:45.817\",\"lastModified\":\"2025-10-22T21:12:48.953\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nARM: 9317/1: kexec: Make smp stop calls asynchronous\\n\\nIf a panic is triggered by a hrtimer interrupt all online cpus will be\\nnotified and set offline. But as highlighted by commit 19dbdcb8039c\\n(\\\"smp: Warn on function calls from softirq context\\\") this call should\\nnot be made synchronous with disabled interrupts:\\n\\n softdog: Initiating panic\\n Kernel panic - not syncing: Software Watchdog Timer expired\\n WARNING: CPU: 1 PID: 0 at kernel/smp.c:753 smp_call_function_many_cond\\n unwind_backtrace:\\n show_stack\\n dump_stack_lvl\\n __warn\\n warn_slowpath_fmt\\n smp_call_function_many_cond\\n smp_call_function\\n crash_smp_send_stop.part.0\\n machine_crash_shutdown\\n __crash_kexec\\n panic\\n softdog_fire\\n __hrtimer_run_queues\\n hrtimer_interrupt\\n\\nMake the smp call for machine_crash_nonpanic_core() asynchronous.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/46870eea5496ff277e86187a49ac5a667cfe60c4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5590ba4560eefbd19a4ed07c7e7c8e4c51ffc628\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8922ba71c969d2a0c01a94372a71477d879470de\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ee378f45a70d09b51373ba495d30d99ef12219c1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
WID-SEC-W-2025-2394
Vulnerability from csaf_certbund - Published: 2025-10-22 22:00 - Updated: 2026-02-15 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff oder andere, nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2394 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2394.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2394 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2394"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50556",
"url": "https://lore.kernel.org/linux-cve-announce/2025102203-CVE-2022-50556-bbe2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50557",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50557-7adc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50558",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50558-444f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50559",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50559-e162@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50560",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50560-bf0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50561",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50561-3b76@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50562",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50562-5b54@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50563",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50563-995f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50564",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50564-c6eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50565",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50565-ddc2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50566",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50566-9cd3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50567",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50567-17f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50568",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50568-f109@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50569",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50569-fdd1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50570",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50570-38e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50571",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50571-00cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50572",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50572-dbfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50573",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50573-e131@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50574",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50574-da86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50575",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50575-1768@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50576",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50576-98f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50577",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50577-ebe1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50578",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50578-eb90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50579",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50579-0f47@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50580",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50580-68e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50581",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50581-cb39@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50582",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2022-50582-1ac9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53692",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2023-53692-be2d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53693",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2023-53693-57fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53694",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2023-53694-ed6b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53695",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2023-53695-f553@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53696",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2023-53696-dadf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53697",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53697-3078@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53698",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53698-c1f4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53699",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53699-44cc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53700",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53700-9753@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53701",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53701-fb7f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53702",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53702-a6b6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53703",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53703-7813@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53704",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53704-9f42@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53705",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53705-38d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53706",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53706-18d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53707",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53707-361a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53708",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53708-0bf0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53709",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53709-553a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53710",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53710-68d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53711",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53711-24c6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53712",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53712-b88e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53713",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53713-550a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53714",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53714-6b41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53715",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53715-fd47@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53716",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53716-4265@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53717",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53717-e88c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53718",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53718-9142@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53719",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53719-ad4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53720",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53720-da5a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53721",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53721-f0ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53722",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53722-f3ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53723",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53723-8e9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53724",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53724-4549@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53725",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53725-0343@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53726",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53726-29cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53727",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53727-73d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53728",
"url": "https://lore.kernel.org/linux-cve-announce/2025102216-CVE-2023-53728-b851@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53729",
"url": "https://lore.kernel.org/linux-cve-announce/2025102216-CVE-2023-53729-ef1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53730",
"url": "https://lore.kernel.org/linux-cve-announce/2025102216-CVE-2023-53730-d257@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53731",
"url": "https://lore.kernel.org/linux-cve-announce/2025102216-CVE-2023-53731-aef7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53732",
"url": "https://lore.kernel.org/linux-cve-announce/2025102216-CVE-2023-53732-f3ee@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4111-1 vom 2025-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4135-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4139-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4149-1 vom 2025-11-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4188-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVPUJWNDCBFGM2O2EFX4S5QBPKDARVQ7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21052-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023389.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21056-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21064-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21040-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4301-1 vom 2025-11-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLIMXFMWOGTFRJZEC4XPGIMNBCRKQ7IF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4315-1 vom 2025-12-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4320-1 vom 2025-12-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4515-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4530-1 vom 2025-12-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZJXHV4TJM3LRAHWS7AE4LY344HKKW3D/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4530-1 vom 2025-12-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0032-1 vom 2026-01-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0532 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0532"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0533 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0533"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0537 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0537"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0576 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0576"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0754 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0754"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0755 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0755"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0155-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0154-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0200-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1441 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1441"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1443 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1443"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1442 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1442"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1512 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1512"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-030 vom 2026-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0471-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20317-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20333-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-15T23:00:00.000+00:00",
"generator": {
"date": "2026-02-16T11:40:39.191+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2394",
"initial_release_date": "2025-10-22T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-20T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-29T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "24"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vProxy \u003c19.14",
"product": {
"name": "Dell NetWorker vProxy \u003c19.14",
"product_id": "T050451"
}
},
{
"category": "product_version",
"name": "vProxy 19.14",
"product": {
"name": "Dell NetWorker vProxy 19.14",
"product_id": "T050451-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.14"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T048085",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50556",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50556"
},
{
"cve": "CVE-2022-50557",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50557"
},
{
"cve": "CVE-2022-50558",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50558"
},
{
"cve": "CVE-2022-50559",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50559"
},
{
"cve": "CVE-2022-50560",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50560"
},
{
"cve": "CVE-2022-50561",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50561"
},
{
"cve": "CVE-2022-50562",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50562"
},
{
"cve": "CVE-2022-50563",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50563"
},
{
"cve": "CVE-2022-50564",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50564"
},
{
"cve": "CVE-2022-50565",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50565"
},
{
"cve": "CVE-2022-50566",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50566"
},
{
"cve": "CVE-2022-50567",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50567"
},
{
"cve": "CVE-2022-50568",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50568"
},
{
"cve": "CVE-2022-50569",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50569"
},
{
"cve": "CVE-2022-50570",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50570"
},
{
"cve": "CVE-2022-50571",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50571"
},
{
"cve": "CVE-2022-50572",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50572"
},
{
"cve": "CVE-2022-50573",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50573"
},
{
"cve": "CVE-2022-50574",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50574"
},
{
"cve": "CVE-2022-50575",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50575"
},
{
"cve": "CVE-2022-50576",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50576"
},
{
"cve": "CVE-2022-50577",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50577"
},
{
"cve": "CVE-2022-50578",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50578"
},
{
"cve": "CVE-2022-50579",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50579"
},
{
"cve": "CVE-2022-50580",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50580"
},
{
"cve": "CVE-2022-50581",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50581"
},
{
"cve": "CVE-2022-50582",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50582"
},
{
"cve": "CVE-2023-53692",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53692"
},
{
"cve": "CVE-2023-53693",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53693"
},
{
"cve": "CVE-2023-53694",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53694"
},
{
"cve": "CVE-2023-53695",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53695"
},
{
"cve": "CVE-2023-53696",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53696"
},
{
"cve": "CVE-2023-53697",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53697"
},
{
"cve": "CVE-2023-53698",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53698"
},
{
"cve": "CVE-2023-53699",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53699"
},
{
"cve": "CVE-2023-53700",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53700"
},
{
"cve": "CVE-2023-53701",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53701"
},
{
"cve": "CVE-2023-53702",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53702"
},
{
"cve": "CVE-2023-53703",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53703"
},
{
"cve": "CVE-2023-53704",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53704"
},
{
"cve": "CVE-2023-53705",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53705"
},
{
"cve": "CVE-2023-53706",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53706"
},
{
"cve": "CVE-2023-53707",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53707"
},
{
"cve": "CVE-2023-53708",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53708"
},
{
"cve": "CVE-2023-53709",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53709"
},
{
"cve": "CVE-2023-53710",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53710"
},
{
"cve": "CVE-2023-53711",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53711"
},
{
"cve": "CVE-2023-53712",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53712"
},
{
"cve": "CVE-2023-53713",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53713"
},
{
"cve": "CVE-2023-53714",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53714"
},
{
"cve": "CVE-2023-53715",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53715"
},
{
"cve": "CVE-2023-53716",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53716"
},
{
"cve": "CVE-2023-53717",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53717"
},
{
"cve": "CVE-2023-53718",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53718"
},
{
"cve": "CVE-2023-53719",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53719"
},
{
"cve": "CVE-2023-53720",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53720"
},
{
"cve": "CVE-2023-53721",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53721"
},
{
"cve": "CVE-2023-53722",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53722"
},
{
"cve": "CVE-2023-53723",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53723"
},
{
"cve": "CVE-2023-53724",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53724"
},
{
"cve": "CVE-2023-53725",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53725"
},
{
"cve": "CVE-2023-53726",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53726"
},
{
"cve": "CVE-2023-53727",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53727"
},
{
"cve": "CVE-2023-53728",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53728"
},
{
"cve": "CVE-2023-53729",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53729"
},
{
"cve": "CVE-2023-53730",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53730"
},
{
"cve": "CVE-2023-53731",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53731"
},
{
"cve": "CVE-2023-53732",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53732"
}
]
}
BDU:2026-01342
Vulnerability from fstec - Published: 14.08.2023{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7 (Red Hat Enterprise Linux), 8 (Red Hat Enterprise Linux), 12 (Debian GNU/Linux), 9 (Red Hat Enterprise Linux), \u043e\u0442 5.16 \u0434\u043e 6.1.54 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 6.2 \u0434\u043e 6.5.4 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 2.6.38 \u0434\u043e 5.15.132 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53712-b88e@gregkh/\nhttps://git.kernel.org/stable/c/46870eea5496ff277e86187a49ac5a667cfe60c4\nhttps://git.kernel.org/stable/c/ee378f45a70d09b51373ba495d30d99ef12219c1\nhttps://git.kernel.org/stable/c/5590ba4560eefbd19a4ed07c7e7c8e4c51ffc628\nhttps://git.kernel.org/linus/8922ba71c969d2a0c01a94372a71477d879470de\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.133\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.55\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.5\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2023-53712\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2023-53712",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "14.08.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "06.02.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "06.02.2026",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2026-01342",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-53712",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 7 , Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , Red Hat Inc. Red Hat Enterprise Linux 9 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.16 \u0434\u043e 6.1.54 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.2 \u0434\u043e 6.5.4 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 2.6.38 \u0434\u043e 5.15.132 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 machine_crash_nonpanic_core() \u043c\u043e\u0434\u0443\u043b\u044f arch/arm/kernel/machine_kexec.c \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b ARM \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 machine_crash_nonpanic_core() \u043c\u043e\u0434\u0443\u043b\u044f arch/arm/kernel/machine_kexec.c \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b ARM \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u043c \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435\u043c \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.cve.org/CVERecord?id=CVE-2023-53712\nhttps://git.kernel.org/stable/c/46870eea5496ff277e86187a49ac5a667cfe60c4\nhttps://git.kernel.org/stable/c/ee378f45a70d09b51373ba495d30d99ef12219c1\nhttps://git.kernel.org/stable/c/5590ba4560eefbd19a4ed07c7e7c8e4c51ffc628\nhttps://git.kernel.org/linus/8922ba71c969d2a0c01a94372a71477d879470de\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.133\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.55\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.5\nhttps://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53712-b88e@gregkh/\nhttps://security-tracker.debian.org/tracker/CVE-2023-53712\nhttps://access.redhat.com/security/cve/cve-2023-53712",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
GHSA-M7QP-WFXW-CJVM
Vulnerability from github – Published: 2025-10-22 15:31 – Updated: 2025-10-22 15:31In the Linux kernel, the following vulnerability has been resolved:
ARM: 9317/1: kexec: Make smp stop calls asynchronous
If a panic is triggered by a hrtimer interrupt all online cpus will be notified and set offline. But as highlighted by commit 19dbdcb8039c ("smp: Warn on function calls from softirq context") this call should not be made synchronous with disabled interrupts:
softdog: Initiating panic Kernel panic - not syncing: Software Watchdog Timer expired WARNING: CPU: 1 PID: 0 at kernel/smp.c:753 smp_call_function_many_cond unwind_backtrace: show_stack dump_stack_lvl __warn warn_slowpath_fmt smp_call_function_many_cond smp_call_function crash_smp_send_stop.part.0 machine_crash_shutdown __crash_kexec panic softdog_fire __hrtimer_run_queues hrtimer_interrupt
Make the smp call for machine_crash_nonpanic_core() asynchronous.
{
"affected": [],
"aliases": [
"CVE-2023-53712"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-22T14:15:45Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9317/1: kexec: Make smp stop calls asynchronous\n\nIf a panic is triggered by a hrtimer interrupt all online cpus will be\nnotified and set offline. But as highlighted by commit 19dbdcb8039c\n(\"smp: Warn on function calls from softirq context\") this call should\nnot be made synchronous with disabled interrupts:\n\n softdog: Initiating panic\n Kernel panic - not syncing: Software Watchdog Timer expired\n WARNING: CPU: 1 PID: 0 at kernel/smp.c:753 smp_call_function_many_cond\n unwind_backtrace:\n show_stack\n dump_stack_lvl\n __warn\n warn_slowpath_fmt\n smp_call_function_many_cond\n smp_call_function\n crash_smp_send_stop.part.0\n machine_crash_shutdown\n __crash_kexec\n panic\n softdog_fire\n __hrtimer_run_queues\n hrtimer_interrupt\n\nMake the smp call for machine_crash_nonpanic_core() asynchronous.",
"id": "GHSA-m7qp-wfxw-cjvm",
"modified": "2025-10-22T15:31:11Z",
"published": "2025-10-22T15:31:11Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53712"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/46870eea5496ff277e86187a49ac5a667cfe60c4"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/5590ba4560eefbd19a4ed07c7e7c8e4c51ffc628"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/8922ba71c969d2a0c01a94372a71477d879470de"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ee378f45a70d09b51373ba495d30d99ef12219c1"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2023-53712
Vulnerability from fkie_nvd - Published: 2025-10-22 14:15 - Updated: 2025-10-22 21:12| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/46870eea5496ff277e86187a49ac5a667cfe60c4 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/5590ba4560eefbd19a4ed07c7e7c8e4c51ffc628 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/8922ba71c969d2a0c01a94372a71477d879470de | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/ee378f45a70d09b51373ba495d30d99ef12219c1 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9317/1: kexec: Make smp stop calls asynchronous\n\nIf a panic is triggered by a hrtimer interrupt all online cpus will be\nnotified and set offline. But as highlighted by commit 19dbdcb8039c\n(\"smp: Warn on function calls from softirq context\") this call should\nnot be made synchronous with disabled interrupts:\n\n softdog: Initiating panic\n Kernel panic - not syncing: Software Watchdog Timer expired\n WARNING: CPU: 1 PID: 0 at kernel/smp.c:753 smp_call_function_many_cond\n unwind_backtrace:\n show_stack\n dump_stack_lvl\n __warn\n warn_slowpath_fmt\n smp_call_function_many_cond\n smp_call_function\n crash_smp_send_stop.part.0\n machine_crash_shutdown\n __crash_kexec\n panic\n softdog_fire\n __hrtimer_run_queues\n hrtimer_interrupt\n\nMake the smp call for machine_crash_nonpanic_core() asynchronous."
}
],
"id": "CVE-2023-53712",
"lastModified": "2025-10-22T21:12:48.953",
"metrics": {},
"published": "2025-10-22T14:15:45.817",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/46870eea5496ff277e86187a49ac5a667cfe60c4"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/5590ba4560eefbd19a4ed07c7e7c8e4c51ffc628"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/8922ba71c969d2a0c01a94372a71477d879470de"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/ee378f45a70d09b51373ba495d30d99ef12219c1"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.