Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-54288 (GCVE-0-2023-54288)
Vulnerability from cvelistv5 – Published: 2025-12-30 12:23 – Updated: 2025-12-30 12:23| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
7b8fe53d2a1da48db02ae961b29b8ee2f5515861 , < c79d794a2cd76eca47b2491c5030be9a6418c5d6
(git)
Affected: 4444bc2116aecdcde87dce80373540adc8bd478b , < 6df3eafa31b3ee4f0cba601ca857019964355034 (git) Affected: 4444bc2116aecdcde87dce80373540adc8bd478b , < ef6e1997da63ad0ac3fe33153fec9524c9ae56c9 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/mac80211/tx.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "c79d794a2cd76eca47b2491c5030be9a6418c5d6",
"status": "affected",
"version": "7b8fe53d2a1da48db02ae961b29b8ee2f5515861",
"versionType": "git"
},
{
"lessThan": "6df3eafa31b3ee4f0cba601ca857019964355034",
"status": "affected",
"version": "4444bc2116aecdcde87dce80373540adc8bd478b",
"versionType": "git"
},
{
"lessThan": "ef6e1997da63ad0ac3fe33153fec9524c9ae56c9",
"status": "affected",
"version": "4444bc2116aecdcde87dce80373540adc8bd478b",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"net/mac80211/tx.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.2"
},
{
"lessThan": "6.2",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.30",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.3.*",
"status": "unaffected",
"version": "6.3.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.4",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.30",
"versionStartIncluding": "6.1.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.4",
"versionStartIncluding": "6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4",
"versionStartIncluding": "6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fortify the spinlock against deadlock by interrupt\n\nIn the function ieee80211_tx_dequeue() there is a particular locking\nsequence:\n\nbegin:\n\tspin_lock(\u0026local-\u003equeue_stop_reason_lock);\n\tq_stopped = local-\u003equeue_stop_reasons[q];\n\tspin_unlock(\u0026local-\u003equeue_stop_reason_lock);\n\nHowever small the chance (increased by ftracetest), an asynchronous\ninterrupt can occur in between of spin_lock() and spin_unlock(),\nand the interrupt routine will attempt to lock the same\n\u0026local-\u003equeue_stop_reason_lock again.\n\nThis will cause a costly reset of the CPU and the wifi device or an\naltogether hang in the single CPU and single core scenario.\n\nThe only remaining spin_lock(\u0026local-\u003equeue_stop_reason_lock) that\ndid not disable interrupts was patched, which should prevent any\ndeadlocks on the same CPU/core and the same wifi device.\n\nThis is the probable trace of the deadlock:\n\nkernel: ================================\nkernel: WARNING: inconsistent lock state\nkernel: 6.3.0-rc6-mt-20230401-00001-gf86822a1170f #4 Tainted: G W\nkernel: --------------------------------\nkernel: inconsistent {IN-SOFTIRQ-W} -\u003e {SOFTIRQ-ON-W} usage.\nkernel: kworker/5:0/25656 [HC0[0]:SC0[0]:HE1:SE1] takes:\nkernel: ffff9d6190779478 (\u0026local-\u003equeue_stop_reason_lock){+.?.}-{2:2}, at: return_to_handler+0x0/0x40\nkernel: {IN-SOFTIRQ-W} state was registered at:\nkernel: lock_acquire+0xc7/0x2d0\nkernel: _raw_spin_lock+0x36/0x50\nkernel: ieee80211_tx_dequeue+0xb4/0x1330 [mac80211]\nkernel: iwl_mvm_mac_itxq_xmit+0xae/0x210 [iwlmvm]\nkernel: iwl_mvm_mac_wake_tx_queue+0x2d/0xd0 [iwlmvm]\nkernel: ieee80211_queue_skb+0x450/0x730 [mac80211]\nkernel: __ieee80211_xmit_fast.constprop.66+0x834/0xa50 [mac80211]\nkernel: __ieee80211_subif_start_xmit+0x217/0x530 [mac80211]\nkernel: ieee80211_subif_start_xmit+0x60/0x580 [mac80211]\nkernel: dev_hard_start_xmit+0xb5/0x260\nkernel: __dev_queue_xmit+0xdbe/0x1200\nkernel: neigh_resolve_output+0x166/0x260\nkernel: ip_finish_output2+0x216/0xb80\nkernel: __ip_finish_output+0x2a4/0x4d0\nkernel: ip_finish_output+0x2d/0xd0\nkernel: ip_output+0x82/0x2b0\nkernel: ip_local_out+0xec/0x110\nkernel: igmpv3_sendpack+0x5c/0x90\nkernel: igmp_ifc_timer_expire+0x26e/0x4e0\nkernel: call_timer_fn+0xa5/0x230\nkernel: run_timer_softirq+0x27f/0x550\nkernel: __do_softirq+0xb4/0x3a4\nkernel: irq_exit_rcu+0x9b/0xc0\nkernel: sysvec_apic_timer_interrupt+0x80/0xa0\nkernel: asm_sysvec_apic_timer_interrupt+0x1f/0x30\nkernel: _raw_spin_unlock_irqrestore+0x3f/0x70\nkernel: free_to_partial_list+0x3d6/0x590\nkernel: __slab_free+0x1b7/0x310\nkernel: kmem_cache_free+0x52d/0x550\nkernel: putname+0x5d/0x70\nkernel: do_sys_openat2+0x1d7/0x310\nkernel: do_sys_open+0x51/0x80\nkernel: __x64_sys_openat+0x24/0x30\nkernel: do_syscall_64+0x5c/0x90\nkernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc\nkernel: irq event stamp: 5120729\nkernel: hardirqs last enabled at (5120729): [\u003cffffffff9d149936\u003e] trace_graph_return+0xd6/0x120\nkernel: hardirqs last disabled at (5120728): [\u003cffffffff9d149950\u003e] trace_graph_return+0xf0/0x120\nkernel: softirqs last enabled at (5069900): [\u003cffffffff9cf65b60\u003e] return_to_handler+0x0/0x40\nkernel: softirqs last disabled at (5067555): [\u003cffffffff9cf65b60\u003e] return_to_handler+0x0/0x40\nkernel:\n other info that might help us debug this:\nkernel: Possible unsafe locking scenario:\nkernel: CPU0\nkernel: ----\nkernel: lock(\u0026local-\u003equeue_stop_reason_lock);\nkernel: \u003cInterrupt\u003e\nkernel: lock(\u0026local-\u003equeue_stop_reason_lock);\nkernel:\n *** DEADLOCK ***\nkernel: 8 locks held by kworker/5:0/25656:\nkernel: #0: ffff9d618009d138 ((wq_completion)events_freezable){+.+.}-{0:0}, at: process_one_work+0x1ca/0x530\nkernel: #1: ffffb1ef4637fe68 ((work_completion)(\u0026local-\u003erestart_work)){+.+.}-{0:0}, at: process_one_work+0x1ce/0x530\nkernel: #2: ffffffff9f166548 (rtnl_mutex){+.+.}-{3:3}, at: return_to_handler+0x0/0x40\nkernel: #3: ffff9d619\n---truncated---"
}
],
"providerMetadata": {
"dateUpdated": "2025-12-30T12:23:27.765Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/c79d794a2cd76eca47b2491c5030be9a6418c5d6"
},
{
"url": "https://git.kernel.org/stable/c/6df3eafa31b3ee4f0cba601ca857019964355034"
},
{
"url": "https://git.kernel.org/stable/c/ef6e1997da63ad0ac3fe33153fec9524c9ae56c9"
}
],
"title": "wifi: mac80211: fortify the spinlock against deadlock by interrupt",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-54288",
"datePublished": "2025-12-30T12:23:27.765Z",
"dateReserved": "2025-12-30T12:06:44.526Z",
"dateUpdated": "2025-12-30T12:23:27.765Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-54288\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-30T13:16:17.833\",\"lastModified\":\"2025-12-31T20:42:43.210\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nwifi: mac80211: fortify the spinlock against deadlock by interrupt\\n\\nIn the function ieee80211_tx_dequeue() there is a particular locking\\nsequence:\\n\\nbegin:\\n\\tspin_lock(\u0026local-\u003equeue_stop_reason_lock);\\n\\tq_stopped = local-\u003equeue_stop_reasons[q];\\n\\tspin_unlock(\u0026local-\u003equeue_stop_reason_lock);\\n\\nHowever small the chance (increased by ftracetest), an asynchronous\\ninterrupt can occur in between of spin_lock() and spin_unlock(),\\nand the interrupt routine will attempt to lock the same\\n\u0026local-\u003equeue_stop_reason_lock again.\\n\\nThis will cause a costly reset of the CPU and the wifi device or an\\naltogether hang in the single CPU and single core scenario.\\n\\nThe only remaining spin_lock(\u0026local-\u003equeue_stop_reason_lock) that\\ndid not disable interrupts was patched, which should prevent any\\ndeadlocks on the same CPU/core and the same wifi device.\\n\\nThis is the probable trace of the deadlock:\\n\\nkernel: ================================\\nkernel: WARNING: inconsistent lock state\\nkernel: 6.3.0-rc6-mt-20230401-00001-gf86822a1170f #4 Tainted: G W\\nkernel: --------------------------------\\nkernel: inconsistent {IN-SOFTIRQ-W} -\u003e {SOFTIRQ-ON-W} usage.\\nkernel: kworker/5:0/25656 [HC0[0]:SC0[0]:HE1:SE1] takes:\\nkernel: ffff9d6190779478 (\u0026local-\u003equeue_stop_reason_lock){+.?.}-{2:2}, at: return_to_handler+0x0/0x40\\nkernel: {IN-SOFTIRQ-W} state was registered at:\\nkernel: lock_acquire+0xc7/0x2d0\\nkernel: _raw_spin_lock+0x36/0x50\\nkernel: ieee80211_tx_dequeue+0xb4/0x1330 [mac80211]\\nkernel: iwl_mvm_mac_itxq_xmit+0xae/0x210 [iwlmvm]\\nkernel: iwl_mvm_mac_wake_tx_queue+0x2d/0xd0 [iwlmvm]\\nkernel: ieee80211_queue_skb+0x450/0x730 [mac80211]\\nkernel: __ieee80211_xmit_fast.constprop.66+0x834/0xa50 [mac80211]\\nkernel: __ieee80211_subif_start_xmit+0x217/0x530 [mac80211]\\nkernel: ieee80211_subif_start_xmit+0x60/0x580 [mac80211]\\nkernel: dev_hard_start_xmit+0xb5/0x260\\nkernel: __dev_queue_xmit+0xdbe/0x1200\\nkernel: neigh_resolve_output+0x166/0x260\\nkernel: ip_finish_output2+0x216/0xb80\\nkernel: __ip_finish_output+0x2a4/0x4d0\\nkernel: ip_finish_output+0x2d/0xd0\\nkernel: ip_output+0x82/0x2b0\\nkernel: ip_local_out+0xec/0x110\\nkernel: igmpv3_sendpack+0x5c/0x90\\nkernel: igmp_ifc_timer_expire+0x26e/0x4e0\\nkernel: call_timer_fn+0xa5/0x230\\nkernel: run_timer_softirq+0x27f/0x550\\nkernel: __do_softirq+0xb4/0x3a4\\nkernel: irq_exit_rcu+0x9b/0xc0\\nkernel: sysvec_apic_timer_interrupt+0x80/0xa0\\nkernel: asm_sysvec_apic_timer_interrupt+0x1f/0x30\\nkernel: _raw_spin_unlock_irqrestore+0x3f/0x70\\nkernel: free_to_partial_list+0x3d6/0x590\\nkernel: __slab_free+0x1b7/0x310\\nkernel: kmem_cache_free+0x52d/0x550\\nkernel: putname+0x5d/0x70\\nkernel: do_sys_openat2+0x1d7/0x310\\nkernel: do_sys_open+0x51/0x80\\nkernel: __x64_sys_openat+0x24/0x30\\nkernel: do_syscall_64+0x5c/0x90\\nkernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc\\nkernel: irq event stamp: 5120729\\nkernel: hardirqs last enabled at (5120729): [\u003cffffffff9d149936\u003e] trace_graph_return+0xd6/0x120\\nkernel: hardirqs last disabled at (5120728): [\u003cffffffff9d149950\u003e] trace_graph_return+0xf0/0x120\\nkernel: softirqs last enabled at (5069900): [\u003cffffffff9cf65b60\u003e] return_to_handler+0x0/0x40\\nkernel: softirqs last disabled at (5067555): [\u003cffffffff9cf65b60\u003e] return_to_handler+0x0/0x40\\nkernel:\\n other info that might help us debug this:\\nkernel: Possible unsafe locking scenario:\\nkernel: CPU0\\nkernel: ----\\nkernel: lock(\u0026local-\u003equeue_stop_reason_lock);\\nkernel: \u003cInterrupt\u003e\\nkernel: lock(\u0026local-\u003equeue_stop_reason_lock);\\nkernel:\\n *** DEADLOCK ***\\nkernel: 8 locks held by kworker/5:0/25656:\\nkernel: #0: ffff9d618009d138 ((wq_completion)events_freezable){+.+.}-{0:0}, at: process_one_work+0x1ca/0x530\\nkernel: #1: ffffb1ef4637fe68 ((work_completion)(\u0026local-\u003erestart_work)){+.+.}-{0:0}, at: process_one_work+0x1ce/0x530\\nkernel: #2: ffffffff9f166548 (rtnl_mutex){+.+.}-{3:3}, at: return_to_handler+0x0/0x40\\nkernel: #3: ffff9d619\\n---truncated---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/6df3eafa31b3ee4f0cba601ca857019964355034\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c79d794a2cd76eca47b2491c5030be9a6418c5d6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ef6e1997da63ad0ac3fe33153fec9524c9ae56c9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
BDU:2026-01191
Vulnerability from fstec - Published: 16.05.2023{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8 (Red Hat Enterprise Linux), 12 (Debian GNU/Linux), 9 (Red Hat Enterprise Linux), \u043e\u0442 6.2 \u0434\u043e 6.3.3 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 6.1.9 \u0434\u043e 6.1.29 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2025123028-CVE-2023-54288-c7cf@gregkh/\nhttps://git.kernel.org/stable/c/c79d794a2cd76eca47b2491c5030be9a6418c5d6\nhttps://git.kernel.org/stable/c/6df3eafa31b3ee4f0cba601ca857019964355034\nhttps://git.kernel.org/linus/ef6e1997da63ad0ac3fe33153fec9524c9ae56c9\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.30\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2023-54288\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2023-54288",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "16.05.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "04.02.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "04.02.2026",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2026-01191",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-54288",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , Red Hat Inc. Red Hat Enterprise Linux 9 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.2 \u0434\u043e 6.3.3 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.1.9 \u0434\u043e 6.1.29 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ieee80211_tx_dequeue() \u043c\u043e\u0434\u0443\u043b\u044f net/mac80211/tx.c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u0442\u0435\u043a\u0430 mac80211 \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0417\u0430\u0432\u0438\u0441\u0430\u043d\u0438\u0435 (CWE-833)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ieee80211_tx_dequeue() \u043c\u043e\u0434\u0443\u043b\u044f net/mac80211/tx.c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u0442\u0435\u043a\u0430 mac80211 \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u043e\u0437\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435\u043c \u0432\u0437\u0430\u0438\u043c\u043d\u043e\u0439 \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.cve.org/CVERecord?id=CVE-2023-54288\nhttps://git.kernel.org/stable/c/c79d794a2cd76eca47b2491c5030be9a6418c5d6\nhttps://git.kernel.org/stable/c/6df3eafa31b3ee4f0cba601ca857019964355034\nhttps://git.kernel.org/linus/ef6e1997da63ad0ac3fe33153fec9524c9ae56c9\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.30\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4\nhttps://lore.kernel.org/linux-cve-announce/2025123028-CVE-2023-54288-c7cf@gregkh/\nhttps://security-tracker.debian.org/tracker/CVE-2023-54288\nhttps://access.redhat.com/security/cve/cve-2023-54288",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-833",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
FKIE_CVE-2023-54288
Vulnerability from fkie_nvd - Published: 2025-12-30 13:16 - Updated: 2025-12-31 20:42| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fortify the spinlock against deadlock by interrupt\n\nIn the function ieee80211_tx_dequeue() there is a particular locking\nsequence:\n\nbegin:\n\tspin_lock(\u0026local-\u003equeue_stop_reason_lock);\n\tq_stopped = local-\u003equeue_stop_reasons[q];\n\tspin_unlock(\u0026local-\u003equeue_stop_reason_lock);\n\nHowever small the chance (increased by ftracetest), an asynchronous\ninterrupt can occur in between of spin_lock() and spin_unlock(),\nand the interrupt routine will attempt to lock the same\n\u0026local-\u003equeue_stop_reason_lock again.\n\nThis will cause a costly reset of the CPU and the wifi device or an\naltogether hang in the single CPU and single core scenario.\n\nThe only remaining spin_lock(\u0026local-\u003equeue_stop_reason_lock) that\ndid not disable interrupts was patched, which should prevent any\ndeadlocks on the same CPU/core and the same wifi device.\n\nThis is the probable trace of the deadlock:\n\nkernel: ================================\nkernel: WARNING: inconsistent lock state\nkernel: 6.3.0-rc6-mt-20230401-00001-gf86822a1170f #4 Tainted: G W\nkernel: --------------------------------\nkernel: inconsistent {IN-SOFTIRQ-W} -\u003e {SOFTIRQ-ON-W} usage.\nkernel: kworker/5:0/25656 [HC0[0]:SC0[0]:HE1:SE1] takes:\nkernel: ffff9d6190779478 (\u0026local-\u003equeue_stop_reason_lock){+.?.}-{2:2}, at: return_to_handler+0x0/0x40\nkernel: {IN-SOFTIRQ-W} state was registered at:\nkernel: lock_acquire+0xc7/0x2d0\nkernel: _raw_spin_lock+0x36/0x50\nkernel: ieee80211_tx_dequeue+0xb4/0x1330 [mac80211]\nkernel: iwl_mvm_mac_itxq_xmit+0xae/0x210 [iwlmvm]\nkernel: iwl_mvm_mac_wake_tx_queue+0x2d/0xd0 [iwlmvm]\nkernel: ieee80211_queue_skb+0x450/0x730 [mac80211]\nkernel: __ieee80211_xmit_fast.constprop.66+0x834/0xa50 [mac80211]\nkernel: __ieee80211_subif_start_xmit+0x217/0x530 [mac80211]\nkernel: ieee80211_subif_start_xmit+0x60/0x580 [mac80211]\nkernel: dev_hard_start_xmit+0xb5/0x260\nkernel: __dev_queue_xmit+0xdbe/0x1200\nkernel: neigh_resolve_output+0x166/0x260\nkernel: ip_finish_output2+0x216/0xb80\nkernel: __ip_finish_output+0x2a4/0x4d0\nkernel: ip_finish_output+0x2d/0xd0\nkernel: ip_output+0x82/0x2b0\nkernel: ip_local_out+0xec/0x110\nkernel: igmpv3_sendpack+0x5c/0x90\nkernel: igmp_ifc_timer_expire+0x26e/0x4e0\nkernel: call_timer_fn+0xa5/0x230\nkernel: run_timer_softirq+0x27f/0x550\nkernel: __do_softirq+0xb4/0x3a4\nkernel: irq_exit_rcu+0x9b/0xc0\nkernel: sysvec_apic_timer_interrupt+0x80/0xa0\nkernel: asm_sysvec_apic_timer_interrupt+0x1f/0x30\nkernel: _raw_spin_unlock_irqrestore+0x3f/0x70\nkernel: free_to_partial_list+0x3d6/0x590\nkernel: __slab_free+0x1b7/0x310\nkernel: kmem_cache_free+0x52d/0x550\nkernel: putname+0x5d/0x70\nkernel: do_sys_openat2+0x1d7/0x310\nkernel: do_sys_open+0x51/0x80\nkernel: __x64_sys_openat+0x24/0x30\nkernel: do_syscall_64+0x5c/0x90\nkernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc\nkernel: irq event stamp: 5120729\nkernel: hardirqs last enabled at (5120729): [\u003cffffffff9d149936\u003e] trace_graph_return+0xd6/0x120\nkernel: hardirqs last disabled at (5120728): [\u003cffffffff9d149950\u003e] trace_graph_return+0xf0/0x120\nkernel: softirqs last enabled at (5069900): [\u003cffffffff9cf65b60\u003e] return_to_handler+0x0/0x40\nkernel: softirqs last disabled at (5067555): [\u003cffffffff9cf65b60\u003e] return_to_handler+0x0/0x40\nkernel:\n other info that might help us debug this:\nkernel: Possible unsafe locking scenario:\nkernel: CPU0\nkernel: ----\nkernel: lock(\u0026local-\u003equeue_stop_reason_lock);\nkernel: \u003cInterrupt\u003e\nkernel: lock(\u0026local-\u003equeue_stop_reason_lock);\nkernel:\n *** DEADLOCK ***\nkernel: 8 locks held by kworker/5:0/25656:\nkernel: #0: ffff9d618009d138 ((wq_completion)events_freezable){+.+.}-{0:0}, at: process_one_work+0x1ca/0x530\nkernel: #1: ffffb1ef4637fe68 ((work_completion)(\u0026local-\u003erestart_work)){+.+.}-{0:0}, at: process_one_work+0x1ce/0x530\nkernel: #2: ffffffff9f166548 (rtnl_mutex){+.+.}-{3:3}, at: return_to_handler+0x0/0x40\nkernel: #3: ffff9d619\n---truncated---"
}
],
"id": "CVE-2023-54288",
"lastModified": "2025-12-31T20:42:43.210",
"metrics": {},
"published": "2025-12-30T13:16:17.833",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/6df3eafa31b3ee4f0cba601ca857019964355034"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/c79d794a2cd76eca47b2491c5030be9a6418c5d6"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/ef6e1997da63ad0ac3fe33153fec9524c9ae56c9"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
GHSA-3V5G-MC4J-7VR8
Vulnerability from github – Published: 2025-12-30 15:30 – Updated: 2025-12-30 15:30In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: fortify the spinlock against deadlock by interrupt
In the function ieee80211_tx_dequeue() there is a particular locking sequence:
begin: spin_lock(&local->queue_stop_reason_lock); q_stopped = local->queue_stop_reasons[q]; spin_unlock(&local->queue_stop_reason_lock);
However small the chance (increased by ftracetest), an asynchronous interrupt can occur in between of spin_lock() and spin_unlock(), and the interrupt routine will attempt to lock the same &local->queue_stop_reason_lock again.
This will cause a costly reset of the CPU and the wifi device or an altogether hang in the single CPU and single core scenario.
The only remaining spin_lock(&local->queue_stop_reason_lock) that did not disable interrupts was patched, which should prevent any deadlocks on the same CPU/core and the same wifi device.
This is the probable trace of the deadlock:
kernel: ================================ kernel: WARNING: inconsistent lock state kernel: 6.3.0-rc6-mt-20230401-00001-gf86822a1170f #4 Tainted: G W kernel: -------------------------------- kernel: inconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W} usage. kernel: kworker/5:0/25656 [HC0[0]:SC0[0]:HE1:SE1] takes: kernel: ffff9d6190779478 (&local->queue_stop_reason_lock){+.?.}-{2:2}, at: return_to_handler+0x0/0x40 kernel: {IN-SOFTIRQ-W} state was registered at: kernel: lock_acquire+0xc7/0x2d0 kernel: _raw_spin_lock+0x36/0x50 kernel: ieee80211_tx_dequeue+0xb4/0x1330 [mac80211] kernel: iwl_mvm_mac_itxq_xmit+0xae/0x210 [iwlmvm] kernel: iwl_mvm_mac_wake_tx_queue+0x2d/0xd0 [iwlmvm] kernel: ieee80211_queue_skb+0x450/0x730 [mac80211] kernel: __ieee80211_xmit_fast.constprop.66+0x834/0xa50 [mac80211] kernel: __ieee80211_subif_start_xmit+0x217/0x530 [mac80211] kernel: ieee80211_subif_start_xmit+0x60/0x580 [mac80211] kernel: dev_hard_start_xmit+0xb5/0x260 kernel: __dev_queue_xmit+0xdbe/0x1200 kernel: neigh_resolve_output+0x166/0x260 kernel: ip_finish_output2+0x216/0xb80 kernel: __ip_finish_output+0x2a4/0x4d0 kernel: ip_finish_output+0x2d/0xd0 kernel: ip_output+0x82/0x2b0 kernel: ip_local_out+0xec/0x110 kernel: igmpv3_sendpack+0x5c/0x90 kernel: igmp_ifc_timer_expire+0x26e/0x4e0 kernel: call_timer_fn+0xa5/0x230 kernel: run_timer_softirq+0x27f/0x550 kernel: __do_softirq+0xb4/0x3a4 kernel: irq_exit_rcu+0x9b/0xc0 kernel: sysvec_apic_timer_interrupt+0x80/0xa0 kernel: asm_sysvec_apic_timer_interrupt+0x1f/0x30 kernel: _raw_spin_unlock_irqrestore+0x3f/0x70 kernel: free_to_partial_list+0x3d6/0x590 kernel: __slab_free+0x1b7/0x310 kernel: kmem_cache_free+0x52d/0x550 kernel: putname+0x5d/0x70 kernel: do_sys_openat2+0x1d7/0x310 kernel: do_sys_open+0x51/0x80 kernel: __x64_sys_openat+0x24/0x30 kernel: do_syscall_64+0x5c/0x90 kernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc kernel: irq event stamp: 5120729 kernel: hardirqs last enabled at (5120729): [] trace_graph_return+0xd6/0x120 kernel: hardirqs last disabled at (5120728): [] trace_graph_return+0xf0/0x120 kernel: softirqs last enabled at (5069900): [] return_to_handler+0x0/0x40 kernel: softirqs last disabled at (5067555): [] return_to_handler+0x0/0x40 kernel: other info that might help us debug this: kernel: Possible unsafe locking scenario: kernel: CPU0 kernel: ---- kernel: lock(&local->queue_stop_reason_lock); kernel: kernel: lock(&local->queue_stop_reason_lock); kernel: *** DEADLOCK *** kernel: 8 locks held by kworker/5:0/25656: kernel: #0: ffff9d618009d138 ((wq_completion)events_freezable){+.+.}-{0:0}, at: process_one_work+0x1ca/0x530 kernel: #1: ffffb1ef4637fe68 ((work_completion)(&local->restart_work)){+.+.}-{0:0}, at: process_one_work+0x1ce/0x530 kernel: #2: ffffffff9f166548 (rtnl_mutex){+.+.}-{3:3}, at: return_to_handler+0x0/0x40 kernel: #3: ffff9d619 ---truncated---
{
"affected": [],
"aliases": [
"CVE-2023-54288"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-30T13:16:17Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fortify the spinlock against deadlock by interrupt\n\nIn the function ieee80211_tx_dequeue() there is a particular locking\nsequence:\n\nbegin:\n\tspin_lock(\u0026local-\u003equeue_stop_reason_lock);\n\tq_stopped = local-\u003equeue_stop_reasons[q];\n\tspin_unlock(\u0026local-\u003equeue_stop_reason_lock);\n\nHowever small the chance (increased by ftracetest), an asynchronous\ninterrupt can occur in between of spin_lock() and spin_unlock(),\nand the interrupt routine will attempt to lock the same\n\u0026local-\u003equeue_stop_reason_lock again.\n\nThis will cause a costly reset of the CPU and the wifi device or an\naltogether hang in the single CPU and single core scenario.\n\nThe only remaining spin_lock(\u0026local-\u003equeue_stop_reason_lock) that\ndid not disable interrupts was patched, which should prevent any\ndeadlocks on the same CPU/core and the same wifi device.\n\nThis is the probable trace of the deadlock:\n\nkernel: ================================\nkernel: WARNING: inconsistent lock state\nkernel: 6.3.0-rc6-mt-20230401-00001-gf86822a1170f #4 Tainted: G W\nkernel: --------------------------------\nkernel: inconsistent {IN-SOFTIRQ-W} -\u003e {SOFTIRQ-ON-W} usage.\nkernel: kworker/5:0/25656 [HC0[0]:SC0[0]:HE1:SE1] takes:\nkernel: ffff9d6190779478 (\u0026local-\u003equeue_stop_reason_lock){+.?.}-{2:2}, at: return_to_handler+0x0/0x40\nkernel: {IN-SOFTIRQ-W} state was registered at:\nkernel: lock_acquire+0xc7/0x2d0\nkernel: _raw_spin_lock+0x36/0x50\nkernel: ieee80211_tx_dequeue+0xb4/0x1330 [mac80211]\nkernel: iwl_mvm_mac_itxq_xmit+0xae/0x210 [iwlmvm]\nkernel: iwl_mvm_mac_wake_tx_queue+0x2d/0xd0 [iwlmvm]\nkernel: ieee80211_queue_skb+0x450/0x730 [mac80211]\nkernel: __ieee80211_xmit_fast.constprop.66+0x834/0xa50 [mac80211]\nkernel: __ieee80211_subif_start_xmit+0x217/0x530 [mac80211]\nkernel: ieee80211_subif_start_xmit+0x60/0x580 [mac80211]\nkernel: dev_hard_start_xmit+0xb5/0x260\nkernel: __dev_queue_xmit+0xdbe/0x1200\nkernel: neigh_resolve_output+0x166/0x260\nkernel: ip_finish_output2+0x216/0xb80\nkernel: __ip_finish_output+0x2a4/0x4d0\nkernel: ip_finish_output+0x2d/0xd0\nkernel: ip_output+0x82/0x2b0\nkernel: ip_local_out+0xec/0x110\nkernel: igmpv3_sendpack+0x5c/0x90\nkernel: igmp_ifc_timer_expire+0x26e/0x4e0\nkernel: call_timer_fn+0xa5/0x230\nkernel: run_timer_softirq+0x27f/0x550\nkernel: __do_softirq+0xb4/0x3a4\nkernel: irq_exit_rcu+0x9b/0xc0\nkernel: sysvec_apic_timer_interrupt+0x80/0xa0\nkernel: asm_sysvec_apic_timer_interrupt+0x1f/0x30\nkernel: _raw_spin_unlock_irqrestore+0x3f/0x70\nkernel: free_to_partial_list+0x3d6/0x590\nkernel: __slab_free+0x1b7/0x310\nkernel: kmem_cache_free+0x52d/0x550\nkernel: putname+0x5d/0x70\nkernel: do_sys_openat2+0x1d7/0x310\nkernel: do_sys_open+0x51/0x80\nkernel: __x64_sys_openat+0x24/0x30\nkernel: do_syscall_64+0x5c/0x90\nkernel: entry_SYSCALL_64_after_hwframe+0x72/0xdc\nkernel: irq event stamp: 5120729\nkernel: hardirqs last enabled at (5120729): [\u003cffffffff9d149936\u003e] trace_graph_return+0xd6/0x120\nkernel: hardirqs last disabled at (5120728): [\u003cffffffff9d149950\u003e] trace_graph_return+0xf0/0x120\nkernel: softirqs last enabled at (5069900): [\u003cffffffff9cf65b60\u003e] return_to_handler+0x0/0x40\nkernel: softirqs last disabled at (5067555): [\u003cffffffff9cf65b60\u003e] return_to_handler+0x0/0x40\nkernel:\n other info that might help us debug this:\nkernel: Possible unsafe locking scenario:\nkernel: CPU0\nkernel: ----\nkernel: lock(\u0026local-\u003equeue_stop_reason_lock);\nkernel: \u003cInterrupt\u003e\nkernel: lock(\u0026local-\u003equeue_stop_reason_lock);\nkernel:\n *** DEADLOCK ***\nkernel: 8 locks held by kworker/5:0/25656:\nkernel: #0: ffff9d618009d138 ((wq_completion)events_freezable){+.+.}-{0:0}, at: process_one_work+0x1ca/0x530\nkernel: #1: ffffb1ef4637fe68 ((work_completion)(\u0026local-\u003erestart_work)){+.+.}-{0:0}, at: process_one_work+0x1ce/0x530\nkernel: #2: ffffffff9f166548 (rtnl_mutex){+.+.}-{3:3}, at: return_to_handler+0x0/0x40\nkernel: #3: ffff9d619\n---truncated---",
"id": "GHSA-3v5g-mc4j-7vr8",
"modified": "2025-12-30T15:30:34Z",
"published": "2025-12-30T15:30:34Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-54288"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/6df3eafa31b3ee4f0cba601ca857019964355034"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/c79d794a2cd76eca47b2491c5030be9a6418c5d6"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ef6e1997da63ad0ac3fe33153fec9524c9ae56c9"
}
],
"schema_version": "1.4.0",
"severity": []
}
WID-SEC-W-2025-2941
Vulnerability from csaf_certbund - Published: 2025-12-30 23:00 - Updated: 2026-02-15 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu Denial\u2011of\u2011Service, Speicherbesch\u00e4digung oder weiteren nicht definierten Auswirkungen f\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2941 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2941.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2941 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2941"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50829",
"url": "https://lore.kernel.org/linux-cve-announce/2025123015-CVE-2022-50829-2142@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50830",
"url": "https://lore.kernel.org/linux-cve-announce/2025123016-CVE-2022-50830-ea74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50831",
"url": "https://lore.kernel.org/linux-cve-announce/2025123016-CVE-2022-50831-28c6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50832",
"url": "https://lore.kernel.org/linux-cve-announce/2025123016-CVE-2022-50832-4207@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50833",
"url": "https://lore.kernel.org/linux-cve-announce/2025123017-CVE-2022-50833-92af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50834",
"url": "https://lore.kernel.org/linux-cve-announce/2025123017-CVE-2022-50834-2135@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50835",
"url": "https://lore.kernel.org/linux-cve-announce/2025123017-CVE-2022-50835-a5ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50836",
"url": "https://lore.kernel.org/linux-cve-announce/2025123018-CVE-2022-50836-c8e4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50837",
"url": "https://lore.kernel.org/linux-cve-announce/2025123018-CVE-2022-50837-c470@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50838",
"url": "https://lore.kernel.org/linux-cve-announce/2025123018-CVE-2022-50838-1824@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50839",
"url": "https://lore.kernel.org/linux-cve-announce/2025123019-CVE-2022-50839-eca8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50840",
"url": "https://lore.kernel.org/linux-cve-announce/2025123019-CVE-2022-50840-678c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50841",
"url": "https://lore.kernel.org/linux-cve-announce/2025123019-CVE-2022-50841-06b9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50842",
"url": "https://lore.kernel.org/linux-cve-announce/2025123020-CVE-2022-50842-e43a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50843",
"url": "https://lore.kernel.org/linux-cve-announce/2025123020-CVE-2022-50843-ae87@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50844",
"url": "https://lore.kernel.org/linux-cve-announce/2025123020-CVE-2022-50844-64ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50845",
"url": "https://lore.kernel.org/linux-cve-announce/2025123021-CVE-2022-50845-367a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50846",
"url": "https://lore.kernel.org/linux-cve-announce/2025123021-CVE-2022-50846-caa2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50847",
"url": "https://lore.kernel.org/linux-cve-announce/2025123021-CVE-2022-50847-6766@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50848",
"url": "https://lore.kernel.org/linux-cve-announce/2025123043-CVE-2022-50848-4a61@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50849",
"url": "https://lore.kernel.org/linux-cve-announce/2025123044-CVE-2022-50849-9dea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50850",
"url": "https://lore.kernel.org/linux-cve-announce/2025123044-CVE-2022-50850-d6c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50851",
"url": "https://lore.kernel.org/linux-cve-announce/2025123044-CVE-2022-50851-fd02@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50852",
"url": "https://lore.kernel.org/linux-cve-announce/2025123045-CVE-2022-50852-978e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50853",
"url": "https://lore.kernel.org/linux-cve-announce/2025123045-CVE-2022-50853-ceca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50854",
"url": "https://lore.kernel.org/linux-cve-announce/2025123045-CVE-2022-50854-2aec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50855",
"url": "https://lore.kernel.org/linux-cve-announce/2025123046-CVE-2022-50855-7845@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50856",
"url": "https://lore.kernel.org/linux-cve-announce/2025123046-CVE-2022-50856-af64@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50857",
"url": "https://lore.kernel.org/linux-cve-announce/2025123046-CVE-2022-50857-6a86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50858",
"url": "https://lore.kernel.org/linux-cve-announce/2025123047-CVE-2022-50858-f41c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50859",
"url": "https://lore.kernel.org/linux-cve-announce/2025123047-CVE-2022-50859-6991@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50860",
"url": "https://lore.kernel.org/linux-cve-announce/2025123047-CVE-2022-50860-9d3a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50861",
"url": "https://lore.kernel.org/linux-cve-announce/2025123048-CVE-2022-50861-0a1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50862",
"url": "https://lore.kernel.org/linux-cve-announce/2025123048-CVE-2022-50862-124f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50863",
"url": "https://lore.kernel.org/linux-cve-announce/2025123048-CVE-2022-50863-7f8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50864",
"url": "https://lore.kernel.org/linux-cve-announce/2025123049-CVE-2022-50864-6bcd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50865",
"url": "https://lore.kernel.org/linux-cve-announce/2025123049-CVE-2022-50865-281e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50866",
"url": "https://lore.kernel.org/linux-cve-announce/2025123049-CVE-2022-50866-6082@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50867",
"url": "https://lore.kernel.org/linux-cve-announce/2025123050-CVE-2022-50867-cf19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50868",
"url": "https://lore.kernel.org/linux-cve-announce/2025123050-CVE-2022-50868-8968@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50869",
"url": "https://lore.kernel.org/linux-cve-announce/2025123050-CVE-2022-50869-8a8f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50870",
"url": "https://lore.kernel.org/linux-cve-announce/2025123050-CVE-2022-50870-c90b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50871",
"url": "https://lore.kernel.org/linux-cve-announce/2025123051-CVE-2022-50871-c4e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50872",
"url": "https://lore.kernel.org/linux-cve-announce/2025123051-CVE-2022-50872-0110@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50873",
"url": "https://lore.kernel.org/linux-cve-announce/2025123051-CVE-2022-50873-367d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50874",
"url": "https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2022-50874-bd1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50875",
"url": "https://lore.kernel.org/linux-cve-announce/2025123023-CVE-2022-50875-4def@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50876",
"url": "https://lore.kernel.org/linux-cve-announce/2025123023-CVE-2022-50876-b365@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50877",
"url": "https://lore.kernel.org/linux-cve-announce/2025123023-CVE-2022-50877-6a05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50878",
"url": "https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2022-50878-2067@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50879",
"url": "https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2022-50879-47a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50880",
"url": "https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2022-50880-4c27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50881",
"url": "https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2022-50881-88e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50882",
"url": "https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2022-50882-6f82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50883",
"url": "https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2022-50883-09fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50884",
"url": "https://lore.kernel.org/linux-cve-announce/2025123018-CVE-2022-50884-b4a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50885",
"url": "https://lore.kernel.org/linux-cve-announce/2025123020-CVE-2022-50885-c207@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50886",
"url": "https://lore.kernel.org/linux-cve-announce/2025123021-CVE-2022-50886-a081@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50887",
"url": "https://lore.kernel.org/linux-cve-announce/2025123014-CVE-2022-50887-6f16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50888",
"url": "https://lore.kernel.org/linux-cve-announce/2025123015-CVE-2022-50888-5614@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50889",
"url": "https://lore.kernel.org/linux-cve-announce/2025123015-CVE-2022-50889-71c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54173",
"url": "https://lore.kernel.org/linux-cve-announce/2025123021-CVE-2023-54173-2f44@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54176",
"url": "https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54176-efc2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54177",
"url": "https://lore.kernel.org/linux-cve-announce/2025123023-CVE-2023-54177-8df7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54178",
"url": "https://lore.kernel.org/linux-cve-announce/2025123023-CVE-2023-54178-bcb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54179",
"url": "https://lore.kernel.org/linux-cve-announce/2025123023-CVE-2023-54179-e6e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54180",
"url": "https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2023-54180-8b91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54181",
"url": "https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2023-54181-ef94@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54182",
"url": "https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2023-54182-916c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54197",
"url": "https://lore.kernel.org/linux-cve-announce/2025123029-CVE-2023-54197-aeec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54198",
"url": "https://lore.kernel.org/linux-cve-announce/2025123029-CVE-2023-54198-1df4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54199",
"url": "https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54199-595d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54200",
"url": "https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54200-8bbb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54201",
"url": "https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54201-3f26@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54202",
"url": "https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54202-1932@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54203",
"url": "https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54203-b19c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54204",
"url": "https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54204-6286@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54205",
"url": "https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54205-966b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54206",
"url": "https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54206-1057@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54207",
"url": "https://lore.kernel.org/linux-cve-announce/2025123023-CVE-2023-54207-8b3a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54208",
"url": "https://lore.kernel.org/linux-cve-announce/2025123023-CVE-2023-54208-e263@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54209",
"url": "https://lore.kernel.org/linux-cve-announce/2025123023-CVE-2023-54209-39be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54210",
"url": "https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2023-54210-7a73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54211",
"url": "https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2023-54211-09e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54212",
"url": "https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2023-54212-dc0b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54213",
"url": "https://lore.kernel.org/linux-cve-announce/2025123024-CVE-2023-54213-098b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54214",
"url": "https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2023-54214-c4a6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54215",
"url": "https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2023-54215-d1c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54216",
"url": "https://lore.kernel.org/linux-cve-announce/2025123025-CVE-2023-54216-93c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54217",
"url": "https://lore.kernel.org/linux-cve-announce/2025123026-CVE-2023-54217-ff07@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54218",
"url": "https://lore.kernel.org/linux-cve-announce/2025123026-CVE-2023-54218-840c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54219",
"url": "https://lore.kernel.org/linux-cve-announce/2025123026-CVE-2023-54219-f260@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54220",
"url": "https://lore.kernel.org/linux-cve-announce/2025123027-CVE-2023-54220-2951@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54221",
"url": "https://lore.kernel.org/linux-cve-announce/2025123027-CVE-2023-54221-567b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54222",
"url": "https://lore.kernel.org/linux-cve-announce/2025123027-CVE-2023-54222-1748@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54223",
"url": "https://lore.kernel.org/linux-cve-announce/2025123028-CVE-2023-54223-8c6b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54224",
"url": "https://lore.kernel.org/linux-cve-announce/2025123028-CVE-2023-54224-9f68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54225",
"url": "https://lore.kernel.org/linux-cve-announce/2025123028-CVE-2023-54225-e49c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54226",
"url": "https://lore.kernel.org/linux-cve-announce/2025123029-CVE-2023-54226-b9e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54227",
"url": "https://lore.kernel.org/linux-cve-announce/2025123029-CVE-2023-54227-5c6c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54228",
"url": "https://lore.kernel.org/linux-cve-announce/2025123029-CVE-2023-54228-0585@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54229",
"url": "https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54229-80e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54230",
"url": "https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54230-914e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54231",
"url": "https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54231-4604@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54232",
"url": "https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54232-48af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54233",
"url": "https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54233-1e82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54234",
"url": "https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54234-bb5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54235",
"url": "https://lore.kernel.org/linux-cve-announce/2025123032-CVE-2023-54235-51bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54236",
"url": "https://lore.kernel.org/linux-cve-announce/2025123032-CVE-2023-54236-9642@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54237",
"url": "https://lore.kernel.org/linux-cve-announce/2025123032-CVE-2023-54237-c03d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54238",
"url": "https://lore.kernel.org/linux-cve-announce/2025123033-CVE-2023-54238-87c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54239",
"url": "https://lore.kernel.org/linux-cve-announce/2025123033-CVE-2023-54239-07d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54240",
"url": "https://lore.kernel.org/linux-cve-announce/2025123033-CVE-2023-54240-b9f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54241",
"url": "https://lore.kernel.org/linux-cve-announce/2025123034-CVE-2023-54241-ecc8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54242",
"url": "https://lore.kernel.org/linux-cve-announce/2025123034-CVE-2023-54242-9771@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54243",
"url": "https://lore.kernel.org/linux-cve-announce/2025123034-CVE-2023-54243-5fb8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54244",
"url": "https://lore.kernel.org/linux-cve-announce/2025123052-CVE-2023-54244-9a1f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54245",
"url": "https://lore.kernel.org/linux-cve-announce/2025123052-CVE-2023-54245-fc10@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54246",
"url": "https://lore.kernel.org/linux-cve-announce/2025123052-CVE-2023-54246-8abc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54247",
"url": "https://lore.kernel.org/linux-cve-announce/2025123053-CVE-2023-54247-4cf1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54248",
"url": "https://lore.kernel.org/linux-cve-announce/2025123053-CVE-2023-54248-c2cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54249",
"url": "https://lore.kernel.org/linux-cve-announce/2025123053-CVE-2023-54249-b2c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54250",
"url": "https://lore.kernel.org/linux-cve-announce/2025123054-CVE-2023-54250-96bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54251",
"url": "https://lore.kernel.org/linux-cve-announce/2025123054-CVE-2023-54251-2a3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54252",
"url": "https://lore.kernel.org/linux-cve-announce/2025123054-CVE-2023-54252-8398@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54253",
"url": "https://lore.kernel.org/linux-cve-announce/2025123055-CVE-2023-54253-18d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54254",
"url": "https://lore.kernel.org/linux-cve-announce/2025123055-CVE-2023-54254-8a3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54255",
"url": "https://lore.kernel.org/linux-cve-announce/2025123055-CVE-2023-54255-9509@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54256",
"url": "https://lore.kernel.org/linux-cve-announce/2025123056-CVE-2023-54256-8de6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54257",
"url": "https://lore.kernel.org/linux-cve-announce/2025123056-CVE-2023-54257-9a92@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54258",
"url": "https://lore.kernel.org/linux-cve-announce/2025123056-CVE-2023-54258-532c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54259",
"url": "https://lore.kernel.org/linux-cve-announce/2025123057-CVE-2023-54259-64ee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54260",
"url": "https://lore.kernel.org/linux-cve-announce/2025123057-CVE-2023-54260-cc1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54261",
"url": "https://lore.kernel.org/linux-cve-announce/2025123057-CVE-2023-54261-0331@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54262",
"url": "https://lore.kernel.org/linux-cve-announce/2025123058-CVE-2023-54262-4f66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54263",
"url": "https://lore.kernel.org/linux-cve-announce/2025123058-CVE-2023-54263-0976@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54264",
"url": "https://lore.kernel.org/linux-cve-announce/2025123058-CVE-2023-54264-64bd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54265",
"url": "https://lore.kernel.org/linux-cve-announce/2025123059-CVE-2023-54265-02a6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54266",
"url": "https://lore.kernel.org/linux-cve-announce/2025123059-CVE-2023-54266-a48b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54267",
"url": "https://lore.kernel.org/linux-cve-announce/2025123059-CVE-2023-54267-6736@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54268",
"url": "https://lore.kernel.org/linux-cve-announce/2025123000-CVE-2023-54268-3ba2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54269",
"url": "https://lore.kernel.org/linux-cve-announce/2025123000-CVE-2023-54269-6fd7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54270",
"url": "https://lore.kernel.org/linux-cve-announce/2025123000-CVE-2023-54270-cdd0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54271",
"url": "https://lore.kernel.org/linux-cve-announce/2025123001-CVE-2023-54271-d75a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54272",
"url": "https://lore.kernel.org/linux-cve-announce/2025123001-CVE-2023-54272-cb3f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54273",
"url": "https://lore.kernel.org/linux-cve-announce/2025123001-CVE-2023-54273-29ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54274",
"url": "https://lore.kernel.org/linux-cve-announce/2025123002-CVE-2023-54274-79a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54275",
"url": "https://lore.kernel.org/linux-cve-announce/2025123002-CVE-2023-54275-728d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54276",
"url": "https://lore.kernel.org/linux-cve-announce/2025123002-CVE-2023-54276-06b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54277",
"url": "https://lore.kernel.org/linux-cve-announce/2025123002-CVE-2023-54277-0970@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54278",
"url": "https://lore.kernel.org/linux-cve-announce/2025123003-CVE-2023-54278-d4b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54279",
"url": "https://lore.kernel.org/linux-cve-announce/2025123003-CVE-2023-54279-1dfa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54280",
"url": "https://lore.kernel.org/linux-cve-announce/2025123026-CVE-2023-54280-26ee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54281",
"url": "https://lore.kernel.org/linux-cve-announce/2025123026-CVE-2023-54281-3f6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54282",
"url": "https://lore.kernel.org/linux-cve-announce/2025123026-CVE-2023-54282-dab4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54283",
"url": "https://lore.kernel.org/linux-cve-announce/2025123026-CVE-2023-54283-b319@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54284",
"url": "https://lore.kernel.org/linux-cve-announce/2025123027-CVE-2023-54284-a3a6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54285",
"url": "https://lore.kernel.org/linux-cve-announce/2025123027-CVE-2023-54285-edc0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54286",
"url": "https://lore.kernel.org/linux-cve-announce/2025123027-CVE-2023-54286-efd5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54287",
"url": "https://lore.kernel.org/linux-cve-announce/2025123028-CVE-2023-54287-31dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54288",
"url": "https://lore.kernel.org/linux-cve-announce/2025123028-CVE-2023-54288-c7cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54289",
"url": "https://lore.kernel.org/linux-cve-announce/2025123028-CVE-2023-54289-5309@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54290",
"url": "https://lore.kernel.org/linux-cve-announce/2025123029-CVE-2023-54290-820f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54291",
"url": "https://lore.kernel.org/linux-cve-announce/2025123029-CVE-2023-54291-2983@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54292",
"url": "https://lore.kernel.org/linux-cve-announce/2025123029-CVE-2023-54292-26cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54293",
"url": "https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54293-c2bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54294",
"url": "https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54294-e7ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54295",
"url": "https://lore.kernel.org/linux-cve-announce/2025123030-CVE-2023-54295-8954@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54296",
"url": "https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54296-e667@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54297",
"url": "https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54297-6171@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54298",
"url": "https://lore.kernel.org/linux-cve-announce/2025123031-CVE-2023-54298-d33d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54299",
"url": "https://lore.kernel.org/linux-cve-announce/2025123032-CVE-2023-54299-ec86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54300",
"url": "https://lore.kernel.org/linux-cve-announce/2025123032-CVE-2023-54300-5746@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54301",
"url": "https://lore.kernel.org/linux-cve-announce/2025123032-CVE-2023-54301-630e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54302",
"url": "https://lore.kernel.org/linux-cve-announce/2025123033-CVE-2023-54302-a9e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54303",
"url": "https://lore.kernel.org/linux-cve-announce/2025123033-CVE-2023-54303-0e92@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54304",
"url": "https://lore.kernel.org/linux-cve-announce/2025123033-CVE-2023-54304-fefc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54305",
"url": "https://lore.kernel.org/linux-cve-announce/2025123034-CVE-2023-54305-68b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54306",
"url": "https://lore.kernel.org/linux-cve-announce/2025123034-CVE-2023-54306-e40f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54307",
"url": "https://lore.kernel.org/linux-cve-announce/2025123034-CVE-2023-54307-1ddf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54308",
"url": "https://lore.kernel.org/linux-cve-announce/2025123035-CVE-2023-54308-5d83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54309",
"url": "https://lore.kernel.org/linux-cve-announce/2025123035-CVE-2023-54309-4435@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54310",
"url": "https://lore.kernel.org/linux-cve-announce/2025123035-CVE-2023-54310-cc98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54311",
"url": "https://lore.kernel.org/linux-cve-announce/2025123036-CVE-2023-54311-46a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54312",
"url": "https://lore.kernel.org/linux-cve-announce/2025123036-CVE-2023-54312-8b23@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54313",
"url": "https://lore.kernel.org/linux-cve-announce/2025123036-CVE-2023-54313-f889@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54314",
"url": "https://lore.kernel.org/linux-cve-announce/2025123037-CVE-2023-54314-a578@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54315",
"url": "https://lore.kernel.org/linux-cve-announce/2025123037-CVE-2023-54315-7005@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54316",
"url": "https://lore.kernel.org/linux-cve-announce/2025123037-CVE-2023-54316-f3c8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54317",
"url": "https://lore.kernel.org/linux-cve-announce/2025123037-CVE-2023-54317-4750@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54318",
"url": "https://lore.kernel.org/linux-cve-announce/2025123038-CVE-2023-54318-bb2a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54319",
"url": "https://lore.kernel.org/linux-cve-announce/2025123021-CVE-2023-54319-dd46@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54320",
"url": "https://lore.kernel.org/linux-cve-announce/2025123021-CVE-2023-54320-465d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54321",
"url": "https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54321-b87f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54322",
"url": "https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54322-34ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54323",
"url": "https://lore.kernel.org/linux-cve-announce/2025123015-CVE-2023-54323-423a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54324",
"url": "https://lore.kernel.org/linux-cve-announce/2025123015-CVE-2023-54324-7149@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54325",
"url": "https://lore.kernel.org/linux-cve-announce/2025123016-CVE-2023-54325-3e5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-54326",
"url": "https://lore.kernel.org/linux-cve-announce/2025123016-CVE-2023-54326-43b2@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0263-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0317-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1662 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1662"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0350-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1661 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1661"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0369-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1662 vom 2026-02-03",
"url": "http://linux.oracle.com/errata/ELSA-2026-1662.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1946 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1946"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1909 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1909"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6127 vom 2026-02-10",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0411-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2490 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2490"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1661 vom 2026-02-11",
"url": "https://errata.build.resf.org/RLSA-2026:1661"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:1662 vom 2026-02-11",
"url": "https://errata.build.resf.org/RLSA-2026:1662"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2573 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2573"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2577 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2577"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4476 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0474-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0496-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2026-02-15T23:00:00.000+00:00",
"generator": {
"date": "2026-02-16T11:20:48.443+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2941",
"initial_release_date": "2025-12-30T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-30T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat und Debian aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028463",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-42719",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-50829",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50829"
},
{
"cve": "CVE-2022-50830",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50830"
},
{
"cve": "CVE-2022-50831",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50831"
},
{
"cve": "CVE-2022-50832",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50832"
},
{
"cve": "CVE-2022-50833",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50833"
},
{
"cve": "CVE-2022-50834",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50834"
},
{
"cve": "CVE-2022-50835",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50835"
},
{
"cve": "CVE-2022-50836",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50836"
},
{
"cve": "CVE-2022-50837",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50837"
},
{
"cve": "CVE-2022-50838",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50838"
},
{
"cve": "CVE-2022-50839",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50839"
},
{
"cve": "CVE-2022-50840",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50840"
},
{
"cve": "CVE-2022-50841",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50841"
},
{
"cve": "CVE-2022-50842",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50842"
},
{
"cve": "CVE-2022-50843",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50843"
},
{
"cve": "CVE-2022-50844",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50844"
},
{
"cve": "CVE-2022-50845",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50845"
},
{
"cve": "CVE-2022-50846",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50846"
},
{
"cve": "CVE-2022-50847",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50847"
},
{
"cve": "CVE-2022-50848",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50848"
},
{
"cve": "CVE-2022-50849",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50849"
},
{
"cve": "CVE-2022-50850",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50850"
},
{
"cve": "CVE-2022-50851",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50851"
},
{
"cve": "CVE-2022-50852",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50852"
},
{
"cve": "CVE-2022-50853",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50853"
},
{
"cve": "CVE-2022-50854",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50854"
},
{
"cve": "CVE-2022-50855",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50855"
},
{
"cve": "CVE-2022-50856",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50856"
},
{
"cve": "CVE-2022-50857",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50857"
},
{
"cve": "CVE-2022-50858",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50858"
},
{
"cve": "CVE-2022-50859",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50859"
},
{
"cve": "CVE-2022-50860",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50860"
},
{
"cve": "CVE-2022-50861",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50861"
},
{
"cve": "CVE-2022-50862",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50862"
},
{
"cve": "CVE-2022-50863",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50863"
},
{
"cve": "CVE-2022-50864",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50864"
},
{
"cve": "CVE-2022-50865",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50865"
},
{
"cve": "CVE-2022-50866",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50866"
},
{
"cve": "CVE-2022-50867",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50867"
},
{
"cve": "CVE-2022-50868",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50868"
},
{
"cve": "CVE-2022-50869",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50869"
},
{
"cve": "CVE-2022-50870",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50870"
},
{
"cve": "CVE-2022-50871",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50871"
},
{
"cve": "CVE-2022-50872",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50872"
},
{
"cve": "CVE-2022-50873",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50873"
},
{
"cve": "CVE-2022-50874",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50874"
},
{
"cve": "CVE-2022-50875",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50875"
},
{
"cve": "CVE-2022-50876",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50876"
},
{
"cve": "CVE-2022-50877",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50877"
},
{
"cve": "CVE-2022-50878",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50878"
},
{
"cve": "CVE-2022-50879",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50879"
},
{
"cve": "CVE-2022-50880",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50880"
},
{
"cve": "CVE-2022-50881",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50881"
},
{
"cve": "CVE-2022-50882",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50882"
},
{
"cve": "CVE-2022-50883",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50883"
},
{
"cve": "CVE-2022-50884",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50884"
},
{
"cve": "CVE-2022-50885",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50885"
},
{
"cve": "CVE-2022-50886",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50886"
},
{
"cve": "CVE-2022-50887",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50887"
},
{
"cve": "CVE-2022-50888",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50888"
},
{
"cve": "CVE-2022-50889",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2022-50889"
},
{
"cve": "CVE-2023-0266",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-0266"
},
{
"cve": "CVE-2023-54173",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54173"
},
{
"cve": "CVE-2023-54176",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54176"
},
{
"cve": "CVE-2023-54177",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54177"
},
{
"cve": "CVE-2023-54178",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54178"
},
{
"cve": "CVE-2023-54179",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54179"
},
{
"cve": "CVE-2023-54180",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54180"
},
{
"cve": "CVE-2023-54181",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54181"
},
{
"cve": "CVE-2023-54182",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54182"
},
{
"cve": "CVE-2023-54197",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54197"
},
{
"cve": "CVE-2023-54198",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54198"
},
{
"cve": "CVE-2023-54199",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54199"
},
{
"cve": "CVE-2023-54200",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54200"
},
{
"cve": "CVE-2023-54201",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54201"
},
{
"cve": "CVE-2023-54202",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54202"
},
{
"cve": "CVE-2023-54203",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54203"
},
{
"cve": "CVE-2023-54204",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54204"
},
{
"cve": "CVE-2023-54205",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54205"
},
{
"cve": "CVE-2023-54206",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54206"
},
{
"cve": "CVE-2023-54207",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54207"
},
{
"cve": "CVE-2023-54208",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54208"
},
{
"cve": "CVE-2023-54209",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54209"
},
{
"cve": "CVE-2023-54210",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54210"
},
{
"cve": "CVE-2023-54211",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54211"
},
{
"cve": "CVE-2023-54212",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54212"
},
{
"cve": "CVE-2023-54213",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54213"
},
{
"cve": "CVE-2023-54214",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54214"
},
{
"cve": "CVE-2023-54215",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54215"
},
{
"cve": "CVE-2023-54216",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54216"
},
{
"cve": "CVE-2023-54217",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54217"
},
{
"cve": "CVE-2023-54218",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54218"
},
{
"cve": "CVE-2023-54219",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54219"
},
{
"cve": "CVE-2023-54220",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54220"
},
{
"cve": "CVE-2023-54221",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54221"
},
{
"cve": "CVE-2023-54222",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54222"
},
{
"cve": "CVE-2023-54223",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54223"
},
{
"cve": "CVE-2023-54224",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54224"
},
{
"cve": "CVE-2023-54225",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54225"
},
{
"cve": "CVE-2023-54226",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54226"
},
{
"cve": "CVE-2023-54227",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54227"
},
{
"cve": "CVE-2023-54228",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54228"
},
{
"cve": "CVE-2023-54229",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54229"
},
{
"cve": "CVE-2023-54230",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54230"
},
{
"cve": "CVE-2023-54231",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54231"
},
{
"cve": "CVE-2023-54232",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54232"
},
{
"cve": "CVE-2023-54233",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54233"
},
{
"cve": "CVE-2023-54234",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54234"
},
{
"cve": "CVE-2023-54235",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54235"
},
{
"cve": "CVE-2023-54236",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54236"
},
{
"cve": "CVE-2023-54237",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54237"
},
{
"cve": "CVE-2023-54238",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54238"
},
{
"cve": "CVE-2023-54239",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54239"
},
{
"cve": "CVE-2023-54240",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54240"
},
{
"cve": "CVE-2023-54241",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54241"
},
{
"cve": "CVE-2023-54242",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54242"
},
{
"cve": "CVE-2023-54243",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54243"
},
{
"cve": "CVE-2023-54244",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54244"
},
{
"cve": "CVE-2023-54245",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54245"
},
{
"cve": "CVE-2023-54246",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54246"
},
{
"cve": "CVE-2023-54247",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54247"
},
{
"cve": "CVE-2023-54248",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54248"
},
{
"cve": "CVE-2023-54249",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54249"
},
{
"cve": "CVE-2023-54250",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54250"
},
{
"cve": "CVE-2023-54251",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54251"
},
{
"cve": "CVE-2023-54252",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54252"
},
{
"cve": "CVE-2023-54253",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54253"
},
{
"cve": "CVE-2023-54254",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54254"
},
{
"cve": "CVE-2023-54255",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54255"
},
{
"cve": "CVE-2023-54256",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54256"
},
{
"cve": "CVE-2023-54257",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54257"
},
{
"cve": "CVE-2023-54258",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54258"
},
{
"cve": "CVE-2023-54259",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54259"
},
{
"cve": "CVE-2023-54260",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54260"
},
{
"cve": "CVE-2023-54261",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54261"
},
{
"cve": "CVE-2023-54262",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54262"
},
{
"cve": "CVE-2023-54263",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54263"
},
{
"cve": "CVE-2023-54264",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54264"
},
{
"cve": "CVE-2023-54265",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54265"
},
{
"cve": "CVE-2023-54266",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54266"
},
{
"cve": "CVE-2023-54267",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54267"
},
{
"cve": "CVE-2023-54268",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54268"
},
{
"cve": "CVE-2023-54269",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54269"
},
{
"cve": "CVE-2023-54270",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54270"
},
{
"cve": "CVE-2023-54271",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54271"
},
{
"cve": "CVE-2023-54272",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54272"
},
{
"cve": "CVE-2023-54273",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54273"
},
{
"cve": "CVE-2023-54274",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54274"
},
{
"cve": "CVE-2023-54275",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54275"
},
{
"cve": "CVE-2023-54276",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54276"
},
{
"cve": "CVE-2023-54277",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54277"
},
{
"cve": "CVE-2023-54278",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54278"
},
{
"cve": "CVE-2023-54279",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54279"
},
{
"cve": "CVE-2023-54280",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54280"
},
{
"cve": "CVE-2023-54281",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54281"
},
{
"cve": "CVE-2023-54282",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54282"
},
{
"cve": "CVE-2023-54283",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54283"
},
{
"cve": "CVE-2023-54284",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54284"
},
{
"cve": "CVE-2023-54285",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54285"
},
{
"cve": "CVE-2023-54286",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54286"
},
{
"cve": "CVE-2023-54287",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54287"
},
{
"cve": "CVE-2023-54288",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54288"
},
{
"cve": "CVE-2023-54289",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54289"
},
{
"cve": "CVE-2023-54290",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54290"
},
{
"cve": "CVE-2023-54291",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54291"
},
{
"cve": "CVE-2023-54292",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54292"
},
{
"cve": "CVE-2023-54293",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54293"
},
{
"cve": "CVE-2023-54294",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54294"
},
{
"cve": "CVE-2023-54295",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54295"
},
{
"cve": "CVE-2023-54296",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54296"
},
{
"cve": "CVE-2023-54297",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54297"
},
{
"cve": "CVE-2023-54298",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54298"
},
{
"cve": "CVE-2023-54299",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54299"
},
{
"cve": "CVE-2023-54300",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54300"
},
{
"cve": "CVE-2023-54301",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54301"
},
{
"cve": "CVE-2023-54302",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54302"
},
{
"cve": "CVE-2023-54303",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54303"
},
{
"cve": "CVE-2023-54304",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54304"
},
{
"cve": "CVE-2023-54305",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54305"
},
{
"cve": "CVE-2023-54306",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54306"
},
{
"cve": "CVE-2023-54307",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54307"
},
{
"cve": "CVE-2023-54308",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54308"
},
{
"cve": "CVE-2023-54309",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54309"
},
{
"cve": "CVE-2023-54310",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54310"
},
{
"cve": "CVE-2023-54311",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54311"
},
{
"cve": "CVE-2023-54312",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54312"
},
{
"cve": "CVE-2023-54313",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54313"
},
{
"cve": "CVE-2023-54314",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54314"
},
{
"cve": "CVE-2023-54315",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54315"
},
{
"cve": "CVE-2023-54316",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54316"
},
{
"cve": "CVE-2023-54317",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54317"
},
{
"cve": "CVE-2023-54318",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54318"
},
{
"cve": "CVE-2023-54319",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54319"
},
{
"cve": "CVE-2023-54320",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54320"
},
{
"cve": "CVE-2023-54321",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54321"
},
{
"cve": "CVE-2023-54322",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54322"
},
{
"cve": "CVE-2023-54323",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54323"
},
{
"cve": "CVE-2023-54324",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54324"
},
{
"cve": "CVE-2023-54325",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54325"
},
{
"cve": "CVE-2023-54326",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T002207",
"67646",
"T004914",
"T032255"
]
},
"release_date": "2025-12-30T23:00:00.000+00:00",
"title": "CVE-2023-54326"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.