Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53469 (GCVE-0-2023-53469)
Vulnerability from cvelistv5 – Published: 2025-10-01 11:42 – Updated: 2025-12-29 15:22This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2025-12-29T15:22:17.258Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"rejectedReasons": [
{
"lang": "en",
"value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-53469",
"datePublished": "2025-10-01T11:42:39.467Z",
"dateRejected": "2025-12-29T15:22:17.258Z",
"dateReserved": "2025-10-01T11:39:39.400Z",
"dateUpdated": "2025-12-29T15:22:17.258Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-53469\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-01T12:15:48.973\",\"lastModified\":\"2025-12-29T16:15:39.987\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}],\"metrics\":{},\"references\":[]}}"
}
}
GHSA-8R69-GC7H-5H9C
Vulnerability from github – Published: 2025-10-01 12:30 – Updated: 2025-10-10 18:31In the Linux kernel, the following vulnerability has been resolved:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
Bing-Jhong Billy Jheng reported null-ptr-deref in unix_stream_sendpage() with detailed analysis and a nice repro.
unix_stream_sendpage() tries to add data to the last skb in the peer's recv queue without locking the queue.
If the peer's FD is passed to another socket and the socket's FD is passed to the peer, there is a loop between them. If we close both sockets without receiving FD, the sockets will be cleaned up by garbage collection.
The garbage collection iterates such sockets and unlinks skb with FD from the socket's receive queue under the queue's lock.
So, there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.
To avoid the issue, unix_stream_sendpage() must lock the peer's recv queue.
Note the issue does not exist in 6.5+ thanks to the recent sendpage() refactoring.
This patch is originally written by Linus Torvalds.
BUG: unable to handle page fault for address: ffff988004dd6870 PF: supervisor read access in kernel mode PF: error_code(0x0000) - not-present page PGD 0 P4D 0 PREEMPT SMP PTI CPU: 4 PID: 297 Comm: garbage_uaf Not tainted 6.1.46 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 RIP: 0010:kmem_cache_alloc_node+0xa2/0x1e0 Code: c0 0f 84 32 01 00 00 41 83 fd ff 74 10 48 8b 00 48 c1 e8 3a 41 39 c5 0f 85 1c 01 00 00 41 8b 44 24 28 49 8b 3c 24 48 8d 4a 40 <49> 8b 1c 06 4c 89 f0 65 48 0f c7 0f 0f 94 c0 84 c0 74 a1 41 8b 44 RSP: 0018:ffffc9000079fac0 EFLAGS: 00000246 RAX: 0000000000000070 RBX: 0000000000000005 RCX: 000000000001a284 RDX: 000000000001a244 RSI: 0000000000400cc0 RDI: 000000000002eee0 RBP: 0000000000400cc0 R08: 0000000000400cc0 R09: 0000000000000003 R10: 0000000000000001 R11: 0000000000000000 R12: ffff888003970f00 R13: 00000000ffffffff R14: ffff988004dd6800 R15: 00000000000000e8 FS: 00007f174d6f3600(0000) GS:ffff88807db00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff988004dd6870 CR3: 00000000092be000 CR4: 00000000007506e0 PKRU: 55555554 Call Trace: ? __die_body.cold+0x1a/0x1f ? page_fault_oops+0xa9/0x1e0 ? fixup_exception+0x1d/0x310 ? exc_page_fault+0xa8/0x150 ? asm_exc_page_fault+0x22/0x30 ? kmem_cache_alloc_node+0xa2/0x1e0 ? __alloc_skb+0x16c/0x1e0 __alloc_skb+0x16c/0x1e0 alloc_skb_with_frags+0x48/0x1e0 sock_alloc_send_pskb+0x234/0x270 unix_stream_sendmsg+0x1f5/0x690 sock_sendmsg+0x5d/0x60 _syssendmsg+0x210/0x260 _sys_sendmsg+0x83/0xd0 ? kmem_cache_alloc+0xc6/0x1c0 ? avc_disable+0x20/0x20 ? percpu_counter_add_batch+0x53/0xc0 ? alloc_empty_file+0x5d/0xb0 ? alloc_file+0x91/0x170 ? alloc_file_pseudo+0x94/0x100 ? __fget_light+0x9f/0x120 __sys_sendmsg+0x54/0xa0 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x69/0xd3 RIP: 0033:0x7f174d639a7d Code: 28 89 54 24 1c 48 89 74 24 10 89 7c 24 08 e8 8a c1 f4 ff 8b 54 24 1c 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 33 44 89 c7 48 89 44 24 08 e8 de c1 f4 ff 48 RSP: 002b:00007ffcb563ea50 EFLAGS: 00000293 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f174d639a7d RDX: 0000000000000000 RSI: 00007ffcb563eab0 RDI: 0000000000000007 RBP: 00007ffcb563eb10 R08: 0000000000000000 R09: 00000000ffffffff R10: 00000000004040a0 R11: 0000000000000293 R12: 00007ffcb563ec28 R13: 0000000000401398 R14: 0000000000403e00 R15: 00007f174d72c000
{
"affected": [],
"aliases": [
"CVE-2023-53469"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-01T12:15:48Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix null-ptr-deref in unix_stream_sendpage().\n\nBing-Jhong Billy Jheng reported null-ptr-deref in unix_stream_sendpage()\nwith detailed analysis and a nice repro.\n\nunix_stream_sendpage() tries to add data to the last skb in the peer\u0027s\nrecv queue without locking the queue.\n\nIf the peer\u0027s FD is passed to another socket and the socket\u0027s FD is\npassed to the peer, there is a loop between them. If we close both\nsockets without receiving FD, the sockets will be cleaned up by garbage\ncollection.\n\nThe garbage collection iterates such sockets and unlinks skb with\nFD from the socket\u0027s receive queue under the queue\u0027s lock.\n\nSo, there is a race where unix_stream_sendpage() could access an skb\nlocklessly that is being released by garbage collection, resulting in\nuse-after-free.\n\nTo avoid the issue, unix_stream_sendpage() must lock the peer\u0027s recv\nqueue.\n\nNote the issue does not exist in 6.5+ thanks to the recent sendpage()\nrefactoring.\n\nThis patch is originally written by Linus Torvalds.\n\nBUG: unable to handle page fault for address: ffff988004dd6870\nPF: supervisor read access in kernel mode\nPF: error_code(0x0000) - not-present page\nPGD 0 P4D 0\nPREEMPT SMP PTI\nCPU: 4 PID: 297 Comm: garbage_uaf Not tainted 6.1.46 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:kmem_cache_alloc_node+0xa2/0x1e0\nCode: c0 0f 84 32 01 00 00 41 83 fd ff 74 10 48 8b 00 48 c1 e8 3a 41 39 c5 0f 85 1c 01 00 00 41 8b 44 24 28 49 8b 3c 24 48 8d 4a 40 \u003c49\u003e 8b 1c 06 4c 89 f0 65 48 0f c7 0f 0f 94 c0 84 c0 74 a1 41 8b 44\nRSP: 0018:ffffc9000079fac0 EFLAGS: 00000246\nRAX: 0000000000000070 RBX: 0000000000000005 RCX: 000000000001a284\nRDX: 000000000001a244 RSI: 0000000000400cc0 RDI: 000000000002eee0\nRBP: 0000000000400cc0 R08: 0000000000400cc0 R09: 0000000000000003\nR10: 0000000000000001 R11: 0000000000000000 R12: ffff888003970f00\nR13: 00000000ffffffff R14: ffff988004dd6800 R15: 00000000000000e8\nFS: 00007f174d6f3600(0000) GS:ffff88807db00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffff988004dd6870 CR3: 00000000092be000 CR4: 00000000007506e0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? __die_body.cold+0x1a/0x1f\n ? page_fault_oops+0xa9/0x1e0\n ? fixup_exception+0x1d/0x310\n ? exc_page_fault+0xa8/0x150\n ? asm_exc_page_fault+0x22/0x30\n ? kmem_cache_alloc_node+0xa2/0x1e0\n ? __alloc_skb+0x16c/0x1e0\n __alloc_skb+0x16c/0x1e0\n alloc_skb_with_frags+0x48/0x1e0\n sock_alloc_send_pskb+0x234/0x270\n unix_stream_sendmsg+0x1f5/0x690\n sock_sendmsg+0x5d/0x60\n ____sys_sendmsg+0x210/0x260\n ___sys_sendmsg+0x83/0xd0\n ? kmem_cache_alloc+0xc6/0x1c0\n ? avc_disable+0x20/0x20\n ? percpu_counter_add_batch+0x53/0xc0\n ? alloc_empty_file+0x5d/0xb0\n ? alloc_file+0x91/0x170\n ? alloc_file_pseudo+0x94/0x100\n ? __fget_light+0x9f/0x120\n __sys_sendmsg+0x54/0xa0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x69/0xd3\nRIP: 0033:0x7f174d639a7d\nCode: 28 89 54 24 1c 48 89 74 24 10 89 7c 24 08 e8 8a c1 f4 ff 8b 54 24 1c 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 33 44 89 c7 48 89 44 24 08 e8 de c1 f4 ff 48\nRSP: 002b:00007ffcb563ea50 EFLAGS: 00000293 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f174d639a7d\nRDX: 0000000000000000 RSI: 00007ffcb563eab0 RDI: 0000000000000007\nRBP: 00007ffcb563eb10 R08: 0000000000000000 R09: 00000000ffffffff\nR10: 00000000004040a0 R11: 0000000000000293 R12: 00007ffcb563ec28\nR13: 0000000000401398 R14: 0000000000403e00 R15: 00007f174d72c000\n \u003c/TASK\u003e",
"id": "GHSA-8r69-gc7h-5h9c",
"modified": "2025-10-10T18:31:19Z",
"published": "2025-10-01T12:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53469"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/2dde18cd1d8fac735875f2e4987f11817cc0bc2c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/4a3fcfc3b51796e5e6974041c9a7cf7808d16f9e"
}
],
"schema_version": "1.4.0",
"severity": []
}
WID-SEC-W-2025-2187
Vulnerability from csaf_certbund - Published: 2025-10-01 22:00 - Updated: 2025-12-16 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und um nicht n\u00e4here beschriebene Effekte zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2187 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2187.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2187 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2187"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2021-4460",
"url": "https://lore.kernel.org/linux-cve-announce/2025100114-CVE-2021-4460-aa71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50420",
"url": "https://lore.kernel.org/linux-cve-announce/2025100152-CVE-2022-50420-1d36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50421",
"url": "https://lore.kernel.org/linux-cve-announce/2025100155-CVE-2022-50421-8bdc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50422",
"url": "https://lore.kernel.org/linux-cve-announce/2025100155-CVE-2022-50422-287b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50423",
"url": "https://lore.kernel.org/linux-cve-announce/2025100155-CVE-2022-50423-5a66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50424",
"url": "https://lore.kernel.org/linux-cve-announce/2025100156-CVE-2022-50424-049f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50425",
"url": "https://lore.kernel.org/linux-cve-announce/2025100156-CVE-2022-50425-6722@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50426",
"url": "https://lore.kernel.org/linux-cve-announce/2025100156-CVE-2022-50426-a61b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50427",
"url": "https://lore.kernel.org/linux-cve-announce/2025100157-CVE-2022-50427-87b9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50428",
"url": "https://lore.kernel.org/linux-cve-announce/2025100157-CVE-2022-50428-0c76@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50429",
"url": "https://lore.kernel.org/linux-cve-announce/2025100157-CVE-2022-50429-4bc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50430",
"url": "https://lore.kernel.org/linux-cve-announce/2025100157-CVE-2022-50430-568d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50431",
"url": "https://lore.kernel.org/linux-cve-announce/2025100158-CVE-2022-50431-b165@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50432",
"url": "https://lore.kernel.org/linux-cve-announce/2025100158-CVE-2022-50432-bb35@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50433",
"url": "https://lore.kernel.org/linux-cve-announce/2025100158-CVE-2022-50433-440b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50434",
"url": "https://lore.kernel.org/linux-cve-announce/2025100159-CVE-2022-50434-e4db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50435",
"url": "https://lore.kernel.org/linux-cve-announce/2025100159-CVE-2022-50435-f6c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50436",
"url": "https://lore.kernel.org/linux-cve-announce/2025100159-CVE-2022-50436-ad37@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50437",
"url": "https://lore.kernel.org/linux-cve-announce/2025100100-CVE-2022-50437-440f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50438",
"url": "https://lore.kernel.org/linux-cve-announce/2025100100-CVE-2022-50438-1760@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50439",
"url": "https://lore.kernel.org/linux-cve-announce/2025100100-CVE-2022-50439-6054@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50440",
"url": "https://lore.kernel.org/linux-cve-announce/2025100101-CVE-2022-50440-1afd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50441",
"url": "https://lore.kernel.org/linux-cve-announce/2025100101-CVE-2022-50441-e2e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50442",
"url": "https://lore.kernel.org/linux-cve-announce/2025100101-CVE-2022-50442-c0fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50443",
"url": "https://lore.kernel.org/linux-cve-announce/2025100102-CVE-2022-50443-c1d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50444",
"url": "https://lore.kernel.org/linux-cve-announce/2025100102-CVE-2022-50444-9b11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50445",
"url": "https://lore.kernel.org/linux-cve-announce/2025100115-CVE-2022-50445-5873@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50446",
"url": "https://lore.kernel.org/linux-cve-announce/2025100115-CVE-2022-50446-94be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50447",
"url": "https://lore.kernel.org/linux-cve-announce/2025100115-CVE-2022-50447-4de6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50448",
"url": "https://lore.kernel.org/linux-cve-announce/2025100116-CVE-2022-50448-922e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50449",
"url": "https://lore.kernel.org/linux-cve-announce/2025100116-CVE-2022-50449-214c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50450",
"url": "https://lore.kernel.org/linux-cve-announce/2025100116-CVE-2022-50450-7ef7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50451",
"url": "https://lore.kernel.org/linux-cve-announce/2025100117-CVE-2022-50451-418f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50452",
"url": "https://lore.kernel.org/linux-cve-announce/2025100117-CVE-2022-50452-055d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50453",
"url": "https://lore.kernel.org/linux-cve-announce/2025100117-CVE-2022-50453-204a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50454",
"url": "https://lore.kernel.org/linux-cve-announce/2025100118-CVE-2022-50454-9c7d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50455",
"url": "https://lore.kernel.org/linux-cve-announce/2025100118-CVE-2022-50455-24fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50456",
"url": "https://lore.kernel.org/linux-cve-announce/2025100118-CVE-2022-50456-f0d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50457",
"url": "https://lore.kernel.org/linux-cve-announce/2025100118-CVE-2022-50457-da35@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50458",
"url": "https://lore.kernel.org/linux-cve-announce/2025100119-CVE-2022-50458-4fa8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50459",
"url": "https://lore.kernel.org/linux-cve-announce/2025100119-CVE-2022-50459-2340@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50460",
"url": "https://lore.kernel.org/linux-cve-announce/2025100119-CVE-2022-50460-2149@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50461",
"url": "https://lore.kernel.org/linux-cve-announce/2025100120-CVE-2022-50461-5ee8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50462",
"url": "https://lore.kernel.org/linux-cve-announce/2025100120-CVE-2022-50462-a935@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50463",
"url": "https://lore.kernel.org/linux-cve-announce/2025100120-CVE-2022-50463-9ae6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50464",
"url": "https://lore.kernel.org/linux-cve-announce/2025100121-CVE-2022-50464-3c96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50465",
"url": "https://lore.kernel.org/linux-cve-announce/2025100121-CVE-2022-50465-fb12@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50466",
"url": "https://lore.kernel.org/linux-cve-announce/2025100121-CVE-2022-50466-b59c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50467",
"url": "https://lore.kernel.org/linux-cve-announce/2025100122-CVE-2022-50467-13ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50468",
"url": "https://lore.kernel.org/linux-cve-announce/2025100122-CVE-2022-50468-3196@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50469",
"url": "https://lore.kernel.org/linux-cve-announce/2025100122-CVE-2022-50469-bbc4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53448",
"url": "https://lore.kernel.org/linux-cve-announce/2025100102-CVE-2023-53448-e125@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53449",
"url": "https://lore.kernel.org/linux-cve-announce/2025100103-CVE-2023-53449-b49f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53450",
"url": "https://lore.kernel.org/linux-cve-announce/2025100103-CVE-2023-53450-35c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53451",
"url": "https://lore.kernel.org/linux-cve-announce/2025100103-CVE-2023-53451-bb02@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53452",
"url": "https://lore.kernel.org/linux-cve-announce/2025100104-CVE-2023-53452-f6e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53453",
"url": "https://lore.kernel.org/linux-cve-announce/2025100104-CVE-2023-53453-c36d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53454",
"url": "https://lore.kernel.org/linux-cve-announce/2025100104-CVE-2023-53454-5ee6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53455",
"url": "https://lore.kernel.org/linux-cve-announce/2025100104-CVE-2023-53455-3efb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53456",
"url": "https://lore.kernel.org/linux-cve-announce/2025100105-CVE-2023-53456-b77a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53457",
"url": "https://lore.kernel.org/linux-cve-announce/2025100105-CVE-2023-53457-629a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53458",
"url": "https://lore.kernel.org/linux-cve-announce/2025100105-CVE-2023-53458-8239@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53459",
"url": "https://lore.kernel.org/linux-cve-announce/2025100106-CVE-2023-53459-48f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53460",
"url": "https://lore.kernel.org/linux-cve-announce/2025100106-CVE-2023-53460-cdc8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53461",
"url": "https://lore.kernel.org/linux-cve-announce/2025100106-CVE-2023-53461-b02b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53462",
"url": "https://lore.kernel.org/linux-cve-announce/2025100107-CVE-2023-53462-7a33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53463",
"url": "https://lore.kernel.org/linux-cve-announce/2025100107-CVE-2023-53463-49fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53464",
"url": "https://lore.kernel.org/linux-cve-announce/2025100107-CVE-2023-53464-a397@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53465",
"url": "https://lore.kernel.org/linux-cve-announce/2025100108-CVE-2023-53465-eb0b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53466",
"url": "https://lore.kernel.org/linux-cve-announce/2025100108-CVE-2023-53466-dcff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53467",
"url": "https://lore.kernel.org/linux-cve-announce/2025100108-CVE-2023-53467-fa4b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53468",
"url": "https://lore.kernel.org/linux-cve-announce/2025100109-CVE-2023-53468-8dea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53469",
"url": "https://lore.kernel.org/linux-cve-announce/2025100109-CVE-2023-53469-e372@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53470",
"url": "https://lore.kernel.org/linux-cve-announce/2025100109-CVE-2023-53470-8c6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53471",
"url": "https://lore.kernel.org/linux-cve-announce/2025100110-CVE-2023-53471-09f6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53472",
"url": "https://lore.kernel.org/linux-cve-announce/2025100110-CVE-2023-53472-93cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53473",
"url": "https://lore.kernel.org/linux-cve-announce/2025100110-CVE-2023-53473-bf5d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53474",
"url": "https://lore.kernel.org/linux-cve-announce/2025100110-CVE-2023-53474-b2ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53475",
"url": "https://lore.kernel.org/linux-cve-announce/2025100111-CVE-2023-53475-b007@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53476",
"url": "https://lore.kernel.org/linux-cve-announce/2025100111-CVE-2023-53476-d6d3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53477",
"url": "https://lore.kernel.org/linux-cve-announce/2025100111-CVE-2023-53477-93d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53478",
"url": "https://lore.kernel.org/linux-cve-announce/2025100112-CVE-2023-53478-3da0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53479",
"url": "https://lore.kernel.org/linux-cve-announce/2025100112-CVE-2023-53479-5c70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53480",
"url": "https://lore.kernel.org/linux-cve-announce/2025100112-CVE-2023-53480-95ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53481",
"url": "https://lore.kernel.org/linux-cve-announce/2025100113-CVE-2023-53481-cddb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53482",
"url": "https://lore.kernel.org/linux-cve-announce/2025100113-CVE-2023-53482-ade3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53483",
"url": "https://lore.kernel.org/linux-cve-announce/2025100113-CVE-2023-53483-cf50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53484",
"url": "https://lore.kernel.org/linux-cve-announce/2025100114-CVE-2023-53484-d863@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53485",
"url": "https://lore.kernel.org/linux-cve-announce/2025100114-CVE-2023-53485-672c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53486",
"url": "https://lore.kernel.org/linux-cve-announce/2025100114-CVE-2023-53486-455f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53487",
"url": "https://lore.kernel.org/linux-cve-announce/2025100115-CVE-2023-53487-c3f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53488",
"url": "https://lore.kernel.org/linux-cve-announce/2025100123-CVE-2023-53488-2533@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53489",
"url": "https://lore.kernel.org/linux-cve-announce/2025100123-CVE-2023-53489-eec5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53490",
"url": "https://lore.kernel.org/linux-cve-announce/2025100123-CVE-2023-53490-c90f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53491",
"url": "https://lore.kernel.org/linux-cve-announce/2025100123-CVE-2023-53491-2d8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53492",
"url": "https://lore.kernel.org/linux-cve-announce/2025100124-CVE-2023-53492-18fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53493",
"url": "https://lore.kernel.org/linux-cve-announce/2025100124-CVE-2023-53493-ef00@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53494",
"url": "https://lore.kernel.org/linux-cve-announce/2025100124-CVE-2023-53494-6542@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53495",
"url": "https://lore.kernel.org/linux-cve-announce/2025100125-CVE-2023-53495-3cce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53496",
"url": "https://lore.kernel.org/linux-cve-announce/2025100125-CVE-2023-53496-b145@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53497",
"url": "https://lore.kernel.org/linux-cve-announce/2025100125-CVE-2023-53497-e3a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53498",
"url": "https://lore.kernel.org/linux-cve-announce/2025100126-CVE-2023-53498-3f4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53499",
"url": "https://lore.kernel.org/linux-cve-announce/2025100126-CVE-2023-53499-0e6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53500",
"url": "https://lore.kernel.org/linux-cve-announce/2025100126-CVE-2023-53500-61b6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53501",
"url": "https://lore.kernel.org/linux-cve-announce/2025100127-CVE-2023-53501-5859@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53502",
"url": "https://lore.kernel.org/linux-cve-announce/2025100127-CVE-2023-53502-aa6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53503",
"url": "https://lore.kernel.org/linux-cve-announce/2025100127-CVE-2023-53503-d86c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53504",
"url": "https://lore.kernel.org/linux-cve-announce/2025100128-CVE-2023-53504-ccc8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53505",
"url": "https://lore.kernel.org/linux-cve-announce/2025100128-CVE-2023-53505-69f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53506",
"url": "https://lore.kernel.org/linux-cve-announce/2025100128-CVE-2023-53506-2778@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53507",
"url": "https://lore.kernel.org/linux-cve-announce/2025100129-CVE-2023-53507-1165@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53508",
"url": "https://lore.kernel.org/linux-cve-announce/2025100129-CVE-2023-53508-20d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53509",
"url": "https://lore.kernel.org/linux-cve-announce/2025100129-CVE-2023-53509-2b4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53510",
"url": "https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53510-9e6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53511",
"url": "https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53511-99e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53512",
"url": "https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53512-10c7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53513",
"url": "https://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53513-4667@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53514",
"url": "https://lore.kernel.org/linux-cve-announce/2025100131-CVE-2023-53514-bcd5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53515",
"url": "https://lore.kernel.org/linux-cve-announce/2025100131-CVE-2023-53515-abe8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53516",
"url": "https://lore.kernel.org/linux-cve-announce/2025100131-CVE-2023-53516-ca63@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53517",
"url": "https://lore.kernel.org/linux-cve-announce/2025100132-CVE-2023-53517-da77@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53518",
"url": "https://lore.kernel.org/linux-cve-announce/2025100132-CVE-2023-53518-64e1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53519",
"url": "https://lore.kernel.org/linux-cve-announce/2025100132-CVE-2023-53519-de9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53520",
"url": "https://lore.kernel.org/linux-cve-announce/2025100133-CVE-2023-53520-a542@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53521",
"url": "https://lore.kernel.org/linux-cve-announce/2025100133-CVE-2023-53521-15e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53522",
"url": "https://lore.kernel.org/linux-cve-announce/2025100133-CVE-2023-53522-4e19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53523",
"url": "https://lore.kernel.org/linux-cve-announce/2025100134-CVE-2023-53523-f4d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53524",
"url": "https://lore.kernel.org/linux-cve-announce/2025100134-CVE-2023-53524-d438@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53525",
"url": "https://lore.kernel.org/linux-cve-announce/2025100134-CVE-2023-53525-ee57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53526",
"url": "https://lore.kernel.org/linux-cve-announce/2025100135-CVE-2023-53526-ee71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53527",
"url": "https://lore.kernel.org/linux-cve-announce/2025100135-CVE-2023-53527-3ce7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53528",
"url": "https://lore.kernel.org/linux-cve-announce/2025100135-CVE-2023-53528-0572@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53529",
"url": "https://lore.kernel.org/linux-cve-announce/2025100136-CVE-2023-53529-db9a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53530",
"url": "https://lore.kernel.org/linux-cve-announce/2025100136-CVE-2023-53530-853b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53531",
"url": "https://lore.kernel.org/linux-cve-announce/2025100136-CVE-2023-53531-3c7c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53532",
"url": "https://lore.kernel.org/linux-cve-announce/2025100137-CVE-2023-53532-1627@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-281 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-281.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-273 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-273.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-272 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-272.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-274 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-274.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-109 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-109.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-271 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-271.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-113 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-113.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3053 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3053.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-280 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-280.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-275 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-275.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-276 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-276.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-282 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-282.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-279 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-279.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-278 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-278.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-277 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-277.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19409 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19409"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19409 vom 2025-11-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-19409.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21051 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21051"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21091 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21091"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21128 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21128"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21112 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21112"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21136 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21136"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4111-1 vom 2025-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4135-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21760 vom 2025-11-19",
"url": "https://access.redhat.com/errata/RHSA-2025:21760"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4139-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4149-1 vom 2025-11-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4188-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVPUJWNDCBFGM2O2EFX4S5QBPKDARVQ7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4213-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BMIF3SMKFBUMCZYFRUM2RM62ZVJXJF7B/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4203-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VT2ZCGNR6WCCH4AKUSKN3OANW5W3U3LW/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22095 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22095"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22124 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22124"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21926 vom 2025-11-26",
"url": "http://linux.oracle.com/errata/ELSA-2025-21926.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21112 vom 2025-11-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-21112.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21469 vom 2025-11-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-21469.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4285-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023421.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22387 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22387"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22388 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22388"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22388 vom 2025-12-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-22388.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22387 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22387"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22388 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22388"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4320-1 vom 2025-12-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23424 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23424"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23426 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23426"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2025-12-16T23:00:00.000+00:00",
"generator": {
"date": "2025-12-17T09:45:46.490+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2187",
"initial_release_date": "2025-10-01T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-02T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-20T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "28"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-4460",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2021-4460"
},
{
"cve": "CVE-2022-50420",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50420"
},
{
"cve": "CVE-2022-50421",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50421"
},
{
"cve": "CVE-2022-50422",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50422"
},
{
"cve": "CVE-2022-50423",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50423"
},
{
"cve": "CVE-2022-50424",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50424"
},
{
"cve": "CVE-2022-50425",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50425"
},
{
"cve": "CVE-2022-50426",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50426"
},
{
"cve": "CVE-2022-50427",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50427"
},
{
"cve": "CVE-2022-50428",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50428"
},
{
"cve": "CVE-2022-50429",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50429"
},
{
"cve": "CVE-2022-50430",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50430"
},
{
"cve": "CVE-2022-50431",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50431"
},
{
"cve": "CVE-2022-50432",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50432"
},
{
"cve": "CVE-2022-50433",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50433"
},
{
"cve": "CVE-2022-50434",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50434"
},
{
"cve": "CVE-2022-50435",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50435"
},
{
"cve": "CVE-2022-50436",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50436"
},
{
"cve": "CVE-2022-50437",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50437"
},
{
"cve": "CVE-2022-50438",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50438"
},
{
"cve": "CVE-2022-50439",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50439"
},
{
"cve": "CVE-2022-50440",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50440"
},
{
"cve": "CVE-2022-50441",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50441"
},
{
"cve": "CVE-2022-50442",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50442"
},
{
"cve": "CVE-2022-50443",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50443"
},
{
"cve": "CVE-2022-50444",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50444"
},
{
"cve": "CVE-2022-50445",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50445"
},
{
"cve": "CVE-2022-50446",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50446"
},
{
"cve": "CVE-2022-50447",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50447"
},
{
"cve": "CVE-2022-50448",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50448"
},
{
"cve": "CVE-2022-50449",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50449"
},
{
"cve": "CVE-2022-50450",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50450"
},
{
"cve": "CVE-2022-50451",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50451"
},
{
"cve": "CVE-2022-50452",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50452"
},
{
"cve": "CVE-2022-50453",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50453"
},
{
"cve": "CVE-2022-50454",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50454"
},
{
"cve": "CVE-2022-50455",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50455"
},
{
"cve": "CVE-2022-50456",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50456"
},
{
"cve": "CVE-2022-50457",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50457"
},
{
"cve": "CVE-2022-50458",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50458"
},
{
"cve": "CVE-2022-50459",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50459"
},
{
"cve": "CVE-2022-50460",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50460"
},
{
"cve": "CVE-2022-50461",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50461"
},
{
"cve": "CVE-2022-50462",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50462"
},
{
"cve": "CVE-2022-50463",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50463"
},
{
"cve": "CVE-2022-50464",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50464"
},
{
"cve": "CVE-2022-50465",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50465"
},
{
"cve": "CVE-2022-50466",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50466"
},
{
"cve": "CVE-2022-50467",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50467"
},
{
"cve": "CVE-2022-50468",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50468"
},
{
"cve": "CVE-2022-50469",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2022-50469"
},
{
"cve": "CVE-2023-34319",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-34319"
},
{
"cve": "CVE-2023-3773",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-3773"
},
{
"cve": "CVE-2023-53448",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53448"
},
{
"cve": "CVE-2023-53449",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53449"
},
{
"cve": "CVE-2023-53450",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53450"
},
{
"cve": "CVE-2023-53451",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53451"
},
{
"cve": "CVE-2023-53452",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53452"
},
{
"cve": "CVE-2023-53453",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53453"
},
{
"cve": "CVE-2023-53454",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53454"
},
{
"cve": "CVE-2023-53455",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53455"
},
{
"cve": "CVE-2023-53456",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53456"
},
{
"cve": "CVE-2023-53457",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53457"
},
{
"cve": "CVE-2023-53458",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53458"
},
{
"cve": "CVE-2023-53459",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53459"
},
{
"cve": "CVE-2023-53460",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53460"
},
{
"cve": "CVE-2023-53461",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53461"
},
{
"cve": "CVE-2023-53462",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53462"
},
{
"cve": "CVE-2023-53463",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53463"
},
{
"cve": "CVE-2023-53464",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53464"
},
{
"cve": "CVE-2023-53465",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53465"
},
{
"cve": "CVE-2023-53466",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53466"
},
{
"cve": "CVE-2023-53467",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53467"
},
{
"cve": "CVE-2023-53468",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53468"
},
{
"cve": "CVE-2023-53469",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53469"
},
{
"cve": "CVE-2023-53470",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53470"
},
{
"cve": "CVE-2023-53471",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53471"
},
{
"cve": "CVE-2023-53472",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53472"
},
{
"cve": "CVE-2023-53473",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53473"
},
{
"cve": "CVE-2023-53474",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53474"
},
{
"cve": "CVE-2023-53475",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53475"
},
{
"cve": "CVE-2023-53476",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53476"
},
{
"cve": "CVE-2023-53477",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53477"
},
{
"cve": "CVE-2023-53478",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53478"
},
{
"cve": "CVE-2023-53479",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53479"
},
{
"cve": "CVE-2023-53480",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53480"
},
{
"cve": "CVE-2023-53481",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53481"
},
{
"cve": "CVE-2023-53482",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53482"
},
{
"cve": "CVE-2023-53483",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53483"
},
{
"cve": "CVE-2023-53484",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53484"
},
{
"cve": "CVE-2023-53485",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53485"
},
{
"cve": "CVE-2023-53486",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53486"
},
{
"cve": "CVE-2023-53487",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53487"
},
{
"cve": "CVE-2023-53488",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53488"
},
{
"cve": "CVE-2023-53489",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53489"
},
{
"cve": "CVE-2023-53490",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53490"
},
{
"cve": "CVE-2023-53491",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53491"
},
{
"cve": "CVE-2023-53492",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53492"
},
{
"cve": "CVE-2023-53493",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53493"
},
{
"cve": "CVE-2023-53494",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53494"
},
{
"cve": "CVE-2023-53495",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53495"
},
{
"cve": "CVE-2023-53496",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53496"
},
{
"cve": "CVE-2023-53497",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53497"
},
{
"cve": "CVE-2023-53498",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53498"
},
{
"cve": "CVE-2023-53499",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53499"
},
{
"cve": "CVE-2023-53500",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53500"
},
{
"cve": "CVE-2023-53501",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53501"
},
{
"cve": "CVE-2023-53502",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53502"
},
{
"cve": "CVE-2023-53503",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53503"
},
{
"cve": "CVE-2023-53504",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53504"
},
{
"cve": "CVE-2023-53505",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53505"
},
{
"cve": "CVE-2023-53506",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53506"
},
{
"cve": "CVE-2023-53507",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53507"
},
{
"cve": "CVE-2023-53508",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53508"
},
{
"cve": "CVE-2023-53509",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53509"
},
{
"cve": "CVE-2023-53510",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53510"
},
{
"cve": "CVE-2023-53511",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53511"
},
{
"cve": "CVE-2023-53512",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53512"
},
{
"cve": "CVE-2023-53513",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53513"
},
{
"cve": "CVE-2023-53514",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53514"
},
{
"cve": "CVE-2023-53515",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53515"
},
{
"cve": "CVE-2023-53516",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53516"
},
{
"cve": "CVE-2023-53517",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53517"
},
{
"cve": "CVE-2023-53518",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53518"
},
{
"cve": "CVE-2023-53519",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53519"
},
{
"cve": "CVE-2023-53520",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53520"
},
{
"cve": "CVE-2023-53521",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53521"
},
{
"cve": "CVE-2023-53522",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53522"
},
{
"cve": "CVE-2023-53523",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53523"
},
{
"cve": "CVE-2023-53524",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53524"
},
{
"cve": "CVE-2023-53525",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53525"
},
{
"cve": "CVE-2023-53526",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53526"
},
{
"cve": "CVE-2023-53527",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53527"
},
{
"cve": "CVE-2023-53528",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53528"
},
{
"cve": "CVE-2023-53529",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53529"
},
{
"cve": "CVE-2023-53530",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53530"
},
{
"cve": "CVE-2023-53531",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53531"
},
{
"cve": "CVE-2023-53532",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"398363",
"T004914",
"T032255",
"T048301"
]
},
"release_date": "2025-10-01T22:00:00.000+00:00",
"title": "CVE-2023-53532"
}
]
}
MSRC_CVE-2023-53469
Vulnerability from csaf_microsoft - Published: 2025-10-02 00:00 - Updated: 2025-10-02 01:07Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-53469 af_unix: Fix null-ptr-deref in unix_stream_sendpage(). - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2023-53469.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "af_unix: Fix null-ptr-deref in unix_stream_sendpage().",
"tracking": {
"current_release_date": "2025-10-02T01:07:32.000Z",
"generator": {
"date": "2025-10-22T22:49:11.231Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-53469",
"initial_release_date": "2025-10-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-10-02T01:07:32.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 kernel 6.6.96.2-2",
"product": {
"name": "azl3 kernel 6.6.96.2-2",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.96.2-2 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-53469",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-53469 af_unix: Fix null-ptr-deref in unix_stream_sendpage(). - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2023-53469.json"
}
],
"title": "af_unix: Fix null-ptr-deref in unix_stream_sendpage()."
}
]
}
FKIE_CVE-2023-53469
Vulnerability from fkie_nvd - Published: 2025-10-01 12:15 - Updated: 2025-12-29 16:15| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"id": "CVE-2023-53469",
"lastModified": "2025-12-29T16:15:39.987",
"metrics": {},
"published": "2025-10-01T12:15:48.973",
"references": [],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Rejected"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.