Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53720 (GCVE-0-2023-53720)
Vulnerability from cvelistv5 – Published: 2025-10-22 13:23 – Updated: 2025-10-22 13:23{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/mellanox/mlx5/core/en/tc_ct.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "3db903a71f1f4bbf30baae166a4a49f2e8aceb61",
"status": "affected",
"version": "94ceffb48eac7692677d8093dcde6965b70c4b35",
"versionType": "git"
},
{
"lessThan": "8ac04a28144cfa89b61be518268233742c23d88d",
"status": "affected",
"version": "94ceffb48eac7692677d8093dcde6965b70c4b35",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/mellanox/mlx5/core/en/tc_ct.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.3"
},
{
"lessThan": "6.3",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.3.*",
"status": "unaffected",
"version": "6.3.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.4",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.2",
"versionStartIncluding": "6.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4",
"versionStartIncluding": "6.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Release the label when replacing existing ct entry\n\nCited commit doesn\u0027t release the label mapping when replacing existing ct\nentry which leads to following memleak report:\n\nunreferenced object 0xffff8881854cf280 (size 96):\n comm \"kworker/u48:74\", pid 23093, jiffies 4296664564 (age 175.944s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c000000002722d368\u003e] __kmalloc+0x4b/0x1c0\n [\u003c00000000cc44e18f\u003e] mapping_add+0x6e8/0xc90 [mlx5_core]\n [\u003c000000003ad942a7\u003e] mlx5_get_label_mapping+0x66/0xe0 [mlx5_core]\n [\u003c00000000266308ac\u003e] mlx5_tc_ct_entry_create_mod_hdr+0x1c4/0xf50 [mlx5_core]\n [\u003c000000009a768b4f\u003e] mlx5_tc_ct_entry_add_rule+0x16f/0xaf0 [mlx5_core]\n [\u003c00000000a178f3e5\u003e] mlx5_tc_ct_block_flow_offload_add+0x10cb/0x1f90 [mlx5_core]\n [\u003c000000007b46c496\u003e] mlx5_tc_ct_block_flow_offload+0x14a/0x630 [mlx5_core]\n [\u003c00000000a9a18ac5\u003e] nf_flow_offload_tuple+0x1a3/0x390 [nf_flow_table]\n [\u003c00000000d0881951\u003e] flow_offload_work_handler+0x257/0xd30 [nf_flow_table]\n [\u003c000000009e4935a4\u003e] process_one_work+0x7c2/0x13e0\n [\u003c00000000f5cd36a7\u003e] worker_thread+0x59d/0xec0\n [\u003c00000000baed1daf\u003e] kthread+0x28f/0x330\n [\u003c0000000063d282a4\u003e] ret_from_fork+0x1f/0x30\n\nFix the issue by correctly releasing the label mapping."
}
],
"providerMetadata": {
"dateUpdated": "2025-10-22T13:23:52.123Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/3db903a71f1f4bbf30baae166a4a49f2e8aceb61"
},
{
"url": "https://git.kernel.org/stable/c/8ac04a28144cfa89b61be518268233742c23d88d"
}
],
"title": "net/mlx5e: Release the label when replacing existing ct entry",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-53720",
"datePublished": "2025-10-22T13:23:52.123Z",
"dateReserved": "2025-10-22T13:21:37.347Z",
"dateUpdated": "2025-10-22T13:23:52.123Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-53720\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-22T14:15:46.700\",\"lastModified\":\"2025-10-22T21:12:48.953\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet/mlx5e: Release the label when replacing existing ct entry\\n\\nCited commit doesn\u0027t release the label mapping when replacing existing ct\\nentry which leads to following memleak report:\\n\\nunreferenced object 0xffff8881854cf280 (size 96):\\n comm \\\"kworker/u48:74\\\", pid 23093, jiffies 4296664564 (age 175.944s)\\n hex dump (first 32 bytes):\\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\\n backtrace:\\n [\u003c000000002722d368\u003e] __kmalloc+0x4b/0x1c0\\n [\u003c00000000cc44e18f\u003e] mapping_add+0x6e8/0xc90 [mlx5_core]\\n [\u003c000000003ad942a7\u003e] mlx5_get_label_mapping+0x66/0xe0 [mlx5_core]\\n [\u003c00000000266308ac\u003e] mlx5_tc_ct_entry_create_mod_hdr+0x1c4/0xf50 [mlx5_core]\\n [\u003c000000009a768b4f\u003e] mlx5_tc_ct_entry_add_rule+0x16f/0xaf0 [mlx5_core]\\n [\u003c00000000a178f3e5\u003e] mlx5_tc_ct_block_flow_offload_add+0x10cb/0x1f90 [mlx5_core]\\n [\u003c000000007b46c496\u003e] mlx5_tc_ct_block_flow_offload+0x14a/0x630 [mlx5_core]\\n [\u003c00000000a9a18ac5\u003e] nf_flow_offload_tuple+0x1a3/0x390 [nf_flow_table]\\n [\u003c00000000d0881951\u003e] flow_offload_work_handler+0x257/0xd30 [nf_flow_table]\\n [\u003c000000009e4935a4\u003e] process_one_work+0x7c2/0x13e0\\n [\u003c00000000f5cd36a7\u003e] worker_thread+0x59d/0xec0\\n [\u003c00000000baed1daf\u003e] kthread+0x28f/0x330\\n [\u003c0000000063d282a4\u003e] ret_from_fork+0x1f/0x30\\n\\nFix the issue by correctly releasing the label mapping.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3db903a71f1f4bbf30baae166a4a49f2e8aceb61\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8ac04a28144cfa89b61be518268233742c23d88d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
GHSA-2Q63-477W-QCV2
Vulnerability from github – Published: 2025-10-22 15:31 – Updated: 2025-10-22 15:31In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Release the label when replacing existing ct entry
Cited commit doesn't release the label mapping when replacing existing ct entry which leads to following memleak report:
unreferenced object 0xffff8881854cf280 (size 96): comm "kworker/u48:74", pid 23093, jiffies 4296664564 (age 175.944s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000002722d368>] __kmalloc+0x4b/0x1c0 [<00000000cc44e18f>] mapping_add+0x6e8/0xc90 [mlx5_core] [<000000003ad942a7>] mlx5_get_label_mapping+0x66/0xe0 [mlx5_core] [<00000000266308ac>] mlx5_tc_ct_entry_create_mod_hdr+0x1c4/0xf50 [mlx5_core] [<000000009a768b4f>] mlx5_tc_ct_entry_add_rule+0x16f/0xaf0 [mlx5_core] [<00000000a178f3e5>] mlx5_tc_ct_block_flow_offload_add+0x10cb/0x1f90 [mlx5_core] [<000000007b46c496>] mlx5_tc_ct_block_flow_offload+0x14a/0x630 [mlx5_core] [<00000000a9a18ac5>] nf_flow_offload_tuple+0x1a3/0x390 [nf_flow_table] [<00000000d0881951>] flow_offload_work_handler+0x257/0xd30 [nf_flow_table] [<000000009e4935a4>] process_one_work+0x7c2/0x13e0 [<00000000f5cd36a7>] worker_thread+0x59d/0xec0 [<00000000baed1daf>] kthread+0x28f/0x330 [<0000000063d282a4>] ret_from_fork+0x1f/0x30
Fix the issue by correctly releasing the label mapping.
{
"affected": [],
"aliases": [
"CVE-2023-53720"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-22T14:15:46Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Release the label when replacing existing ct entry\n\nCited commit doesn\u0027t release the label mapping when replacing existing ct\nentry which leads to following memleak report:\n\nunreferenced object 0xffff8881854cf280 (size 96):\n comm \"kworker/u48:74\", pid 23093, jiffies 4296664564 (age 175.944s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c000000002722d368\u003e] __kmalloc+0x4b/0x1c0\n [\u003c00000000cc44e18f\u003e] mapping_add+0x6e8/0xc90 [mlx5_core]\n [\u003c000000003ad942a7\u003e] mlx5_get_label_mapping+0x66/0xe0 [mlx5_core]\n [\u003c00000000266308ac\u003e] mlx5_tc_ct_entry_create_mod_hdr+0x1c4/0xf50 [mlx5_core]\n [\u003c000000009a768b4f\u003e] mlx5_tc_ct_entry_add_rule+0x16f/0xaf0 [mlx5_core]\n [\u003c00000000a178f3e5\u003e] mlx5_tc_ct_block_flow_offload_add+0x10cb/0x1f90 [mlx5_core]\n [\u003c000000007b46c496\u003e] mlx5_tc_ct_block_flow_offload+0x14a/0x630 [mlx5_core]\n [\u003c00000000a9a18ac5\u003e] nf_flow_offload_tuple+0x1a3/0x390 [nf_flow_table]\n [\u003c00000000d0881951\u003e] flow_offload_work_handler+0x257/0xd30 [nf_flow_table]\n [\u003c000000009e4935a4\u003e] process_one_work+0x7c2/0x13e0\n [\u003c00000000f5cd36a7\u003e] worker_thread+0x59d/0xec0\n [\u003c00000000baed1daf\u003e] kthread+0x28f/0x330\n [\u003c0000000063d282a4\u003e] ret_from_fork+0x1f/0x30\n\nFix the issue by correctly releasing the label mapping.",
"id": "GHSA-2q63-477w-qcv2",
"modified": "2025-10-22T15:31:11Z",
"published": "2025-10-22T15:31:11Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53720"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/3db903a71f1f4bbf30baae166a4a49f2e8aceb61"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/8ac04a28144cfa89b61be518268233742c23d88d"
}
],
"schema_version": "1.4.0",
"severity": []
}
WID-SEC-W-2025-2394
Vulnerability from csaf_certbund - Published: 2025-10-22 22:00 - Updated: 2026-03-04 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff oder andere, nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2394 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2394.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2394 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2394"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50556",
"url": "https://lore.kernel.org/linux-cve-announce/2025102203-CVE-2022-50556-bbe2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50557",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50557-7adc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50558",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50558-444f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50559",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50559-e162@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50560",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50560-bf0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50561",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50561-3b76@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50562",
"url": "https://lore.kernel.org/linux-cve-announce/2025102206-CVE-2022-50562-5b54@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50563",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50563-995f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50564",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50564-c6eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50565",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50565-ddc2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50566",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50566-9cd3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50567",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50567-17f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50568",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50568-f109@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50569",
"url": "https://lore.kernel.org/linux-cve-announce/2025102207-CVE-2022-50569-fdd1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50570",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50570-38e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50571",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50571-00cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50572",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50572-dbfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50573",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50573-e131@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50574",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50574-da86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50575",
"url": "https://lore.kernel.org/linux-cve-announce/2025102208-CVE-2022-50575-1768@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50576",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50576-98f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50577",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50577-ebe1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50578",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50578-eb90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50579",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50579-0f47@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50580",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50580-68e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50581",
"url": "https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50581-cb39@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50582",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2022-50582-1ac9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53692",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2023-53692-be2d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53693",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2023-53693-57fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53694",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2023-53694-ed6b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53695",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2023-53695-f553@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53696",
"url": "https://lore.kernel.org/linux-cve-announce/2025102210-CVE-2023-53696-dadf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53697",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53697-3078@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53698",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53698-c1f4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53699",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53699-44cc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53700",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53700-9753@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53701",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53701-fb7f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53702",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53702-a6b6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53703",
"url": "https://lore.kernel.org/linux-cve-announce/2025102211-CVE-2023-53703-7813@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53704",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53704-9f42@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53705",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53705-38d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53706",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53706-18d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53707",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53707-361a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53708",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53708-0bf0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53709",
"url": "https://lore.kernel.org/linux-cve-announce/2025102212-CVE-2023-53709-553a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53710",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53710-68d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53711",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53711-24c6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53712",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53712-b88e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53713",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53713-550a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53714",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53714-6b41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53715",
"url": "https://lore.kernel.org/linux-cve-announce/2025102213-CVE-2023-53715-fd47@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53716",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53716-4265@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53717",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53717-e88c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53718",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53718-9142@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53719",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53719-ad4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53720",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53720-da5a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53721",
"url": "https://lore.kernel.org/linux-cve-announce/2025102214-CVE-2023-53721-f0ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53722",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53722-f3ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53723",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53723-8e9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53724",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53724-4549@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53725",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53725-0343@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53726",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53726-29cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53727",
"url": "https://lore.kernel.org/linux-cve-announce/2025102215-CVE-2023-53727-73d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53728",
"url": "https://lore.kernel.org/linux-cve-announce/2025102216-CVE-2023-53728-b851@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53729",
"url": "https://lore.kernel.org/linux-cve-announce/2025102216-CVE-2023-53729-ef1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53730",
"url": "https://lore.kernel.org/linux-cve-announce/2025102216-CVE-2023-53730-d257@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53731",
"url": "https://lore.kernel.org/linux-cve-announce/2025102216-CVE-2023-53731-aef7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53732",
"url": "https://lore.kernel.org/linux-cve-announce/2025102216-CVE-2023-53732-f3ee@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4111-1 vom 2025-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4135-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4139-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4149-1 vom 2025-11-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4188-1 vom 2025-11-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVPUJWNDCBFGM2O2EFX4S5QBPKDARVQ7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21052-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023389.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21056-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21064-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21040-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4301-1 vom 2025-11-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLIMXFMWOGTFRJZEC4XPGIMNBCRKQ7IF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4315-1 vom 2025-12-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4320-1 vom 2025-12-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4515-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4530-1 vom 2025-12-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZJXHV4TJM3LRAHWS7AE4LY344HKKW3D/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4530-1 vom 2025-12-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0032-1 vom 2026-01-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0532 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0532"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0533 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0533"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0537 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0537"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0576 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0576"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0754 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0754"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0755 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0755"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0155-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0154-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0200-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1441 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1441"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1443 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1443"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1442 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1442"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1512 vom 2026-01-28",
"url": "https://access.redhat.com/errata/RHSA-2026:1512"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-030 vom 2026-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0471-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20317-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20333-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0755 vom 2026-02-18",
"url": "https://linux.oracle.com/errata/ELSA-2026-0755.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1581 vom 2026-03-04",
"url": "https://linux.oracle.com/errata/ELSA-2026-1581.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-04T23:00:00.000+00:00",
"generator": {
"date": "2026-03-05T08:37:19.627+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2394",
"initial_release_date": "2025-10-22T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-20T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-29T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "29"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vProxy \u003c19.14",
"product": {
"name": "Dell NetWorker vProxy \u003c19.14",
"product_id": "T050451"
}
},
{
"category": "product_version",
"name": "vProxy 19.14",
"product": {
"name": "Dell NetWorker vProxy 19.14",
"product_id": "T050451-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.14"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T048085",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50556",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50556"
},
{
"cve": "CVE-2022-50557",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50557"
},
{
"cve": "CVE-2022-50558",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50558"
},
{
"cve": "CVE-2022-50559",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50559"
},
{
"cve": "CVE-2022-50560",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50560"
},
{
"cve": "CVE-2022-50561",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50561"
},
{
"cve": "CVE-2022-50562",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50562"
},
{
"cve": "CVE-2022-50563",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50563"
},
{
"cve": "CVE-2022-50564",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50564"
},
{
"cve": "CVE-2022-50565",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50565"
},
{
"cve": "CVE-2022-50566",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50566"
},
{
"cve": "CVE-2022-50567",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50567"
},
{
"cve": "CVE-2022-50568",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50568"
},
{
"cve": "CVE-2022-50569",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50569"
},
{
"cve": "CVE-2022-50570",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50570"
},
{
"cve": "CVE-2022-50571",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50571"
},
{
"cve": "CVE-2022-50572",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50572"
},
{
"cve": "CVE-2022-50573",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50573"
},
{
"cve": "CVE-2022-50574",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50574"
},
{
"cve": "CVE-2022-50575",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50575"
},
{
"cve": "CVE-2022-50576",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50576"
},
{
"cve": "CVE-2022-50577",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50577"
},
{
"cve": "CVE-2022-50578",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50578"
},
{
"cve": "CVE-2022-50579",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50579"
},
{
"cve": "CVE-2022-50580",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50580"
},
{
"cve": "CVE-2022-50581",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50581"
},
{
"cve": "CVE-2022-50582",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2022-50582"
},
{
"cve": "CVE-2023-53692",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53692"
},
{
"cve": "CVE-2023-53693",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53693"
},
{
"cve": "CVE-2023-53694",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53694"
},
{
"cve": "CVE-2023-53695",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53695"
},
{
"cve": "CVE-2023-53696",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53696"
},
{
"cve": "CVE-2023-53697",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53697"
},
{
"cve": "CVE-2023-53698",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53698"
},
{
"cve": "CVE-2023-53699",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53699"
},
{
"cve": "CVE-2023-53700",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53700"
},
{
"cve": "CVE-2023-53701",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53701"
},
{
"cve": "CVE-2023-53702",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53702"
},
{
"cve": "CVE-2023-53703",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53703"
},
{
"cve": "CVE-2023-53704",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53704"
},
{
"cve": "CVE-2023-53705",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53705"
},
{
"cve": "CVE-2023-53706",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53706"
},
{
"cve": "CVE-2023-53707",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53707"
},
{
"cve": "CVE-2023-53708",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53708"
},
{
"cve": "CVE-2023-53709",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53709"
},
{
"cve": "CVE-2023-53710",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53710"
},
{
"cve": "CVE-2023-53711",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53711"
},
{
"cve": "CVE-2023-53712",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53712"
},
{
"cve": "CVE-2023-53713",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53713"
},
{
"cve": "CVE-2023-53714",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53714"
},
{
"cve": "CVE-2023-53715",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53715"
},
{
"cve": "CVE-2023-53716",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53716"
},
{
"cve": "CVE-2023-53717",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53717"
},
{
"cve": "CVE-2023-53718",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53718"
},
{
"cve": "CVE-2023-53719",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53719"
},
{
"cve": "CVE-2023-53720",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53720"
},
{
"cve": "CVE-2023-53721",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53721"
},
{
"cve": "CVE-2023-53722",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53722"
},
{
"cve": "CVE-2023-53723",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53723"
},
{
"cve": "CVE-2023-53724",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53724"
},
{
"cve": "CVE-2023-53725",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53725"
},
{
"cve": "CVE-2023-53726",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53726"
},
{
"cve": "CVE-2023-53727",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53727"
},
{
"cve": "CVE-2023-53728",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53728"
},
{
"cve": "CVE-2023-53729",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53729"
},
{
"cve": "CVE-2023-53730",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53730"
},
{
"cve": "CVE-2023-53731",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53731"
},
{
"cve": "CVE-2023-53732",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T048085",
"T004914",
"T050451"
]
},
"release_date": "2025-10-22T22:00:00.000+00:00",
"title": "CVE-2023-53732"
}
]
}
FKIE_CVE-2023-53720
Vulnerability from fkie_nvd - Published: 2025-10-22 14:15 - Updated: 2025-10-22 21:12| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Release the label when replacing existing ct entry\n\nCited commit doesn\u0027t release the label mapping when replacing existing ct\nentry which leads to following memleak report:\n\nunreferenced object 0xffff8881854cf280 (size 96):\n comm \"kworker/u48:74\", pid 23093, jiffies 4296664564 (age 175.944s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [\u003c000000002722d368\u003e] __kmalloc+0x4b/0x1c0\n [\u003c00000000cc44e18f\u003e] mapping_add+0x6e8/0xc90 [mlx5_core]\n [\u003c000000003ad942a7\u003e] mlx5_get_label_mapping+0x66/0xe0 [mlx5_core]\n [\u003c00000000266308ac\u003e] mlx5_tc_ct_entry_create_mod_hdr+0x1c4/0xf50 [mlx5_core]\n [\u003c000000009a768b4f\u003e] mlx5_tc_ct_entry_add_rule+0x16f/0xaf0 [mlx5_core]\n [\u003c00000000a178f3e5\u003e] mlx5_tc_ct_block_flow_offload_add+0x10cb/0x1f90 [mlx5_core]\n [\u003c000000007b46c496\u003e] mlx5_tc_ct_block_flow_offload+0x14a/0x630 [mlx5_core]\n [\u003c00000000a9a18ac5\u003e] nf_flow_offload_tuple+0x1a3/0x390 [nf_flow_table]\n [\u003c00000000d0881951\u003e] flow_offload_work_handler+0x257/0xd30 [nf_flow_table]\n [\u003c000000009e4935a4\u003e] process_one_work+0x7c2/0x13e0\n [\u003c00000000f5cd36a7\u003e] worker_thread+0x59d/0xec0\n [\u003c00000000baed1daf\u003e] kthread+0x28f/0x330\n [\u003c0000000063d282a4\u003e] ret_from_fork+0x1f/0x30\n\nFix the issue by correctly releasing the label mapping."
}
],
"id": "CVE-2023-53720",
"lastModified": "2025-10-22T21:12:48.953",
"metrics": {},
"published": "2025-10-22T14:15:46.700",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/3db903a71f1f4bbf30baae166a4a49f2e8aceb61"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/8ac04a28144cfa89b61be518268233742c23d88d"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.