Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53208 (GCVE-0-2023-53208)
Vulnerability from cvelistv5
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "arch/x86/kvm/svm/nested.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "5b2b0535fa7adee7e295fed0a3095082131a8d05", "status": "affected", "version": "5228eb96a4875f8cf5d61d486e3795ac14df8904", "versionType": "git" }, { "lessThan": "e91c07f6cf7060d2acb3aeee31a6baebe3773d3f", "status": "affected", "version": "5228eb96a4875f8cf5d61d486e3795ac14df8904", "versionType": "git" }, { "lessThan": "0c94e2468491cbf0754f49a5136ab51294a96b69", "status": "affected", "version": "5228eb96a4875f8cf5d61d486e3795ac14df8904", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "arch/x86/kvm/svm/nested.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.16" }, { "lessThan": "5.16", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.54", "versionType": "semver" }, { "lessThanOrEqual": "6.5.*", "status": "unaffected", "version": "6.5.4", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.6", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.54", "versionStartIncluding": "5.16", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.5.4", "versionStartIncluding": "5.16", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6", "versionStartIncluding": "5.16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: nSVM: Load L1\u0027s TSC multiplier based on L1 state, not L2 state\n\nWhen emulating nested VM-Exit, load L1\u0027s TSC multiplier if L1\u0027s desired\nratio doesn\u0027t match the current ratio, not if the ratio L1 is using for\nL2 diverges from the default. Functionally, the end result is the same\nas KVM will run L2 with L1\u0027s multiplier if L2\u0027s multiplier is the default,\ni.e. checking that L1\u0027s multiplier is loaded is equivalent to checking if\nL2 has a non-default multiplier.\n\nHowever, the assertion that TSC scaling is exposed to L1 is flawed, as\nuserspace can trigger the WARN at will by writing the MSR and then\nupdating guest CPUID to hide the feature (modifying guest CPUID is\nallowed anytime before KVM_RUN). E.g. hacking KVM\u0027s state_test\nselftest to do\n\n vcpu_set_msr(vcpu, MSR_AMD64_TSC_RATIO, 0);\n vcpu_clear_cpuid_feature(vcpu, X86_FEATURE_TSCRATEMSR);\n\nafter restoring state in a new VM+vCPU yields an endless supply of:\n\n ------------[ cut here ]------------\n WARNING: CPU: 10 PID: 206939 at arch/x86/kvm/svm/nested.c:1105\n nested_svm_vmexit+0x6af/0x720 [kvm_amd]\n Call Trace:\n nested_svm_exit_handled+0x102/0x1f0 [kvm_amd]\n svm_handle_exit+0xb9/0x180 [kvm_amd]\n kvm_arch_vcpu_ioctl_run+0x1eab/0x2570 [kvm]\n kvm_vcpu_ioctl+0x4c9/0x5b0 [kvm]\n ? trace_hardirqs_off+0x4d/0xa0\n __se_sys_ioctl+0x7a/0xc0\n __x64_sys_ioctl+0x21/0x30\n do_syscall_64+0x41/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUnlike the nested VMRUN path, hoisting the svm-\u003etsc_scaling_enabled check\ninto the if-statement is wrong as KVM needs to ensure L1\u0027s multiplier is\nloaded in the above scenario. Alternatively, the WARN_ON() could simply\nbe deleted, but that would make KVM\u0027s behavior even more subtle, e.g. it\u0027s\nnot immediately obvious why it\u0027s safe to write MSR_AMD64_TSC_RATIO when\nchecking only tsc_ratio_msr." } ], "providerMetadata": { "dateUpdated": "2025-09-15T14:21:36.170Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/5b2b0535fa7adee7e295fed0a3095082131a8d05" }, { "url": "https://git.kernel.org/stable/c/e91c07f6cf7060d2acb3aeee31a6baebe3773d3f" }, { "url": "https://git.kernel.org/stable/c/0c94e2468491cbf0754f49a5136ab51294a96b69" } ], "title": "KVM: nSVM: Load L1\u0027s TSC multiplier based on L1 state, not L2 state", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2023-53208", "datePublished": "2025-09-15T14:21:36.170Z", "dateReserved": "2025-09-15T13:59:19.068Z", "dateUpdated": "2025-09-15T14:21:36.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-53208\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-15T15:15:47.320\",\"lastModified\":\"2025-09-15T15:22:27.090\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nKVM: nSVM: Load L1\u0027s TSC multiplier based on L1 state, not L2 state\\n\\nWhen emulating nested VM-Exit, load L1\u0027s TSC multiplier if L1\u0027s desired\\nratio doesn\u0027t match the current ratio, not if the ratio L1 is using for\\nL2 diverges from the default. Functionally, the end result is the same\\nas KVM will run L2 with L1\u0027s multiplier if L2\u0027s multiplier is the default,\\ni.e. checking that L1\u0027s multiplier is loaded is equivalent to checking if\\nL2 has a non-default multiplier.\\n\\nHowever, the assertion that TSC scaling is exposed to L1 is flawed, as\\nuserspace can trigger the WARN at will by writing the MSR and then\\nupdating guest CPUID to hide the feature (modifying guest CPUID is\\nallowed anytime before KVM_RUN). E.g. hacking KVM\u0027s state_test\\nselftest to do\\n\\n vcpu_set_msr(vcpu, MSR_AMD64_TSC_RATIO, 0);\\n vcpu_clear_cpuid_feature(vcpu, X86_FEATURE_TSCRATEMSR);\\n\\nafter restoring state in a new VM+vCPU yields an endless supply of:\\n\\n ------------[ cut here ]------------\\n WARNING: CPU: 10 PID: 206939 at arch/x86/kvm/svm/nested.c:1105\\n nested_svm_vmexit+0x6af/0x720 [kvm_amd]\\n Call Trace:\\n nested_svm_exit_handled+0x102/0x1f0 [kvm_amd]\\n svm_handle_exit+0xb9/0x180 [kvm_amd]\\n kvm_arch_vcpu_ioctl_run+0x1eab/0x2570 [kvm]\\n kvm_vcpu_ioctl+0x4c9/0x5b0 [kvm]\\n ? trace_hardirqs_off+0x4d/0xa0\\n __se_sys_ioctl+0x7a/0xc0\\n __x64_sys_ioctl+0x21/0x30\\n do_syscall_64+0x41/0x90\\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n\\nUnlike the nested VMRUN path, hoisting the svm-\u003etsc_scaling_enabled check\\ninto the if-statement is wrong as KVM needs to ensure L1\u0027s multiplier is\\nloaded in the above scenario. Alternatively, the WARN_ON() could simply\\nbe deleted, but that would make KVM\u0027s behavior even more subtle, e.g. it\u0027s\\nnot immediately obvious why it\u0027s safe to write MSR_AMD64_TSC_RATIO when\\nchecking only tsc_ratio_msr.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0c94e2468491cbf0754f49a5136ab51294a96b69\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5b2b0535fa7adee7e295fed0a3095082131a8d05\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e91c07f6cf7060d2acb3aeee31a6baebe3773d3f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
fkie_cve-2023-53208
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: nSVM: Load L1\u0027s TSC multiplier based on L1 state, not L2 state\n\nWhen emulating nested VM-Exit, load L1\u0027s TSC multiplier if L1\u0027s desired\nratio doesn\u0027t match the current ratio, not if the ratio L1 is using for\nL2 diverges from the default. Functionally, the end result is the same\nas KVM will run L2 with L1\u0027s multiplier if L2\u0027s multiplier is the default,\ni.e. checking that L1\u0027s multiplier is loaded is equivalent to checking if\nL2 has a non-default multiplier.\n\nHowever, the assertion that TSC scaling is exposed to L1 is flawed, as\nuserspace can trigger the WARN at will by writing the MSR and then\nupdating guest CPUID to hide the feature (modifying guest CPUID is\nallowed anytime before KVM_RUN). E.g. hacking KVM\u0027s state_test\nselftest to do\n\n vcpu_set_msr(vcpu, MSR_AMD64_TSC_RATIO, 0);\n vcpu_clear_cpuid_feature(vcpu, X86_FEATURE_TSCRATEMSR);\n\nafter restoring state in a new VM+vCPU yields an endless supply of:\n\n ------------[ cut here ]------------\n WARNING: CPU: 10 PID: 206939 at arch/x86/kvm/svm/nested.c:1105\n nested_svm_vmexit+0x6af/0x720 [kvm_amd]\n Call Trace:\n nested_svm_exit_handled+0x102/0x1f0 [kvm_amd]\n svm_handle_exit+0xb9/0x180 [kvm_amd]\n kvm_arch_vcpu_ioctl_run+0x1eab/0x2570 [kvm]\n kvm_vcpu_ioctl+0x4c9/0x5b0 [kvm]\n ? trace_hardirqs_off+0x4d/0xa0\n __se_sys_ioctl+0x7a/0xc0\n __x64_sys_ioctl+0x21/0x30\n do_syscall_64+0x41/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUnlike the nested VMRUN path, hoisting the svm-\u003etsc_scaling_enabled check\ninto the if-statement is wrong as KVM needs to ensure L1\u0027s multiplier is\nloaded in the above scenario. Alternatively, the WARN_ON() could simply\nbe deleted, but that would make KVM\u0027s behavior even more subtle, e.g. it\u0027s\nnot immediately obvious why it\u0027s safe to write MSR_AMD64_TSC_RATIO when\nchecking only tsc_ratio_msr." } ], "id": "CVE-2023-53208", "lastModified": "2025-09-15T15:22:27.090", "metrics": {}, "published": "2025-09-15T15:15:47.320", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/0c94e2468491cbf0754f49a5136ab51294a96b69" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/5b2b0535fa7adee7e295fed0a3095082131a8d05" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/e91c07f6cf7060d2acb3aeee31a6baebe3773d3f" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
wid-sec-w-2025-2053
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht n\u00e4her beschriebene Auswirkungen zu erzielen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-2053 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2053.json" }, { "category": "self", "summary": "WID-SEC-2025-2053 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2053" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50234", "url": "https://lore.kernel.org/linux-cve-announce/2025091545-CVE-2022-50234-bd01@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50235", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50235-a5c0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50236", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50236-dc41@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50239", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50239-3908@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50240", "url": "https://lore.kernel.org/linux-cve-announce/2025091547-CVE-2022-50240-6e40@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50241", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50241-0f92@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50242", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50242-9a25@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50243", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50243-4311@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50244", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50244-4e09@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50245", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50245-57e4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50246", "url": "https://lore.kernel.org/linux-cve-announce/2025091548-CVE-2022-50246-d173@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50247", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50247-1ab7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50248", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50248-edcb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50249", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50249-bfbe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50250", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50250-1be1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50251", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2022-50251-c216@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50252", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50252-5c96@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50253", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50253-1ed7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50254", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50254-c910@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50255", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50255-c5ec@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50256", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50256-069f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50257", "url": "https://lore.kernel.org/linux-cve-announce/2025091550-CVE-2022-50257-648e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50258", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50258-1497@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50259", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50259-6276@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50260", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50260-a136@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50261", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2022-50261-9892@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50262", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2022-50262-0645@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50263", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2022-50263-040c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50264", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50264-3988@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50265", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50265-509d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50266", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50266-9532@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50267", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50267-2de9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50268", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50268-bcdf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50269", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2022-50269-24d9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50270", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50270-5b28@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50271", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50271-2175@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50272", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50272-4120@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50273", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50273-5521@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50274", "url": "https://lore.kernel.org/linux-cve-announce/2025091505-CVE-2022-50274-ad8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50275", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50275-2ef2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50276", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50276-e9a6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50277", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50277-085f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50278", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50278-fcc9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50279", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50279-412b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50280", "url": "https://lore.kernel.org/linux-cve-announce/2025091506-CVE-2022-50280-762f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50281", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50281-f141@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50282", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50282-322d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50283", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50283-d21e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50284", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50284-b5c2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50285", "url": "https://lore.kernel.org/linux-cve-announce/2025091507-CVE-2022-50285-955c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50286", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50286-b313@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50287", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50287-a3ce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50288", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50288-3421@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50289", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50289-1532@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50290", "url": "https://lore.kernel.org/linux-cve-announce/2025091508-CVE-2022-50290-a7af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50291", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50291-82e7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50292", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50292-cb74@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50293", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50293-2dbe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50294", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50294-7c87@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50295", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50295-8141@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50296", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50296-7d7e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50297", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50297-974e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50298", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50298-06f8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50299", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2022-50299-9449@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50300", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50300-203c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50301", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50301-c26c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50302", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50302-89ee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50303", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50303-7759@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50304", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2022-50304-4b20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50305", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50305-8aba@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50306", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50306-c1da@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50307", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50307-3240@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50308", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50308-8b1d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50309", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50309-f82b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50310", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2022-50310-aa10@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50311", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50311-0c21@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50312", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50312-105d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50313", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50313-2fa9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50314", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50314-9a10@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50315", "url": "https://lore.kernel.org/linux-cve-announce/2025091500-CVE-2022-50315-a3b8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50316", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50316-6e9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50317", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50317-6b3b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50318", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2022-50318-6f5e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50319", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50319-6747@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50320", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50320-5ffa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50321", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50321-bba8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50322", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50322-079d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50323", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50323-a29f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50324", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2022-50324-e9d8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50325", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50325-d6bb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50326", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50326-7ffc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50327", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50327-5d27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50328", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50328-f996@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50329", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2022-50329-58ac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50330", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50330-cd49@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50331", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50331-53e1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50332", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50332-a052@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50333", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50333-d81f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50334", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2022-50334-488d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50335", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50335-141b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50336", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50336-0b7e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50337", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50337-42aa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-50338", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2022-50338-506b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53147", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2023-53147-8f20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53148", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53148-e1b8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53149", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53149-2f0a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53150", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53150-29b0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53151", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53151-263e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53152", "url": "https://lore.kernel.org/linux-cve-announce/2025091552-CVE-2023-53152-130d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53153", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53153-d85c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53163", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53163-860f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53164", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53164-3a5d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53165", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53165-a7c4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53166", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53166-12e5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53167", "url": "https://lore.kernel.org/linux-cve-announce/2025091553-CVE-2023-53167-3fb7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53168", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53168-7628@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53169", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53169-0678@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53170", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53170-d187@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53171", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53171-be9f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53172", "url": "https://lore.kernel.org/linux-cve-announce/2025091554-CVE-2023-53172-3f93@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53173", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53173-4180@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53174", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53174-ed92@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53175", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53175-66fa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53176", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53176-4194@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53177", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53177-9a91@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53178", "url": "https://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53178-9d27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53179", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53179-eb55@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53180", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53180-5e16@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53181", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53181-608c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53182", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53182-dcdb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53183", "url": "https://lore.kernel.org/linux-cve-announce/2025091556-CVE-2023-53183-b15d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53184", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53184-3b7a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53185", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53185-2f8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53186", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53186-25a4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53187", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53187-fb77@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53188", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53188-373f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53189", "url": "https://lore.kernel.org/linux-cve-announce/2025091557-CVE-2023-53189-19c2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53190", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53190-0dfe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53191", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53191-7baa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53192", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53192-5ca6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53193", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53193-74f6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53194", "url": "https://lore.kernel.org/linux-cve-announce/2025091558-CVE-2023-53194-1804@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53195", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53195-a853@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53196", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53196-c59a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53197", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53197-1f23@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53198", "url": "https://lore.kernel.org/linux-cve-announce/2025091559-CVE-2023-53198-094a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53199", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53199-8a8c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53200", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53200-a0c8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53201", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53201-baf1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53202", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53202-5e01@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53203", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53203-4a9c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53204", "url": "https://lore.kernel.org/linux-cve-announce/2025091509-CVE-2023-53204-3e15@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53205", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53205-9a2b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53206", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53206-33fc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53207", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53207-5025@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53208", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53208-b31d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53209", "url": "https://lore.kernel.org/linux-cve-announce/2025091510-CVE-2023-53209-ed9e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53210", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53210-0e06@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53211", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53211-6015@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53212", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53212-fdd4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53213", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53213-dfc5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53214", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53214-87f5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53215", "url": "https://lore.kernel.org/linux-cve-announce/2025091511-CVE-2023-53215-8895@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53216", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53216-7693@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53217", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53217-0de0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53218", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53218-0fca@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53219", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53219-bd20@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53220", "url": "https://lore.kernel.org/linux-cve-announce/2025091512-CVE-2023-53220-e514@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53221", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53221-c23e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53222", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53222-c1a9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53223", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53223-ee66@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53224", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53224-190d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53225", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53225-5ed5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53226", "url": "https://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53226-a44a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53227", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53227-6a15@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53228", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53228-441c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53229", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53229-a0ef@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53230", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53230-6c94@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53231", "url": "https://lore.kernel.org/linux-cve-announce/2025091514-CVE-2023-53231-7743@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53232", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53232-39fa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53233", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53233-8c6b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53234", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53234-5a07@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53235", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53235-1104@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53236", "url": "https://lore.kernel.org/linux-cve-announce/2025091515-CVE-2023-53236-49ad@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53237", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53237-7d1b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53238", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53238-f8a7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53239", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53239-9ea0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53240", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53240-c379@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53241", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53241-c75a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53242", "url": "https://lore.kernel.org/linux-cve-announce/2025091516-CVE-2023-53242-b7c5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53243", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53243-bac7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53244", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53244-197d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53245", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53245-256b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53246", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53246-a539@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53247", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53247-60a0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53248", "url": "https://lore.kernel.org/linux-cve-announce/2025091501-CVE-2023-53248-aa39@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53249", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53249-aab7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53250", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53250-05ea@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53251", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53251-8d43@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53252", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53252-3a4f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53253", "url": "https://lore.kernel.org/linux-cve-announce/2025091502-CVE-2023-53253-c59c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53254", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53254-0aa0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53255", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53255-ba5b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53256", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53256-d5af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53257", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53257-6162@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53258", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53258-35f0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53259", "url": "https://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53259-5409@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53260", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53260-2323@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53261", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53261-6a1a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2023-53262", "url": "https://lore.kernel.org/linux-cve-announce/2025091504-CVE-2023-53262-822a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39800", "url": "https://lore.kernel.org/linux-cve-announce/2025091549-CVE-2025-39800-6b30@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39801", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39801-00f9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39802", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39802-fba9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39803", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39803-eb8e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39804", "url": "https://lore.kernel.org/linux-cve-announce/2025091551-CVE-2025-39804-bf3b@gregkh/" }, { "category": "external", "summary": "Debian Security Advisory DSA-6009 vom 2025-09-23", "url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-6008 vom 2025-09-23", "url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-22T22:00:00.000+00:00", "generator": { "date": "2025-09-23T04:57:08.189+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-2053", "initial_release_date": "2025-09-15T22:00:00.000+00:00", "revision_history": [ { "date": "2025-09-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-09-16T22:00:00.000+00:00", "number": "2", "summary": "Referenz(en) aufgenommen: EUVD-2023-59886, EUVD-2023-59887, EUVD-2023-59888, EUVD-2023-59889, EUVD-2023-59890, EUVD-2023-59891, EUVD-2023-59892, EUVD-2023-59913, EUVD-2023-59923" }, { "date": "2025-09-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T028463", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:unspecified" } } } ], "category": "vendor", "name": "Open Source" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-50234", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50234" }, { "cve": "CVE-2022-50235", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50235" }, { "cve": "CVE-2022-50236", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50236" }, { "cve": "CVE-2022-50239", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50239" }, { "cve": "CVE-2022-50240", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50240" }, { "cve": "CVE-2022-50241", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50241" }, { "cve": "CVE-2022-50242", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50242" }, { "cve": "CVE-2022-50243", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50243" }, { "cve": "CVE-2022-50244", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50244" }, { "cve": "CVE-2022-50245", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50245" }, { "cve": "CVE-2022-50246", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50246" }, { "cve": "CVE-2022-50247", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50247" }, { "cve": "CVE-2022-50248", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50248" }, { "cve": "CVE-2022-50249", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50249" }, { "cve": "CVE-2022-50250", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50250" }, { "cve": "CVE-2022-50251", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50251" }, { "cve": "CVE-2022-50252", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50252" }, { "cve": "CVE-2022-50253", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50253" }, { "cve": "CVE-2022-50254", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50254" }, { "cve": "CVE-2022-50255", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50255" }, { "cve": "CVE-2022-50256", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50256" }, { "cve": "CVE-2022-50257", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50257" }, { "cve": "CVE-2022-50258", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50258" }, { "cve": "CVE-2022-50259", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50259" }, { "cve": "CVE-2022-50260", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50260" }, { "cve": "CVE-2022-50261", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50261" }, { "cve": "CVE-2022-50262", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50262" }, { "cve": "CVE-2022-50263", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50263" }, { "cve": "CVE-2022-50264", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50264" }, { "cve": "CVE-2022-50265", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50265" }, { "cve": "CVE-2022-50266", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50266" }, { "cve": "CVE-2022-50267", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50267" }, { "cve": "CVE-2022-50268", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50268" }, { "cve": "CVE-2022-50269", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50269" }, { "cve": "CVE-2022-50270", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50270" }, { "cve": "CVE-2022-50271", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50271" }, { "cve": "CVE-2022-50272", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50272" }, { "cve": "CVE-2022-50273", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50273" }, { "cve": "CVE-2022-50274", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50274" }, { "cve": "CVE-2022-50275", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50275" }, { "cve": "CVE-2022-50276", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50276" }, { "cve": "CVE-2022-50277", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50277" }, { "cve": "CVE-2022-50278", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50278" }, { "cve": "CVE-2022-50279", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50279" }, { "cve": "CVE-2022-50280", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50280" }, { "cve": "CVE-2022-50281", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50281" }, { "cve": "CVE-2022-50282", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50282" }, { "cve": "CVE-2022-50283", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50283" }, { "cve": "CVE-2022-50284", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50284" }, { "cve": "CVE-2022-50285", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50285" }, { "cve": "CVE-2022-50286", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50286" }, { "cve": "CVE-2022-50287", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50287" }, { "cve": "CVE-2022-50288", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50288" }, { "cve": "CVE-2022-50289", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50289" }, { "cve": "CVE-2022-50290", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50290" }, { "cve": "CVE-2022-50291", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50291" }, { "cve": "CVE-2022-50292", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50292" }, { "cve": "CVE-2022-50293", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50293" }, { "cve": "CVE-2022-50294", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50294" }, { "cve": "CVE-2022-50295", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50295" }, { "cve": "CVE-2022-50296", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50296" }, { "cve": "CVE-2022-50297", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50297" }, { "cve": "CVE-2022-50298", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50298" }, { "cve": "CVE-2022-50299", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50299" }, { "cve": "CVE-2022-50300", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50300" }, { "cve": "CVE-2022-50301", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50301" }, { "cve": "CVE-2022-50302", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50302" }, { "cve": "CVE-2022-50303", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50303" }, { "cve": "CVE-2022-50304", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50304" }, { "cve": "CVE-2022-50305", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50305" }, { "cve": "CVE-2022-50306", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50306" }, { "cve": "CVE-2022-50307", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50307" }, { "cve": "CVE-2022-50308", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50308" }, { "cve": "CVE-2022-50309", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50309" }, { "cve": "CVE-2022-50310", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50310" }, { "cve": "CVE-2022-50311", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50311" }, { "cve": "CVE-2022-50312", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50312" }, { "cve": "CVE-2022-50313", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50313" }, { "cve": "CVE-2022-50314", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50314" }, { "cve": "CVE-2022-50315", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50315" }, { "cve": "CVE-2022-50316", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50316" }, { "cve": "CVE-2022-50317", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50317" }, { "cve": "CVE-2022-50318", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50318" }, { "cve": "CVE-2022-50319", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50319" }, { "cve": "CVE-2022-50320", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50320" }, { "cve": "CVE-2022-50321", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50321" }, { "cve": "CVE-2022-50322", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50322" }, { "cve": "CVE-2022-50323", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50323" }, { "cve": "CVE-2022-50324", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50324" }, { "cve": "CVE-2022-50325", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50325" }, { "cve": "CVE-2022-50326", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50326" }, { "cve": "CVE-2022-50327", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50327" }, { "cve": "CVE-2022-50328", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50328" }, { "cve": "CVE-2022-50329", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50329" }, { "cve": "CVE-2022-50330", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50330" }, { "cve": "CVE-2022-50331", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50331" }, { "cve": "CVE-2022-50332", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50332" }, { "cve": "CVE-2022-50333", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50333" }, { "cve": "CVE-2022-50334", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50334" }, { "cve": "CVE-2022-50335", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50335" }, { "cve": "CVE-2022-50336", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50336" }, { "cve": "CVE-2022-50337", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50337" }, { "cve": "CVE-2022-50338", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2022-50338" }, { "cve": "CVE-2023-3772", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-3772" }, { "cve": "CVE-2023-53147", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53147" }, { "cve": "CVE-2023-53148", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53148" }, { "cve": "CVE-2023-53149", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53149" }, { "cve": "CVE-2023-53150", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53150" }, { "cve": "CVE-2023-53151", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53151" }, { "cve": "CVE-2023-53152", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53152" }, { "cve": "CVE-2023-53153", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53153" }, { "cve": "CVE-2023-53163", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53163" }, { "cve": "CVE-2023-53164", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53164" }, { "cve": "CVE-2023-53165", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53165" }, { "cve": "CVE-2023-53166", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53166" }, { "cve": "CVE-2023-53167", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53167" }, { "cve": "CVE-2023-53168", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53168" }, { "cve": "CVE-2023-53169", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53169" }, { "cve": "CVE-2023-53170", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53170" }, { "cve": "CVE-2023-53171", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53171" }, { "cve": "CVE-2023-53172", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53172" }, { "cve": "CVE-2023-53173", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53173" }, { "cve": "CVE-2023-53174", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53174" }, { "cve": "CVE-2023-53175", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53175" }, { "cve": "CVE-2023-53176", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53176" }, { "cve": "CVE-2023-53177", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53177" }, { "cve": "CVE-2023-53178", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53178" }, { "cve": "CVE-2023-53179", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53179" }, { "cve": "CVE-2023-53180", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53180" }, { "cve": "CVE-2023-53181", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53181" }, { "cve": "CVE-2023-53182", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53182" }, { "cve": "CVE-2023-53183", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53183" }, { "cve": "CVE-2023-53184", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53184" }, { "cve": "CVE-2023-53185", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53185" }, { "cve": "CVE-2023-53186", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53186" }, { "cve": "CVE-2023-53187", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53187" }, { "cve": "CVE-2023-53188", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53188" }, { "cve": "CVE-2023-53189", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53189" }, { "cve": "CVE-2023-53190", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53190" }, { "cve": "CVE-2023-53191", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53191" }, { "cve": "CVE-2023-53192", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53192" }, { "cve": "CVE-2023-53193", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53193" }, { "cve": "CVE-2023-53194", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53194" }, { "cve": "CVE-2023-53195", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53195" }, { "cve": "CVE-2023-53196", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53196" }, { "cve": "CVE-2023-53197", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53197" }, { "cve": "CVE-2023-53198", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53198" }, { "cve": "CVE-2023-53199", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53199" }, { "cve": "CVE-2023-53200", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53200" }, { "cve": "CVE-2023-53201", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53201" }, { "cve": "CVE-2023-53202", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53202" }, { "cve": "CVE-2023-53203", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53203" }, { "cve": "CVE-2023-53204", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53204" }, { "cve": "CVE-2023-53205", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53205" }, { "cve": "CVE-2023-53206", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53206" }, { "cve": "CVE-2023-53207", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53207" }, { "cve": "CVE-2023-53208", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53208" }, { "cve": "CVE-2023-53209", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53209" }, { "cve": "CVE-2023-53210", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53210" }, { "cve": "CVE-2023-53211", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53211" }, { "cve": "CVE-2023-53212", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53212" }, { "cve": "CVE-2023-53213", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53213" }, { "cve": "CVE-2023-53214", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53214" }, { "cve": "CVE-2023-53215", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53215" }, { "cve": "CVE-2023-53216", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53216" }, { "cve": "CVE-2023-53217", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53217" }, { "cve": "CVE-2023-53218", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53218" }, { "cve": "CVE-2023-53219", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53219" }, { "cve": "CVE-2023-53220", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53220" }, { "cve": "CVE-2023-53221", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53221" }, { "cve": "CVE-2023-53222", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53222" }, { "cve": "CVE-2023-53223", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53223" }, { "cve": "CVE-2023-53224", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53224" }, { "cve": "CVE-2023-53225", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53225" }, { "cve": "CVE-2023-53226", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53226" }, { "cve": "CVE-2023-53227", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53227" }, { "cve": "CVE-2023-53228", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53228" }, { "cve": "CVE-2023-53229", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53229" }, { "cve": "CVE-2023-53230", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53230" }, { "cve": "CVE-2023-53231", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53231" }, { "cve": "CVE-2023-53232", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53232" }, { "cve": "CVE-2023-53233", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53233" }, { "cve": "CVE-2023-53234", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53234" }, { "cve": "CVE-2023-53235", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53235" }, { "cve": "CVE-2023-53236", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53236" }, { "cve": "CVE-2023-53237", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53237" }, { "cve": "CVE-2023-53238", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53238" }, { "cve": "CVE-2023-53239", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53239" }, { "cve": "CVE-2023-53240", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53240" }, { "cve": "CVE-2023-53241", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53241" }, { "cve": "CVE-2023-53242", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53242" }, { "cve": "CVE-2023-53243", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53243" }, { "cve": "CVE-2023-53244", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53244" }, { "cve": "CVE-2023-53245", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53245" }, { "cve": "CVE-2023-53246", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53246" }, { "cve": "CVE-2023-53247", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53247" }, { "cve": "CVE-2023-53248", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53248" }, { "cve": "CVE-2023-53249", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53249" }, { "cve": "CVE-2023-53250", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53250" }, { "cve": "CVE-2023-53251", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53251" }, { "cve": "CVE-2023-53252", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53252" }, { "cve": "CVE-2023-53253", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53253" }, { "cve": "CVE-2023-53254", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53254" }, { "cve": "CVE-2023-53255", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53255" }, { "cve": "CVE-2023-53256", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53256" }, { "cve": "CVE-2023-53257", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53257" }, { "cve": "CVE-2023-53258", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53258" }, { "cve": "CVE-2023-53259", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53259" }, { "cve": "CVE-2023-53260", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53260" }, { "cve": "CVE-2023-53261", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53261" }, { "cve": "CVE-2023-53262", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53262" }, { "cve": "CVE-2023-53263", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53263" }, { "cve": "CVE-2023-53264", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53264" }, { "cve": "CVE-2023-53265", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53265" }, { "cve": "CVE-2023-53266", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53266" }, { "cve": "CVE-2023-53267", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53267" }, { "cve": "CVE-2023-53268", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53268" }, { "cve": "CVE-2023-53269", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53269" }, { "cve": "CVE-2023-53270", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53270" }, { "cve": "CVE-2023-53271", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53271" }, { "cve": "CVE-2023-53272", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53272" }, { "cve": "CVE-2023-53273", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53273" }, { "cve": "CVE-2023-53274", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53274" }, { "cve": "CVE-2023-53275", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53275" }, { "cve": "CVE-2023-53276", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53276" }, { "cve": "CVE-2023-53277", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53277" }, { "cve": "CVE-2023-53278", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53278" }, { "cve": "CVE-2023-53279", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53279" }, { "cve": "CVE-2023-53280", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53280" }, { "cve": "CVE-2023-53281", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53281" }, { "cve": "CVE-2023-53282", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53282" }, { "cve": "CVE-2023-53283", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53283" }, { "cve": "CVE-2023-53284", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53284" }, { "cve": "CVE-2023-53285", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53285" }, { "cve": "CVE-2023-53286", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53286" }, { "cve": "CVE-2023-53287", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53287" }, { "cve": "CVE-2023-53288", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53288" }, { "cve": "CVE-2023-53289", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53289" }, { "cve": "CVE-2023-53290", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53290" }, { "cve": "CVE-2023-53291", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53291" }, { "cve": "CVE-2023-53292", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53292" }, { "cve": "CVE-2023-53293", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53293" }, { "cve": "CVE-2023-53294", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53294" }, { "cve": "CVE-2023-53295", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53295" }, { "cve": "CVE-2023-53296", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53296" }, { "cve": "CVE-2023-53297", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53297" }, { "cve": "CVE-2023-53298", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53298" }, { "cve": "CVE-2023-53299", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53299" }, { "cve": "CVE-2023-53300", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53300" }, { "cve": "CVE-2023-53301", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53301" }, { "cve": "CVE-2023-53302", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53302" }, { "cve": "CVE-2023-53303", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2023-53303" }, { "cve": "CVE-2025-39800", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39800" }, { "cve": "CVE-2025-39801", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39801" }, { "cve": "CVE-2025-39802", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39802" }, { "cve": "CVE-2025-39803", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39803" }, { "cve": "CVE-2025-39804", "product_status": { "known_affected": [ "T028463", "2951" ] }, "release_date": "2025-09-15T22:00:00.000+00:00", "title": "CVE-2025-39804" } ] }
ghsa-2h47-q9f6-8gx7
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 state
When emulating nested VM-Exit, load L1's TSC multiplier if L1's desired ratio doesn't match the current ratio, not if the ratio L1 is using for L2 diverges from the default. Functionally, the end result is the same as KVM will run L2 with L1's multiplier if L2's multiplier is the default, i.e. checking that L1's multiplier is loaded is equivalent to checking if L2 has a non-default multiplier.
However, the assertion that TSC scaling is exposed to L1 is flawed, as userspace can trigger the WARN at will by writing the MSR and then updating guest CPUID to hide the feature (modifying guest CPUID is allowed anytime before KVM_RUN). E.g. hacking KVM's state_test selftest to do
vcpu_set_msr(vcpu, MSR_AMD64_TSC_RATIO, 0);
vcpu_clear_cpuid_feature(vcpu, X86_FEATURE_TSCRATEMSR);
after restoring state in a new VM+vCPU yields an endless supply of:
------------[ cut here ]------------ WARNING: CPU: 10 PID: 206939 at arch/x86/kvm/svm/nested.c:1105 nested_svm_vmexit+0x6af/0x720 [kvm_amd] Call Trace: nested_svm_exit_handled+0x102/0x1f0 [kvm_amd] svm_handle_exit+0xb9/0x180 [kvm_amd] kvm_arch_vcpu_ioctl_run+0x1eab/0x2570 [kvm] kvm_vcpu_ioctl+0x4c9/0x5b0 [kvm] ? trace_hardirqs_off+0x4d/0xa0 __se_sys_ioctl+0x7a/0xc0 __x64_sys_ioctl+0x21/0x30 do_syscall_64+0x41/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd
Unlike the nested VMRUN path, hoisting the svm->tsc_scaling_enabled check into the if-statement is wrong as KVM needs to ensure L1's multiplier is loaded in the above scenario. Alternatively, the WARN_ON() could simply be deleted, but that would make KVM's behavior even more subtle, e.g. it's not immediately obvious why it's safe to write MSR_AMD64_TSC_RATIO when checking only tsc_ratio_msr.
{ "affected": [], "aliases": [ "CVE-2023-53208" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-09-15T15:15:47Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: nSVM: Load L1\u0027s TSC multiplier based on L1 state, not L2 state\n\nWhen emulating nested VM-Exit, load L1\u0027s TSC multiplier if L1\u0027s desired\nratio doesn\u0027t match the current ratio, not if the ratio L1 is using for\nL2 diverges from the default. Functionally, the end result is the same\nas KVM will run L2 with L1\u0027s multiplier if L2\u0027s multiplier is the default,\ni.e. checking that L1\u0027s multiplier is loaded is equivalent to checking if\nL2 has a non-default multiplier.\n\nHowever, the assertion that TSC scaling is exposed to L1 is flawed, as\nuserspace can trigger the WARN at will by writing the MSR and then\nupdating guest CPUID to hide the feature (modifying guest CPUID is\nallowed anytime before KVM_RUN). E.g. hacking KVM\u0027s state_test\nselftest to do\n\n vcpu_set_msr(vcpu, MSR_AMD64_TSC_RATIO, 0);\n vcpu_clear_cpuid_feature(vcpu, X86_FEATURE_TSCRATEMSR);\n\nafter restoring state in a new VM+vCPU yields an endless supply of:\n\n ------------[ cut here ]------------\n WARNING: CPU: 10 PID: 206939 at arch/x86/kvm/svm/nested.c:1105\n nested_svm_vmexit+0x6af/0x720 [kvm_amd]\n Call Trace:\n nested_svm_exit_handled+0x102/0x1f0 [kvm_amd]\n svm_handle_exit+0xb9/0x180 [kvm_amd]\n kvm_arch_vcpu_ioctl_run+0x1eab/0x2570 [kvm]\n kvm_vcpu_ioctl+0x4c9/0x5b0 [kvm]\n ? trace_hardirqs_off+0x4d/0xa0\n __se_sys_ioctl+0x7a/0xc0\n __x64_sys_ioctl+0x21/0x30\n do_syscall_64+0x41/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUnlike the nested VMRUN path, hoisting the svm-\u003etsc_scaling_enabled check\ninto the if-statement is wrong as KVM needs to ensure L1\u0027s multiplier is\nloaded in the above scenario. Alternatively, the WARN_ON() could simply\nbe deleted, but that would make KVM\u0027s behavior even more subtle, e.g. it\u0027s\nnot immediately obvious why it\u0027s safe to write MSR_AMD64_TSC_RATIO when\nchecking only tsc_ratio_msr.", "id": "GHSA-2h47-q9f6-8gx7", "modified": "2025-09-15T15:31:28Z", "published": "2025-09-15T15:31:28Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53208" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/0c94e2468491cbf0754f49a5136ab51294a96b69" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/5b2b0535fa7adee7e295fed0a3095082131a8d05" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/e91c07f6cf7060d2acb3aeee31a6baebe3773d3f" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.