Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-53306 (GCVE-0-2023-53306)
Vulnerability from cvelistv5 – Published: 2025-09-16 16:11 – Updated: 2026-01-14 18:32{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-53306",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-14T18:23:22.602517Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-14T18:32:56.347Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/dax.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "fac05f800abb63dc4d7cc48fe7edf16e0520dc1f",
"status": "affected",
"version": "f80e1668888f34c0764822e74953c997daf2ccdb",
"versionType": "git"
},
{
"lessThan": "f76b3a32879de215ced3f8c754c4077b0c2f79e3",
"status": "affected",
"version": "f80e1668888f34c0764822e74953c997daf2ccdb",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/dax.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.2"
},
{
"lessThan": "6.2",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.2.*",
"status": "unaffected",
"version": "6.2.11",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.3",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.11",
"versionStartIncluding": "6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3",
"versionStartIncluding": "6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsdax: force clear dirty mark if CoW\n\nXFS allows CoW on non-shared extents to combat fragmentation[1]. The old\nnon-shared extent could be mwrited before, its dax entry is marked dirty. \n\nThis results in a WARNing:\n\n[ 28.512349] ------------[ cut here ]------------\n[ 28.512622] WARNING: CPU: 2 PID: 5255 at fs/dax.c:390 dax_insert_entry+0x342/0x390\n[ 28.513050] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace fscache netfs nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables\n[ 28.515462] CPU: 2 PID: 5255 Comm: fsstress Kdump: loaded Not tainted 6.3.0-rc1-00001-g85e1481e19c1-dirty #117\n[ 28.515902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS Arch Linux 1.16.1-1-1 04/01/2014\n[ 28.516307] RIP: 0010:dax_insert_entry+0x342/0x390\n[ 28.516536] Code: 30 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 48 8b 45 20 48 83 c0 01 e9 e2 fe ff ff 48 8b 45 20 48 83 c0 01 e9 cd fe ff ff \u003c0f\u003e 0b e9 53 ff ff ff 48 8b 7c 24 08 31 f6 e8 1b 61 a1 00 eb 8c 48\n[ 28.517417] RSP: 0000:ffffc9000845fb18 EFLAGS: 00010086\n[ 28.517721] RAX: 0000000000000053 RBX: 0000000000000155 RCX: 000000000018824b\n[ 28.518113] RDX: 0000000000000000 RSI: ffffffff827525a6 RDI: 00000000ffffffff\n[ 28.518515] RBP: ffffea00062092c0 R08: 0000000000000000 R09: ffffc9000845f9c8\n[ 28.518905] R10: 0000000000000003 R11: ffffffff82ddb7e8 R12: 0000000000000155\n[ 28.519301] R13: 0000000000000000 R14: 000000000018824b R15: ffff88810cfa76b8\n[ 28.519703] FS: 00007f14a0c94740(0000) GS:ffff88817bd00000(0000) knlGS:0000000000000000\n[ 28.520148] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 28.520472] CR2: 00007f14a0c8d000 CR3: 000000010321c004 CR4: 0000000000770ee0\n[ 28.520863] PKRU: 55555554\n[ 28.521043] Call Trace:\n[ 28.521219] \u003cTASK\u003e\n[ 28.521368] dax_fault_iter+0x196/0x390\n[ 28.521595] dax_iomap_pte_fault+0x19b/0x3d0\n[ 28.521852] __xfs_filemap_fault+0x234/0x2b0\n[ 28.522116] __do_fault+0x30/0x130\n[ 28.522334] do_fault+0x193/0x340\n[ 28.522586] __handle_mm_fault+0x2d3/0x690\n[ 28.522975] handle_mm_fault+0xe6/0x2c0\n[ 28.523259] do_user_addr_fault+0x1bc/0x6f0\n[ 28.523521] exc_page_fault+0x60/0x140\n[ 28.523763] asm_exc_page_fault+0x22/0x30\n[ 28.524001] RIP: 0033:0x7f14a0b589ca\n[ 28.524225] Code: c5 fe 7f 07 c5 fe 7f 47 20 c5 fe 7f 47 40 c5 fe 7f 47 60 c5 f8 77 c3 66 0f 1f 84 00 00 00 00 00 40 0f b6 c6 48 89 d1 48 89 fa \u003cf3\u003e aa 48 89 d0 c5 f8 77 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90\n[ 28.525198] RSP: 002b:00007fff1dea1c98 EFLAGS: 00010202\n[ 28.525505] RAX: 000000000000001e RBX: 000000000014a000 RCX: 0000000000006046\n[ 28.525895] RDX: 00007f14a0c82000 RSI: 000000000000001e RDI: 00007f14a0c8d000\n[ 28.526290] RBP: 000000000000006f R08: 0000000000000004 R09: 000000000014a000\n[ 28.526681] R10: 0000000000000008 R11: 0000000000000246 R12: 028f5c28f5c28f5c\n[ 28.527067] R13: 8f5c28f5c28f5c29 R14: 0000000000011046 R15: 00007f14a0c946c0\n[ 28.527449] \u003c/TASK\u003e\n[ 28.527600] ---[ end trace 0000000000000000 ]---\n\n\nTo be able to delete this entry, clear its dirty mark before\ninvalidate_inode_pages2_range().\n\n[1] https://lore.kernel.org/linux-xfs/20230321151339.GA11376@frogsfrogsfrogs/"
}
],
"providerMetadata": {
"dateUpdated": "2025-09-16T16:11:45.592Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/fac05f800abb63dc4d7cc48fe7edf16e0520dc1f"
},
{
"url": "https://git.kernel.org/stable/c/f76b3a32879de215ced3f8c754c4077b0c2f79e3"
}
],
"title": "fsdax: force clear dirty mark if CoW",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-53306",
"datePublished": "2025-09-16T16:11:45.592Z",
"dateReserved": "2025-09-16T08:09:37.994Z",
"dateUpdated": "2026-01-14T18:32:56.347Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-53306\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-16T17:15:36.370\",\"lastModified\":\"2026-01-14T19:16:23.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfsdax: force clear dirty mark if CoW\\n\\nXFS allows CoW on non-shared extents to combat fragmentation[1]. The old\\nnon-shared extent could be mwrited before, its dax entry is marked dirty. \\n\\nThis results in a WARNing:\\n\\n[ 28.512349] ------------[ cut here ]------------\\n[ 28.512622] WARNING: CPU: 2 PID: 5255 at fs/dax.c:390 dax_insert_entry+0x342/0x390\\n[ 28.513050] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace fscache netfs nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables\\n[ 28.515462] CPU: 2 PID: 5255 Comm: fsstress Kdump: loaded Not tainted 6.3.0-rc1-00001-g85e1481e19c1-dirty #117\\n[ 28.515902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS Arch Linux 1.16.1-1-1 04/01/2014\\n[ 28.516307] RIP: 0010:dax_insert_entry+0x342/0x390\\n[ 28.516536] Code: 30 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 48 8b 45 20 48 83 c0 01 e9 e2 fe ff ff 48 8b 45 20 48 83 c0 01 e9 cd fe ff ff \u003c0f\u003e 0b e9 53 ff ff ff 48 8b 7c 24 08 31 f6 e8 1b 61 a1 00 eb 8c 48\\n[ 28.517417] RSP: 0000:ffffc9000845fb18 EFLAGS: 00010086\\n[ 28.517721] RAX: 0000000000000053 RBX: 0000000000000155 RCX: 000000000018824b\\n[ 28.518113] RDX: 0000000000000000 RSI: ffffffff827525a6 RDI: 00000000ffffffff\\n[ 28.518515] RBP: ffffea00062092c0 R08: 0000000000000000 R09: ffffc9000845f9c8\\n[ 28.518905] R10: 0000000000000003 R11: ffffffff82ddb7e8 R12: 0000000000000155\\n[ 28.519301] R13: 0000000000000000 R14: 000000000018824b R15: ffff88810cfa76b8\\n[ 28.519703] FS: 00007f14a0c94740(0000) GS:ffff88817bd00000(0000) knlGS:0000000000000000\\n[ 28.520148] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n[ 28.520472] CR2: 00007f14a0c8d000 CR3: 000000010321c004 CR4: 0000000000770ee0\\n[ 28.520863] PKRU: 55555554\\n[ 28.521043] Call Trace:\\n[ 28.521219] \u003cTASK\u003e\\n[ 28.521368] dax_fault_iter+0x196/0x390\\n[ 28.521595] dax_iomap_pte_fault+0x19b/0x3d0\\n[ 28.521852] __xfs_filemap_fault+0x234/0x2b0\\n[ 28.522116] __do_fault+0x30/0x130\\n[ 28.522334] do_fault+0x193/0x340\\n[ 28.522586] __handle_mm_fault+0x2d3/0x690\\n[ 28.522975] handle_mm_fault+0xe6/0x2c0\\n[ 28.523259] do_user_addr_fault+0x1bc/0x6f0\\n[ 28.523521] exc_page_fault+0x60/0x140\\n[ 28.523763] asm_exc_page_fault+0x22/0x30\\n[ 28.524001] RIP: 0033:0x7f14a0b589ca\\n[ 28.524225] Code: c5 fe 7f 07 c5 fe 7f 47 20 c5 fe 7f 47 40 c5 fe 7f 47 60 c5 f8 77 c3 66 0f 1f 84 00 00 00 00 00 40 0f b6 c6 48 89 d1 48 89 fa \u003cf3\u003e aa 48 89 d0 c5 f8 77 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90\\n[ 28.525198] RSP: 002b:00007fff1dea1c98 EFLAGS: 00010202\\n[ 28.525505] RAX: 000000000000001e RBX: 000000000014a000 RCX: 0000000000006046\\n[ 28.525895] RDX: 00007f14a0c82000 RSI: 000000000000001e RDI: 00007f14a0c8d000\\n[ 28.526290] RBP: 000000000000006f R08: 0000000000000004 R09: 000000000014a000\\n[ 28.526681] R10: 0000000000000008 R11: 0000000000000246 R12: 028f5c28f5c28f5c\\n[ 28.527067] R13: 8f5c28f5c28f5c29 R14: 0000000000011046 R15: 00007f14a0c946c0\\n[ 28.527449] \u003c/TASK\u003e\\n[ 28.527600] ---[ end trace 0000000000000000 ]---\\n\\n\\nTo be able to delete this entry, clear its dirty mark before\\ninvalidate_inode_pages2_range().\\n\\n[1] https://lore.kernel.org/linux-xfs/20230321151339.GA11376@frogsfrogsfrogs/\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.2.11\",\"matchCriteriaId\":\"93C03C9A-798F-4CD5-912F-A436BFA0CC7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E3B0E8-FA27-4305-87BB-AF6C25B160CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A47F0FC3-CE52-4BA1-BA51-22F783938431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3583026A-27EC-4A4C-850A-83F2AF970673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC271202-7570-4505-89A4-D602D47BFD00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D413BB6D-4F74-4C7D-9163-47786619EF53\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/f76b3a32879de215ced3f8c754c4077b0c2f79e3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/fac05f800abb63dc4d7cc48fe7edf16e0520dc1f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-53306\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-14T18:23:22.602517Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-14T18:23:18.780Z\"}}], \"cna\": {\"title\": \"fsdax: force clear dirty mark if CoW\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"f80e1668888f34c0764822e74953c997daf2ccdb\", \"lessThan\": \"fac05f800abb63dc4d7cc48fe7edf16e0520dc1f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f80e1668888f34c0764822e74953c997daf2ccdb\", \"lessThan\": \"f76b3a32879de215ced3f8c754c4077b0c2f79e3\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/dax.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.2\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.2.11\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.2.*\"}, {\"status\": \"unaffected\", \"version\": \"6.3\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/dax.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/fac05f800abb63dc4d7cc48fe7edf16e0520dc1f\"}, {\"url\": \"https://git.kernel.org/stable/c/f76b3a32879de215ced3f8c754c4077b0c2f79e3\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfsdax: force clear dirty mark if CoW\\n\\nXFS allows CoW on non-shared extents to combat fragmentation[1]. The old\\nnon-shared extent could be mwrited before, its dax entry is marked dirty. \\n\\nThis results in a WARNing:\\n\\n[ 28.512349] ------------[ cut here ]------------\\n[ 28.512622] WARNING: CPU: 2 PID: 5255 at fs/dax.c:390 dax_insert_entry+0x342/0x390\\n[ 28.513050] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace fscache netfs nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables\\n[ 28.515462] CPU: 2 PID: 5255 Comm: fsstress Kdump: loaded Not tainted 6.3.0-rc1-00001-g85e1481e19c1-dirty #117\\n[ 28.515902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS Arch Linux 1.16.1-1-1 04/01/2014\\n[ 28.516307] RIP: 0010:dax_insert_entry+0x342/0x390\\n[ 28.516536] Code: 30 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 48 8b 45 20 48 83 c0 01 e9 e2 fe ff ff 48 8b 45 20 48 83 c0 01 e9 cd fe ff ff \u003c0f\u003e 0b e9 53 ff ff ff 48 8b 7c 24 08 31 f6 e8 1b 61 a1 00 eb 8c 48\\n[ 28.517417] RSP: 0000:ffffc9000845fb18 EFLAGS: 00010086\\n[ 28.517721] RAX: 0000000000000053 RBX: 0000000000000155 RCX: 000000000018824b\\n[ 28.518113] RDX: 0000000000000000 RSI: ffffffff827525a6 RDI: 00000000ffffffff\\n[ 28.518515] RBP: ffffea00062092c0 R08: 0000000000000000 R09: ffffc9000845f9c8\\n[ 28.518905] R10: 0000000000000003 R11: ffffffff82ddb7e8 R12: 0000000000000155\\n[ 28.519301] R13: 0000000000000000 R14: 000000000018824b R15: ffff88810cfa76b8\\n[ 28.519703] FS: 00007f14a0c94740(0000) GS:ffff88817bd00000(0000) knlGS:0000000000000000\\n[ 28.520148] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n[ 28.520472] CR2: 00007f14a0c8d000 CR3: 000000010321c004 CR4: 0000000000770ee0\\n[ 28.520863] PKRU: 55555554\\n[ 28.521043] Call Trace:\\n[ 28.521219] \u003cTASK\u003e\\n[ 28.521368] dax_fault_iter+0x196/0x390\\n[ 28.521595] dax_iomap_pte_fault+0x19b/0x3d0\\n[ 28.521852] __xfs_filemap_fault+0x234/0x2b0\\n[ 28.522116] __do_fault+0x30/0x130\\n[ 28.522334] do_fault+0x193/0x340\\n[ 28.522586] __handle_mm_fault+0x2d3/0x690\\n[ 28.522975] handle_mm_fault+0xe6/0x2c0\\n[ 28.523259] do_user_addr_fault+0x1bc/0x6f0\\n[ 28.523521] exc_page_fault+0x60/0x140\\n[ 28.523763] asm_exc_page_fault+0x22/0x30\\n[ 28.524001] RIP: 0033:0x7f14a0b589ca\\n[ 28.524225] Code: c5 fe 7f 07 c5 fe 7f 47 20 c5 fe 7f 47 40 c5 fe 7f 47 60 c5 f8 77 c3 66 0f 1f 84 00 00 00 00 00 40 0f b6 c6 48 89 d1 48 89 fa \u003cf3\u003e aa 48 89 d0 c5 f8 77 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90\\n[ 28.525198] RSP: 002b:00007fff1dea1c98 EFLAGS: 00010202\\n[ 28.525505] RAX: 000000000000001e RBX: 000000000014a000 RCX: 0000000000006046\\n[ 28.525895] RDX: 00007f14a0c82000 RSI: 000000000000001e RDI: 00007f14a0c8d000\\n[ 28.526290] RBP: 000000000000006f R08: 0000000000000004 R09: 000000000014a000\\n[ 28.526681] R10: 0000000000000008 R11: 0000000000000246 R12: 028f5c28f5c28f5c\\n[ 28.527067] R13: 8f5c28f5c28f5c29 R14: 0000000000011046 R15: 00007f14a0c946c0\\n[ 28.527449] \u003c/TASK\u003e\\n[ 28.527600] ---[ end trace 0000000000000000 ]---\\n\\n\\nTo be able to delete this entry, clear its dirty mark before\\ninvalidate_inode_pages2_range().\\n\\n[1] https://lore.kernel.org/linux-xfs/20230321151339.GA11376@frogsfrogsfrogs/\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2.11\", \"versionStartIncluding\": \"6.2\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.3\", \"versionStartIncluding\": \"6.2\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-09-16T16:11:45.592Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-53306\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-14T18:32:56.347Z\", \"dateReserved\": \"2025-09-16T08:09:37.994Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2025-09-16T16:11:45.592Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
WID-SEC-W-2025-2077
Vulnerability from csaf_certbund - Published: 2025-09-16 22:00 - Updated: 2026-03-08 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht n\u00e4her beschriebene Auswirkungen zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2077 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2077.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2077 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2077"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50339",
"url": "https://lore.kernel.org/linux-cve-announce/2025091636-CVE-2022-50339-bc17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50340",
"url": "https://lore.kernel.org/linux-cve-announce/2025091638-CVE-2022-50340-693e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50341",
"url": "https://lore.kernel.org/linux-cve-announce/2025091638-CVE-2022-50341-12c1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50342",
"url": "https://lore.kernel.org/linux-cve-announce/2025091639-CVE-2022-50342-d7ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50343",
"url": "https://lore.kernel.org/linux-cve-announce/2025091639-CVE-2022-50343-75e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50344",
"url": "https://lore.kernel.org/linux-cve-announce/2025091639-CVE-2022-50344-8893@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50345",
"url": "https://lore.kernel.org/linux-cve-announce/2025091639-CVE-2022-50345-a1ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50346",
"url": "https://lore.kernel.org/linux-cve-announce/2025091639-CVE-2022-50346-49b1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50347",
"url": "https://lore.kernel.org/linux-cve-announce/2025091640-CVE-2022-50347-33c3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50348",
"url": "https://lore.kernel.org/linux-cve-announce/2025091640-CVE-2022-50348-534c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50349",
"url": "https://lore.kernel.org/linux-cve-announce/2025091640-CVE-2022-50349-cc37@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50350",
"url": "https://lore.kernel.org/linux-cve-announce/2025091640-CVE-2022-50350-31bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50351",
"url": "https://lore.kernel.org/linux-cve-announce/2025091640-CVE-2022-50351-ac59@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-50352",
"url": "https://lore.kernel.org/linux-cve-announce/2025091641-CVE-2022-50352-8531@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53304",
"url": "https://lore.kernel.org/linux-cve-announce/2025091641-CVE-2023-53304-9a57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53305",
"url": "https://lore.kernel.org/linux-cve-announce/2025091641-CVE-2023-53305-b8fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53306",
"url": "https://lore.kernel.org/linux-cve-announce/2025091641-CVE-2023-53306-b665@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53307",
"url": "https://lore.kernel.org/linux-cve-announce/2025091641-CVE-2023-53307-129b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53308",
"url": "https://lore.kernel.org/linux-cve-announce/2025091641-CVE-2023-53308-51a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53309",
"url": "https://lore.kernel.org/linux-cve-announce/2025091642-CVE-2023-53309-005a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53310",
"url": "https://lore.kernel.org/linux-cve-announce/2025091642-CVE-2023-53310-8d40@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53311",
"url": "https://lore.kernel.org/linux-cve-announce/2025091642-CVE-2023-53311-bff3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53312",
"url": "https://lore.kernel.org/linux-cve-announce/2025091642-CVE-2023-53312-a16b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53313",
"url": "https://lore.kernel.org/linux-cve-announce/2025091642-CVE-2023-53313-0f1c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53314",
"url": "https://lore.kernel.org/linux-cve-announce/2025091643-CVE-2023-53314-b727@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53315",
"url": "https://lore.kernel.org/linux-cve-announce/2025091643-CVE-2023-53315-2711@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53316",
"url": "https://lore.kernel.org/linux-cve-announce/2025091643-CVE-2023-53316-fb3d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53317",
"url": "https://lore.kernel.org/linux-cve-announce/2025091643-CVE-2023-53317-c945@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53318",
"url": "https://lore.kernel.org/linux-cve-announce/2025091643-CVE-2023-53318-633b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53319",
"url": "https://lore.kernel.org/linux-cve-announce/2025091643-CVE-2023-53319-4fd2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53320",
"url": "https://lore.kernel.org/linux-cve-announce/2025091644-CVE-2023-53320-d419@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53321",
"url": "https://lore.kernel.org/linux-cve-announce/2025091644-CVE-2023-53321-0003@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53322",
"url": "https://lore.kernel.org/linux-cve-announce/2025091644-CVE-2023-53322-45ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53323",
"url": "https://lore.kernel.org/linux-cve-announce/2025091644-CVE-2023-53323-6a1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53324",
"url": "https://lore.kernel.org/linux-cve-announce/2025091644-CVE-2023-53324-631a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53325",
"url": "https://lore.kernel.org/linux-cve-announce/2025091644-CVE-2023-53325-a6b9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53326",
"url": "https://lore.kernel.org/linux-cve-announce/2025091645-CVE-2023-53326-7ff5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53327",
"url": "https://lore.kernel.org/linux-cve-announce/2025091645-CVE-2023-53327-55c1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53328",
"url": "https://lore.kernel.org/linux-cve-announce/2025091645-CVE-2023-53328-07a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53329",
"url": "https://lore.kernel.org/linux-cve-announce/2025091645-CVE-2023-53329-d1d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53330",
"url": "https://lore.kernel.org/linux-cve-announce/2025091645-CVE-2023-53330-8d89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53331",
"url": "https://lore.kernel.org/linux-cve-announce/2025091645-CVE-2023-53331-50a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53332",
"url": "https://lore.kernel.org/linux-cve-announce/2025091646-CVE-2023-53332-9a4d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53333",
"url": "https://lore.kernel.org/linux-cve-announce/2025091646-CVE-2023-53333-f2b8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-53334",
"url": "https://lore.kernel.org/linux-cve-announce/2025091646-CVE-2023-53334-bd19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39805",
"url": "https://lore.kernel.org/linux-cve-announce/2025091610-CVE-2025-39805-2871@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39806",
"url": "https://lore.kernel.org/linux-cve-announce/2025091613-CVE-2025-39806-f74d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39807",
"url": "https://lore.kernel.org/linux-cve-announce/2025091613-CVE-2025-39807-4c3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39808",
"url": "https://lore.kernel.org/linux-cve-announce/2025091613-CVE-2025-39808-a964@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39809",
"url": "https://lore.kernel.org/linux-cve-announce/2025091614-CVE-2025-39809-396d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39810",
"url": "https://lore.kernel.org/linux-cve-announce/2025091614-CVE-2025-39810-ed5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39811",
"url": "https://lore.kernel.org/linux-cve-announce/2025091614-CVE-2025-39811-535b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39812",
"url": "https://lore.kernel.org/linux-cve-announce/2025091614-CVE-2025-39812-8a89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39813",
"url": "https://lore.kernel.org/linux-cve-announce/2025091614-CVE-2025-39813-295c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39814",
"url": "https://lore.kernel.org/linux-cve-announce/2025091614-CVE-2025-39814-1765@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39815",
"url": "https://lore.kernel.org/linux-cve-announce/2025091615-CVE-2025-39815-a663@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39816",
"url": "https://lore.kernel.org/linux-cve-announce/2025091615-CVE-2025-39816-f21d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39817",
"url": "https://lore.kernel.org/linux-cve-announce/2025091615-CVE-2025-39817-90b7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39818",
"url": "https://lore.kernel.org/linux-cve-announce/2025091615-CVE-2025-39818-f1b9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39819",
"url": "https://lore.kernel.org/linux-cve-announce/2025091615-CVE-2025-39819-d3c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39820",
"url": "https://lore.kernel.org/linux-cve-announce/2025091615-CVE-2025-39820-50d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39821",
"url": "https://lore.kernel.org/linux-cve-announce/2025091616-CVE-2025-39821-3812@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39822",
"url": "https://lore.kernel.org/linux-cve-announce/2025091616-CVE-2025-39822-454e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39823",
"url": "https://lore.kernel.org/linux-cve-announce/2025091616-CVE-2025-39823-f9bf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39824",
"url": "https://lore.kernel.org/linux-cve-announce/2025091616-CVE-2025-39824-6491@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39825",
"url": "https://lore.kernel.org/linux-cve-announce/2025091616-CVE-2025-39825-8a7a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39826",
"url": "https://lore.kernel.org/linux-cve-announce/2025091616-CVE-2025-39826-e096@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39827",
"url": "https://lore.kernel.org/linux-cve-announce/2025091617-CVE-2025-39827-0c7c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39828",
"url": "https://lore.kernel.org/linux-cve-announce/2025091617-CVE-2025-39828-c69f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39829",
"url": "https://lore.kernel.org/linux-cve-announce/2025091617-CVE-2025-39829-2ef1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39830",
"url": "https://lore.kernel.org/linux-cve-announce/2025091657-CVE-2025-39830-5341@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39831",
"url": "https://lore.kernel.org/linux-cve-announce/2025091657-CVE-2025-39831-1112@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39832",
"url": "https://lore.kernel.org/linux-cve-announce/2025091657-CVE-2025-39832-6bbc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39833",
"url": "https://lore.kernel.org/linux-cve-announce/2025091657-CVE-2025-39833-c2ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39834",
"url": "https://lore.kernel.org/linux-cve-announce/2025091657-CVE-2025-39834-4d8f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39835",
"url": "https://lore.kernel.org/linux-cve-announce/2025091658-CVE-2025-39835-6f82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39836",
"url": "https://lore.kernel.org/linux-cve-announce/2025091658-CVE-2025-39836-49ce@gregkh/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6008 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6009 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-090 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-106 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-106.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4328 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17797 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-17797.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:17812 vom 2025-10-18",
"url": "https://errata.build.resf.org/RLSA-2025:17812"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:17797 vom 2025-10-18",
"url": "https://errata.build.resf.org/RLSA-2025:17797"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18281 vom 2025-10-20",
"url": "https://access.redhat.com/errata/RHSA-2025:18281"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18318 vom 2025-10-20",
"url": "https://access.redhat.com/errata/RHSA-2025:18318"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-18281 vom 2025-10-20",
"url": "https://linux.oracle.com/errata/ELSA-2025-18281.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-18318 vom 2025-10-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-18318.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18932 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18932"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:18318 vom 2025-10-26",
"url": "https://errata.build.resf.org/RLSA-2025:18318"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19103 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19103"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19102 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19102"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19102 vom 2025-10-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-19102.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19105 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19105"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19105 vom 2025-10-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-19105.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19222 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19222"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19102 vom 2025-11-02",
"url": "https://errata.build.resf.org/RLSA-2025:19102"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19103 vom 2025-11-02",
"url": "https://errata.build.resf.org/RLSA-2025:19103"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19105 vom 2025-11-06",
"url": "https://errata.build.resf.org/RLSA-2025:19105"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19886 vom 2025-11-06",
"url": "https://access.redhat.com/errata/RHSA-2025:19886"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21051 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21051"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-25757.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21091 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21091"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21118 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21118"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21136 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21136"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21112 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21112"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21128 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21128"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21760 vom 2025-11-19",
"url": "https://access.redhat.com/errata/RHSA-2025:21760"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-1 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-2 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22006 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22006"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22066 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22066"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22072 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22072"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-3 vom 2025-11-26",
"url": "https://ubuntu.com/security/notices/USN-7879-3"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22124 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22124"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22095 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22095"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22087 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22087"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21926 vom 2025-11-26",
"url": "http://linux.oracle.com/errata/ELSA-2025-21926.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20091-1 vom 2025-11-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVNKE6YBHUN7AVUHO7UZCJJGK4HYS62H/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21112 vom 2025-11-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-21112.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21469 vom 2025-11-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-21469.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21040-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21052-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023389.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21056-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21064-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22388 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22388"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22387 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22387"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4301-1 vom 2025-11-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLIMXFMWOGTFRJZEC4XPGIMNBCRKQ7IF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21080-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21074-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4315-1 vom 2025-12-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22388 vom 2025-12-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-22388.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21118 vom 2025-12-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-21118.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22388 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22388"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22387 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22387"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-2 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7910-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7910-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22752 vom 2025-12-04",
"url": "https://access.redhat.com/errata/RHSA-2025:22752"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21463 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21463.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-4 vom 2025-12-05",
"url": "https://ubuntu.com/security/notices/USN-7909-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21931 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21931.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7253912 vom 2025-12-05",
"url": "https://www.ibm.com/support/pages/node/7253912"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22910 vom 2025-12-09",
"url": "https://access.redhat.com/errata/RHSA-2025:22910"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22914 vom 2025-12-09",
"url": "https://access.redhat.com/errata/RHSA-2025:22914"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21147-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21180-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4393-1 vom 2025-12-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-5 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7909-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7934-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7934-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7933-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7933-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23424 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23424"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7938-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7938-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23423 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23423"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23422 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23422"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23426 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23426"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7255154 vom 2025-12-17",
"url": "https://www.ibm.com/support/pages/node/7255154"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23425 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23425"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4422-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23463 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23463"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23947 vom 2025-12-22",
"url": "https://access.redhat.com/errata/RHSA-2025:23947"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23960 vom 2025-12-22",
"url": "https://access.redhat.com/errata/RHSA-2025:23960"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4505-1 vom 2025-12-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3D5W2444LYTUJVXYGB63LTMU25GRLRJR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4515-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4517-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4516-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-116 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-116.html"
},
{
"category": "external",
"summary": "RedHat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2026:0271"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20015-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20021-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20012-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0453 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0453"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0457 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0457"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0453 vom 2026-01-13",
"url": "https://linux.oracle.com/errata/ELSA-2026-0453.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0489 vom 2026-01-13",
"url": "https://access.redhat.com/errata/RHSA-2026:0489"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0445 vom 2026-01-13",
"url": "https://linux.oracle.com/errata/ELSA-2026-0445.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0536 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0536"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0537 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0537"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50007 vom 2026-01-14",
"url": "https://linux.oracle.com/errata/ELSA-2026-50007.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0535 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0535"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0533 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0533"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0532 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0532"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0534 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0534"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0576 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0576"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0643 vom 2026-01-15",
"url": "https://access.redhat.com/errata/RHSA-2026:0643"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4436 vom 2026-01-14",
"url": "https://lists.debian.org/debian-lts-announce/2026/01/msg00007.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20039-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20059-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0445 vom 2026-01-17",
"url": "https://errata.build.resf.org/RLSA-2026:0445"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0453 vom 2026-01-17",
"url": "https://errata.build.resf.org/RLSA-2026:0453"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0950 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0950"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22910 vom 2026-01-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-22910.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-030 vom 2026-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23947 vom 2026-01-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-23947.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1886 vom 2026-02-04",
"url": "https://access.redhat.com/errata/RHSA-2026:1886"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2490 vom 2026-02-11",
"url": "https://access.redhat.com/errata/RHSA-2026:2490"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0471-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2664 vom 2026-02-12",
"url": "https://access.redhat.com/errata/RHSA-2026:2664"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20316-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20332-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0524-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024255.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0526-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024253.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20334-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0528-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024252.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0515-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024264.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0535-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024250.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20333-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0521-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024256.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0539-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024249.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0518-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024257.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0542-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024248.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20317-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0565-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024284.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0566-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024330.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0755 vom 2026-02-18",
"url": "https://linux.oracle.com/errata/ELSA-2026-0755.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20473-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024411.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20478-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20496-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20287-1 vom 2026-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7KIWX7XP3UMVFSHT47OOZ24TQQYNNHI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20519-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3634 vom 2026-03-03",
"url": "https://access.redhat.com/errata/RHSA-2026:3634"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3685 vom 2026-03-03",
"url": "https://access.redhat.com/errata/RHSA-2026:3685"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1581 vom 2026-03-04",
"url": "https://linux.oracle.com/errata/ELSA-2026-1581.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20555-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024590.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20615-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20560-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20561-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20570-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20599-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20562-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4012 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4012"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-08T23:00:00.000+00:00",
"generator": {
"date": "2026-03-09T10:36:56.643+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2077",
"initial_release_date": "2025-09-16T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, SUSE und Red Hat aufgenommen"
},
{
"date": "2025-10-20T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE, Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-02T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-11-05T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Ubuntu, openSUSE und Red Hat aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Oracle Linux und IBM aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von IBM, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-01-07T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Red Hat, Debian und SUSE aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-03T23:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "66"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vProxy \u003c19.14",
"product": {
"name": "Dell NetWorker vProxy \u003c19.14",
"product_id": "T050451"
}
},
{
"category": "product_version",
"name": "vProxy 19.14",
"product": {
"name": "Dell NetWorker vProxy 19.14",
"product_id": "T050451-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.14"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF03",
"product_id": "T049499"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF03",
"product_id": "T049499-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if03"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028463",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "10",
"product": {
"name": "Red Hat Enterprise Linux 10",
"product_id": "T048374",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50339",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50339"
},
{
"cve": "CVE-2022-50340",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50340"
},
{
"cve": "CVE-2022-50341",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50341"
},
{
"cve": "CVE-2022-50342",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50342"
},
{
"cve": "CVE-2022-50343",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50343"
},
{
"cve": "CVE-2022-50344",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50344"
},
{
"cve": "CVE-2022-50345",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50345"
},
{
"cve": "CVE-2022-50346",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50346"
},
{
"cve": "CVE-2022-50347",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50347"
},
{
"cve": "CVE-2022-50348",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50348"
},
{
"cve": "CVE-2022-50349",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50349"
},
{
"cve": "CVE-2022-50350",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50350"
},
{
"cve": "CVE-2022-50351",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50351"
},
{
"cve": "CVE-2022-50352",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2022-50352"
},
{
"cve": "CVE-2023-53304",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53304"
},
{
"cve": "CVE-2023-53305",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53305"
},
{
"cve": "CVE-2023-53306",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53306"
},
{
"cve": "CVE-2023-53307",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53307"
},
{
"cve": "CVE-2023-53308",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53308"
},
{
"cve": "CVE-2023-53309",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53309"
},
{
"cve": "CVE-2023-53310",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53310"
},
{
"cve": "CVE-2023-53311",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53311"
},
{
"cve": "CVE-2023-53312",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53312"
},
{
"cve": "CVE-2023-53313",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53313"
},
{
"cve": "CVE-2023-53314",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53314"
},
{
"cve": "CVE-2023-53315",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53315"
},
{
"cve": "CVE-2023-53316",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53316"
},
{
"cve": "CVE-2023-53317",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53317"
},
{
"cve": "CVE-2023-53318",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53318"
},
{
"cve": "CVE-2023-53319",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53319"
},
{
"cve": "CVE-2023-53320",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53320"
},
{
"cve": "CVE-2023-53321",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53321"
},
{
"cve": "CVE-2023-53322",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53322"
},
{
"cve": "CVE-2023-53323",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53323"
},
{
"cve": "CVE-2023-53324",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53324"
},
{
"cve": "CVE-2023-53325",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53325"
},
{
"cve": "CVE-2023-53326",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53326"
},
{
"cve": "CVE-2023-53327",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53327"
},
{
"cve": "CVE-2023-53328",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53328"
},
{
"cve": "CVE-2023-53329",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53329"
},
{
"cve": "CVE-2023-53330",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53330"
},
{
"cve": "CVE-2023-53331",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53331"
},
{
"cve": "CVE-2023-53332",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53332"
},
{
"cve": "CVE-2023-53333",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53333"
},
{
"cve": "CVE-2023-53334",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2023-53334"
},
{
"cve": "CVE-2025-39805",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39806",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39806"
},
{
"cve": "CVE-2025-39807",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39807"
},
{
"cve": "CVE-2025-39808",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39808"
},
{
"cve": "CVE-2025-39809",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39809"
},
{
"cve": "CVE-2025-39810",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39810"
},
{
"cve": "CVE-2025-39811",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39811"
},
{
"cve": "CVE-2025-39812",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39812"
},
{
"cve": "CVE-2025-39813",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39813"
},
{
"cve": "CVE-2025-39814",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39814"
},
{
"cve": "CVE-2025-39815",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39815"
},
{
"cve": "CVE-2025-39816",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39816"
},
{
"cve": "CVE-2025-39817",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39817"
},
{
"cve": "CVE-2025-39818",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39818"
},
{
"cve": "CVE-2025-39819",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39820",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39820"
},
{
"cve": "CVE-2025-39821",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39821"
},
{
"cve": "CVE-2025-39822",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39823",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39823"
},
{
"cve": "CVE-2025-39824",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39824"
},
{
"cve": "CVE-2025-39825",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39825"
},
{
"cve": "CVE-2025-39826",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39826"
},
{
"cve": "CVE-2025-39827",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39827"
},
{
"cve": "CVE-2025-39828",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39828"
},
{
"cve": "CVE-2025-39829",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39829"
},
{
"cve": "CVE-2025-39830",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39830"
},
{
"cve": "CVE-2025-39831",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39832",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39832"
},
{
"cve": "CVE-2025-39833",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39833"
},
{
"cve": "CVE-2025-39834",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39834"
},
{
"cve": "CVE-2025-39835",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39835"
},
{
"cve": "CVE-2025-39836",
"product_status": {
"known_affected": [
"T028463",
"67646",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T000126",
"T021415",
"T027843",
"T049499",
"398363",
"T048374",
"T048301"
]
},
"release_date": "2025-09-16T22:00:00.000+00:00",
"title": "CVE-2025-39836"
}
]
}
GHSA-9247-9GC6-2W2P
Vulnerability from github – Published: 2025-09-16 18:31 – Updated: 2025-12-02 00:31In the Linux kernel, the following vulnerability has been resolved:
fsdax: force clear dirty mark if CoW
XFS allows CoW on non-shared extents to combat fragmentation[1]. The old non-shared extent could be mwrited before, its dax entry is marked dirty.
This results in a WARNing:
[ 28.512349] ------------[ cut here ]------------ [ 28.512622] WARNING: CPU: 2 PID: 5255 at fs/dax.c:390 dax_insert_entry+0x342/0x390 [ 28.513050] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace fscache netfs nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables [ 28.515462] CPU: 2 PID: 5255 Comm: fsstress Kdump: loaded Not tainted 6.3.0-rc1-00001-g85e1481e19c1-dirty #117 [ 28.515902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS Arch Linux 1.16.1-1-1 04/01/2014 [ 28.516307] RIP: 0010:dax_insert_entry+0x342/0x390 [ 28.516536] Code: 30 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 48 8b 45 20 48 83 c0 01 e9 e2 fe ff ff 48 8b 45 20 48 83 c0 01 e9 cd fe ff ff <0f> 0b e9 53 ff ff ff 48 8b 7c 24 08 31 f6 e8 1b 61 a1 00 eb 8c 48 [ 28.517417] RSP: 0000:ffffc9000845fb18 EFLAGS: 00010086 [ 28.517721] RAX: 0000000000000053 RBX: 0000000000000155 RCX: 000000000018824b [ 28.518113] RDX: 0000000000000000 RSI: ffffffff827525a6 RDI: 00000000ffffffff [ 28.518515] RBP: ffffea00062092c0 R08: 0000000000000000 R09: ffffc9000845f9c8 [ 28.518905] R10: 0000000000000003 R11: ffffffff82ddb7e8 R12: 0000000000000155 [ 28.519301] R13: 0000000000000000 R14: 000000000018824b R15: ffff88810cfa76b8 [ 28.519703] FS: 00007f14a0c94740(0000) GS:ffff88817bd00000(0000) knlGS:0000000000000000 [ 28.520148] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.520472] CR2: 00007f14a0c8d000 CR3: 000000010321c004 CR4: 0000000000770ee0 [ 28.520863] PKRU: 55555554 [ 28.521043] Call Trace: [ 28.521219] [ 28.521368] dax_fault_iter+0x196/0x390 [ 28.521595] dax_iomap_pte_fault+0x19b/0x3d0 [ 28.521852] __xfs_filemap_fault+0x234/0x2b0 [ 28.522116] __do_fault+0x30/0x130 [ 28.522334] do_fault+0x193/0x340 [ 28.522586] __handle_mm_fault+0x2d3/0x690 [ 28.522975] handle_mm_fault+0xe6/0x2c0 [ 28.523259] do_user_addr_fault+0x1bc/0x6f0 [ 28.523521] exc_page_fault+0x60/0x140 [ 28.523763] asm_exc_page_fault+0x22/0x30 [ 28.524001] RIP: 0033:0x7f14a0b589ca [ 28.524225] Code: c5 fe 7f 07 c5 fe 7f 47 20 c5 fe 7f 47 40 c5 fe 7f 47 60 c5 f8 77 c3 66 0f 1f 84 00 00 00 00 00 40 0f b6 c6 48 89 d1 48 89 fa aa 48 89 d0 c5 f8 77 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 [ 28.525198] RSP: 002b:00007fff1dea1c98 EFLAGS: 00010202 [ 28.525505] RAX: 000000000000001e RBX: 000000000014a000 RCX: 0000000000006046 [ 28.525895] RDX: 00007f14a0c82000 RSI: 000000000000001e RDI: 00007f14a0c8d000 [ 28.526290] RBP: 000000000000006f R08: 0000000000000004 R09: 000000000014a000 [ 28.526681] R10: 0000000000000008 R11: 0000000000000246 R12: 028f5c28f5c28f5c [ 28.527067] R13: 8f5c28f5c28f5c29 R14: 0000000000011046 R15: 00007f14a0c946c0 [ 28.527449] [ 28.527600] ---[ end trace 0000000000000000 ]---
To be able to delete this entry, clear its dirty mark before invalidate_inode_pages2_range().
[1] https://lore.kernel.org/linux-xfs/20230321151339.GA11376@frogsfrogsfrogs/
{
"affected": [],
"aliases": [
"CVE-2023-53306"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-16T17:15:36Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsdax: force clear dirty mark if CoW\n\nXFS allows CoW on non-shared extents to combat fragmentation[1]. The old\nnon-shared extent could be mwrited before, its dax entry is marked dirty. \n\nThis results in a WARNing:\n\n[ 28.512349] ------------[ cut here ]------------\n[ 28.512622] WARNING: CPU: 2 PID: 5255 at fs/dax.c:390 dax_insert_entry+0x342/0x390\n[ 28.513050] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace fscache netfs nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables\n[ 28.515462] CPU: 2 PID: 5255 Comm: fsstress Kdump: loaded Not tainted 6.3.0-rc1-00001-g85e1481e19c1-dirty #117\n[ 28.515902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS Arch Linux 1.16.1-1-1 04/01/2014\n[ 28.516307] RIP: 0010:dax_insert_entry+0x342/0x390\n[ 28.516536] Code: 30 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 48 8b 45 20 48 83 c0 01 e9 e2 fe ff ff 48 8b 45 20 48 83 c0 01 e9 cd fe ff ff \u003c0f\u003e 0b e9 53 ff ff ff 48 8b 7c 24 08 31 f6 e8 1b 61 a1 00 eb 8c 48\n[ 28.517417] RSP: 0000:ffffc9000845fb18 EFLAGS: 00010086\n[ 28.517721] RAX: 0000000000000053 RBX: 0000000000000155 RCX: 000000000018824b\n[ 28.518113] RDX: 0000000000000000 RSI: ffffffff827525a6 RDI: 00000000ffffffff\n[ 28.518515] RBP: ffffea00062092c0 R08: 0000000000000000 R09: ffffc9000845f9c8\n[ 28.518905] R10: 0000000000000003 R11: ffffffff82ddb7e8 R12: 0000000000000155\n[ 28.519301] R13: 0000000000000000 R14: 000000000018824b R15: ffff88810cfa76b8\n[ 28.519703] FS: 00007f14a0c94740(0000) GS:ffff88817bd00000(0000) knlGS:0000000000000000\n[ 28.520148] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 28.520472] CR2: 00007f14a0c8d000 CR3: 000000010321c004 CR4: 0000000000770ee0\n[ 28.520863] PKRU: 55555554\n[ 28.521043] Call Trace:\n[ 28.521219] \u003cTASK\u003e\n[ 28.521368] dax_fault_iter+0x196/0x390\n[ 28.521595] dax_iomap_pte_fault+0x19b/0x3d0\n[ 28.521852] __xfs_filemap_fault+0x234/0x2b0\n[ 28.522116] __do_fault+0x30/0x130\n[ 28.522334] do_fault+0x193/0x340\n[ 28.522586] __handle_mm_fault+0x2d3/0x690\n[ 28.522975] handle_mm_fault+0xe6/0x2c0\n[ 28.523259] do_user_addr_fault+0x1bc/0x6f0\n[ 28.523521] exc_page_fault+0x60/0x140\n[ 28.523763] asm_exc_page_fault+0x22/0x30\n[ 28.524001] RIP: 0033:0x7f14a0b589ca\n[ 28.524225] Code: c5 fe 7f 07 c5 fe 7f 47 20 c5 fe 7f 47 40 c5 fe 7f 47 60 c5 f8 77 c3 66 0f 1f 84 00 00 00 00 00 40 0f b6 c6 48 89 d1 48 89 fa \u003cf3\u003e aa 48 89 d0 c5 f8 77 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90\n[ 28.525198] RSP: 002b:00007fff1dea1c98 EFLAGS: 00010202\n[ 28.525505] RAX: 000000000000001e RBX: 000000000014a000 RCX: 0000000000006046\n[ 28.525895] RDX: 00007f14a0c82000 RSI: 000000000000001e RDI: 00007f14a0c8d000\n[ 28.526290] RBP: 000000000000006f R08: 0000000000000004 R09: 000000000014a000\n[ 28.526681] R10: 0000000000000008 R11: 0000000000000246 R12: 028f5c28f5c28f5c\n[ 28.527067] R13: 8f5c28f5c28f5c29 R14: 0000000000011046 R15: 00007f14a0c946c0\n[ 28.527449] \u003c/TASK\u003e\n[ 28.527600] ---[ end trace 0000000000000000 ]---\n\n\nTo be able to delete this entry, clear its dirty mark before\ninvalidate_inode_pages2_range().\n\n[1] https://lore.kernel.org/linux-xfs/20230321151339.GA11376@frogsfrogsfrogs/",
"id": "GHSA-9247-9gc6-2w2p",
"modified": "2025-12-02T00:31:10Z",
"published": "2025-09-16T18:31:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53306"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/f76b3a32879de215ced3f8c754c4077b0c2f79e3"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/fac05f800abb63dc4d7cc48fe7edf16e0520dc1f"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2023-53306
Vulnerability from fkie_nvd - Published: 2025-09-16 17:15 - Updated: 2026-01-14 19:165.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.3 | |
| linux | linux_kernel | 6.3 | |
| linux | linux_kernel | 6.3 | |
| linux | linux_kernel | 6.3 | |
| linux | linux_kernel | 6.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93C03C9A-798F-4CD5-912F-A436BFA0CC7E",
"versionEndExcluding": "6.2.11",
"versionStartIncluding": "6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B8E3B0E8-FA27-4305-87BB-AF6C25B160CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "A47F0FC3-CE52-4BA1-BA51-22F783938431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3583026A-27EC-4A4C-850A-83F2AF970673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*",
"matchCriteriaId": "DC271202-7570-4505-89A4-D602D47BFD00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*",
"matchCriteriaId": "D413BB6D-4F74-4C7D-9163-47786619EF53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsdax: force clear dirty mark if CoW\n\nXFS allows CoW on non-shared extents to combat fragmentation[1]. The old\nnon-shared extent could be mwrited before, its dax entry is marked dirty. \n\nThis results in a WARNing:\n\n[ 28.512349] ------------[ cut here ]------------\n[ 28.512622] WARNING: CPU: 2 PID: 5255 at fs/dax.c:390 dax_insert_entry+0x342/0x390\n[ 28.513050] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace fscache netfs nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables\n[ 28.515462] CPU: 2 PID: 5255 Comm: fsstress Kdump: loaded Not tainted 6.3.0-rc1-00001-g85e1481e19c1-dirty #117\n[ 28.515902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS Arch Linux 1.16.1-1-1 04/01/2014\n[ 28.516307] RIP: 0010:dax_insert_entry+0x342/0x390\n[ 28.516536] Code: 30 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 48 8b 45 20 48 83 c0 01 e9 e2 fe ff ff 48 8b 45 20 48 83 c0 01 e9 cd fe ff ff \u003c0f\u003e 0b e9 53 ff ff ff 48 8b 7c 24 08 31 f6 e8 1b 61 a1 00 eb 8c 48\n[ 28.517417] RSP: 0000:ffffc9000845fb18 EFLAGS: 00010086\n[ 28.517721] RAX: 0000000000000053 RBX: 0000000000000155 RCX: 000000000018824b\n[ 28.518113] RDX: 0000000000000000 RSI: ffffffff827525a6 RDI: 00000000ffffffff\n[ 28.518515] RBP: ffffea00062092c0 R08: 0000000000000000 R09: ffffc9000845f9c8\n[ 28.518905] R10: 0000000000000003 R11: ffffffff82ddb7e8 R12: 0000000000000155\n[ 28.519301] R13: 0000000000000000 R14: 000000000018824b R15: ffff88810cfa76b8\n[ 28.519703] FS: 00007f14a0c94740(0000) GS:ffff88817bd00000(0000) knlGS:0000000000000000\n[ 28.520148] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 28.520472] CR2: 00007f14a0c8d000 CR3: 000000010321c004 CR4: 0000000000770ee0\n[ 28.520863] PKRU: 55555554\n[ 28.521043] Call Trace:\n[ 28.521219] \u003cTASK\u003e\n[ 28.521368] dax_fault_iter+0x196/0x390\n[ 28.521595] dax_iomap_pte_fault+0x19b/0x3d0\n[ 28.521852] __xfs_filemap_fault+0x234/0x2b0\n[ 28.522116] __do_fault+0x30/0x130\n[ 28.522334] do_fault+0x193/0x340\n[ 28.522586] __handle_mm_fault+0x2d3/0x690\n[ 28.522975] handle_mm_fault+0xe6/0x2c0\n[ 28.523259] do_user_addr_fault+0x1bc/0x6f0\n[ 28.523521] exc_page_fault+0x60/0x140\n[ 28.523763] asm_exc_page_fault+0x22/0x30\n[ 28.524001] RIP: 0033:0x7f14a0b589ca\n[ 28.524225] Code: c5 fe 7f 07 c5 fe 7f 47 20 c5 fe 7f 47 40 c5 fe 7f 47 60 c5 f8 77 c3 66 0f 1f 84 00 00 00 00 00 40 0f b6 c6 48 89 d1 48 89 fa \u003cf3\u003e aa 48 89 d0 c5 f8 77 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90\n[ 28.525198] RSP: 002b:00007fff1dea1c98 EFLAGS: 00010202\n[ 28.525505] RAX: 000000000000001e RBX: 000000000014a000 RCX: 0000000000006046\n[ 28.525895] RDX: 00007f14a0c82000 RSI: 000000000000001e RDI: 00007f14a0c8d000\n[ 28.526290] RBP: 000000000000006f R08: 0000000000000004 R09: 000000000014a000\n[ 28.526681] R10: 0000000000000008 R11: 0000000000000246 R12: 028f5c28f5c28f5c\n[ 28.527067] R13: 8f5c28f5c28f5c29 R14: 0000000000011046 R15: 00007f14a0c946c0\n[ 28.527449] \u003c/TASK\u003e\n[ 28.527600] ---[ end trace 0000000000000000 ]---\n\n\nTo be able to delete this entry, clear its dirty mark before\ninvalidate_inode_pages2_range().\n\n[1] https://lore.kernel.org/linux-xfs/20230321151339.GA11376@frogsfrogsfrogs/"
}
],
"id": "CVE-2023-53306",
"lastModified": "2026-01-14T19:16:23.430",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-09-16T17:15:36.370",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/f76b3a32879de215ced3f8c754c4077b0c2f79e3"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/fac05f800abb63dc4d7cc48fe7edf16e0520dc1f"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.