Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-21755 (GCVE-0-2025-21755)
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2025-03-27T13:48:12.158Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "rejectedReasons": [ { "lang": "en", "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2025-21755", "datePublished": "2025-02-27T02:18:11.055Z", "dateRejected": "2025-03-27T13:48:12.158Z", "dateReserved": "2024-12-29T08:45:45.760Z", "dateUpdated": "2025-03-27T13:48:12.158Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-21755\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-02-27T03:15:16.150\",\"lastModified\":\"2025-03-27T14:15:42.423\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}],\"metrics\":{},\"references\":[]}}" } }
wid-sec-w-2025-1944
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das Android Betriebssystem ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen oder andere nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Android", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1944 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1944.json" }, { "category": "self", "summary": "WID-SEC-2025-1944 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1944" }, { "category": "external", "summary": "Sicherheitsbulletin f\u00fcr Android \u2013 September 2025 vom 2025-09-02", "url": "https://source.android.com/docs/security/bulletin/2025-09-01" } ], "source_lang": "en-US", "title": "Android Patchday September 2025: Multiple Vulnerabilities", "tracking": { "current_release_date": "2025-09-08T22:00:00.000+00:00", "generator": { "date": "2025-09-09T07:41:17.056+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1944", "initial_release_date": "2025-09-02T22:00:00.000+00:00", "revision_history": [ { "date": "2025-09-02T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-09-04T22:00:00.000+00:00", "number": "2", "summary": "Referenz(en) aufgenommen: EUVD-2025-26818, EUVD-2025-26819, EUVD-2025-26822, EUVD-2025-26823, EUVD-2025-26824, EUVD-2025-26825, EUVD-2025-26826, EUVD-2025-26828, EUVD-2025-26829, EUVD-2025-26830, EUVD-2025-26831, EUVD-2025-26834, EUVD-2025-26835, EUVD-2025-26836, EUVD-2025-26837, EUVD-2025-26796, EUVD-2025-26804, EUVD-2025-26805, EUVD-2025-26806, EUVD-2025-26807, EUVD-2025-26808, EUVD-2025-26811, EUVD-2025-26814, EUVD-2025-26815, EUVD-2025-26816, EUVD-2025-26827, EUVD-2025-26832, EUVD-2025-26795, EUVD-2025-26833, EUVD-2025-26803, EUVD-2025-26809, EUVD-2025-26799, EUVD-2025-26800, EUVD-2025-26810, EUVD-2025-26812, EUVD-2025-26813, EUVD-2025-26817, EUVD-2025-26791, EUVD-2025-26797, EUVD-2025-26798, EUVD-2025-26801, EUVD-2025-26802, EUVD-2024-54966, EUVD-2025-26792, EUVD-2025-26793, EUVD-2025-26794, EUVD-2025-26838, EUVD-2025-26839, EUVD-2025-26840, EUVD-2025-26841, EUVD-2025-26842, EUVD-2025-26843, EUVD-2025-26844, EUVD-2025-26845, EUVD-2025-26846, EUVD-2025-26820, EUVD-2025-26821" }, { "date": "2025-09-08T22:00:00.000+00:00", "number": "3", "summary": "Referenz(en) aufgenommen: EUVD-2025-27124" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "13 \u003c2025-09-05", "product": { "name": "Google Android 13 \u003c2025-09-05", "product_id": "T046664" } }, { "category": "product_version", "name": "13 2025-09-05", "product": { "name": "Google Android 13 2025-09-05", "product_id": "T046664-fixed", "product_identification_helper": { "cpe": "cpe:/o:google:android:13__2025-09-05" } } }, { "category": "product_version_range", "name": "14 \u003c2025-09-05", "product": { "name": "Google Android 14 \u003c2025-09-05", "product_id": "T046665" } }, { "category": "product_version", "name": "14 2025-09-05", "product": { "name": "Google Android 14 2025-09-05", "product_id": "T046665-fixed", "product_identification_helper": { "cpe": "cpe:/o:google:android:14__2025-09-05" } } }, { "category": "product_version_range", "name": "15 \u003c2025-09-05", "product": { "name": "Google Android 15 \u003c2025-09-05", "product_id": "T046666" } }, { "category": "product_version", "name": "15 2025-09-05", "product": { "name": "Google Android 15 2025-09-05", "product_id": "T046666-fixed", "product_identification_helper": { "cpe": "cpe:/o:google:android:15__2025-09-05" } } }, { "category": "product_version_range", "name": "16 \u003c2025-09-05", "product": { "name": "Google Android 16 \u003c2025-09-05", "product_id": "T046667" } }, { "category": "product_version", "name": "16 2025-09-05", "product": { "name": "Google Android 16 2025-09-05", "product_id": "T046667-fixed", "product_identification_helper": { "cpe": "cpe:/o:google:android:16__2025-09-05" } } } ], "category": "product_name", "name": "Android" } ], "category": "vendor", "name": "Google" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-48524", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48524" }, { "cve": "CVE-2025-48526", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48526" }, { "cve": "CVE-2025-48527", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48527" }, { "cve": "CVE-2025-48528", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48528" }, { "cve": "CVE-2025-48529", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48529" }, { "cve": "CVE-2025-48531", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48531" }, { "cve": "CVE-2025-48532", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48532" }, { "cve": "CVE-2025-48534", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48534" }, { "cve": "CVE-2025-48535", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48535" }, { "cve": "CVE-2025-48537", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48537" }, { "cve": "CVE-2025-48538", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48538" }, { "cve": "CVE-2025-48539", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48539" }, { "cve": "CVE-2025-48540", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48540" }, { "cve": "CVE-2025-48541", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48541" }, { "cve": "CVE-2025-48542", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48542" }, { "cve": "CVE-2025-48543", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48543" }, { "cve": "CVE-2025-48544", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48544" }, { "cve": "CVE-2025-48545", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48545" }, { "cve": "CVE-2025-48546", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48546" }, { "cve": "CVE-2025-48547", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48547" }, { "cve": "CVE-2025-48548", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48548" }, { "cve": "CVE-2025-48549", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48549" }, { "cve": "CVE-2025-48550", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48550" }, { "cve": "CVE-2025-48551", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48551" }, { "cve": "CVE-2025-48552", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48552" }, { "cve": "CVE-2025-48553", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48553" }, { "cve": "CVE-2025-48554", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48554" }, { "cve": "CVE-2025-48556", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48556" }, { "cve": "CVE-2025-48558", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48558" }, { "cve": "CVE-2025-48559", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48559" }, { "cve": "CVE-2025-48560", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48560" }, { "cve": "CVE-2025-48561", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48561" }, { "cve": "CVE-2025-48562", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48562" }, { "cve": "CVE-2025-48563", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48563" }, { "cve": "CVE-2025-48581", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48581" }, { "cve": "CVE-2025-8109", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-8109" }, { "cve": "CVE-2021-39810", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2021-39810" }, { "cve": "CVE-2023-24023", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2023-24023" }, { "cve": "CVE-2024-47898", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2024-47898" }, { "cve": "CVE-2024-47899", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2024-47899" }, { "cve": "CVE-2024-49714", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2024-49714" }, { "cve": "CVE-2024-7881", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2024-7881" }, { "cve": "CVE-2025-0076", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-0076" }, { "cve": "CVE-2025-0089", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-0089" }, { "cve": "CVE-2025-021701", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-021701" }, { "cve": "CVE-2025-0467", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-0467" }, { "cve": "CVE-2025-1246", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-1246" }, { "cve": "CVE-2025-1706", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-1706" }, { "cve": "CVE-2025-20696", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-20696" }, { "cve": "CVE-2025-20703", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-20703" }, { "cve": "CVE-2025-20704", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-20704" }, { "cve": "CVE-2025-20708", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-20708" }, { "cve": "CVE-2025-21427", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21427" }, { "cve": "CVE-2025-21432", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21432" }, { "cve": "CVE-2025-21433", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21433" }, { "cve": "CVE-2025-21446", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21446" }, { "cve": "CVE-2025-21449", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21449" }, { "cve": "CVE-2025-21450", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21450" }, { "cve": "CVE-2025-21454", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21454" }, { "cve": "CVE-2025-21464", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21464" }, { "cve": "CVE-2025-21465", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21465" }, { "cve": "CVE-2025-21477", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21477" }, { "cve": "CVE-2025-21481", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21481" }, { "cve": "CVE-2025-21482", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21482" }, { "cve": "CVE-2025-21483", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21483" }, { "cve": "CVE-2025-21484", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21484" }, { "cve": "CVE-2025-21487", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21487" }, { "cve": "CVE-2025-21488", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21488" }, { "cve": "CVE-2025-21755", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-21755" }, { "cve": "CVE-2025-25179", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-25179" }, { "cve": "CVE-2025-25180", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-25180" }, { "cve": "CVE-2025-26454", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-26454" }, { "cve": "CVE-2025-26464", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-26464" }, { "cve": "CVE-2025-27032", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-27032" }, { "cve": "CVE-2025-27034", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-27034" }, { "cve": "CVE-2025-27042", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-27042" }, { "cve": "CVE-2025-27043", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-27043" }, { "cve": "CVE-2025-27052", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-27052" }, { "cve": "CVE-2025-27056", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-27056" }, { "cve": "CVE-2025-27057", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-27057" }, { "cve": "CVE-2025-27061", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-27061" }, { "cve": "CVE-2025-27065", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-27065" }, { "cve": "CVE-2025-27066", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-27066" }, { "cve": "CVE-2025-27073", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-27073" }, { "cve": "CVE-2025-3212", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-3212" }, { "cve": "CVE-2025-32321", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32321" }, { "cve": "CVE-2025-32323", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32323" }, { "cve": "CVE-2025-32324", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32324" }, { "cve": "CVE-2025-32325", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32325" }, { "cve": "CVE-2025-32326", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32326" }, { "cve": "CVE-2025-32327", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32327" }, { "cve": "CVE-2025-32330", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32330" }, { "cve": "CVE-2025-32331", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32331" }, { "cve": "CVE-2025-32332", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32332" }, { "cve": "CVE-2025-32333", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32333" }, { "cve": "CVE-2025-32345", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32345" }, { "cve": "CVE-2025-32346", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32346" }, { "cve": "CVE-2025-32347", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32347" }, { "cve": "CVE-2025-32349", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32349" }, { "cve": "CVE-2025-32350", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-32350" }, { "cve": "CVE-2025-38352", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-38352" }, { "cve": "CVE-2025-46707", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-46707" }, { "cve": "CVE-2025-46708", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-46708" }, { "cve": "CVE-2025-46710", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-46710" }, { "cve": "CVE-2025-47317", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-47317" }, { "cve": "CVE-2025-47318", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-47318" }, { "cve": "CVE-2025-47326", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-47326" }, { "cve": "CVE-2025-47328", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-47328" }, { "cve": "CVE-2025-47329", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-47329" }, { "cve": "CVE-2025-48522", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48522" }, { "cve": "CVE-2025-48523", "product_status": { "known_affected": [ "T046666", "T046667", "T046664", "T046665" ] }, "release_date": "2025-09-02T22:00:00.000+00:00", "title": "CVE-2025-48523" } ] }
wid-sec-w-2025-0453
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0453 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0453.json" }, { "category": "self", "summary": "WID-SEC-2025-0453 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0453" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49732", "url": "https://lore.kernel.org/linux-cve-announce/2025022619-CVE-2022-49732-fc0d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-49570", "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2024-49570-d2e7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-52557", "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-52557-506d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-52559", "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-52559-6125@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-52560", "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-52560-8446@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54456", "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-54456-e8a9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-54458", "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-54458-75cd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57834", "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-57834-f004@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57852", "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2024-57852-f942@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57953", "url": "https://lore.kernel.org/linux-cve-announce/2025022631-CVE-2024-57953-9830@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57973", "url": "https://lore.kernel.org/linux-cve-announce/2025022632-CVE-2024-57973-8797@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57974", "url": "https://lore.kernel.org/linux-cve-announce/2025022632-CVE-2024-57974-189e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57975", "url": "https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2024-57975-e1c7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57976", "url": "https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2024-57976-10f5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57977", "url": "https://lore.kernel.org/linux-cve-announce/2025022633-CVE-2024-57977-88ac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57978", "url": "https://lore.kernel.org/linux-cve-announce/2025022634-CVE-2024-57978-2a90@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57979", "url": "https://lore.kernel.org/linux-cve-announce/2025022634-CVE-2024-57979-aad0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57980", "url": "https://lore.kernel.org/linux-cve-announce/2025022634-CVE-2024-57980-4b5a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57981", "url": "https://lore.kernel.org/linux-cve-announce/2025022635-CVE-2024-57981-bba6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57982", "url": "https://lore.kernel.org/linux-cve-announce/2025022635-CVE-2024-57982-c76a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57983", "url": "https://lore.kernel.org/linux-cve-announce/2025022635-CVE-2024-57983-d9c0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57984", "url": "https://lore.kernel.org/linux-cve-announce/2025022636-CVE-2024-57984-191f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57985", "url": "https://lore.kernel.org/linux-cve-announce/2025022636-CVE-2024-57985-1f49@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57986", "url": "https://lore.kernel.org/linux-cve-announce/2025022636-CVE-2024-57986-6166@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57987", "url": "https://lore.kernel.org/linux-cve-announce/2025022637-CVE-2024-57987-09a3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57988", "url": "https://lore.kernel.org/linux-cve-announce/2025022637-CVE-2024-57988-db3b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57989", "url": "https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2024-57989-0a14@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57990", "url": "https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2024-57990-67dc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57991", "url": "https://lore.kernel.org/linux-cve-announce/2025022638-CVE-2024-57991-a3e1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57992", "url": "https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2024-57992-fa9c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57993", "url": "https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2024-57993-e136@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57994", "url": "https://lore.kernel.org/linux-cve-announce/2025022639-CVE-2024-57994-8dbd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57995", "url": "https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2024-57995-892d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57996", "url": "https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2024-57996-b670@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57997", "url": "https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2024-57997-a004@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57998", "url": "https://lore.kernel.org/linux-cve-announce/2025022641-CVE-2024-57998-e730@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-57999", "url": "https://lore.kernel.org/linux-cve-announce/2025022641-CVE-2024-57999-1029@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58000", "url": "https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2024-58000-4f74@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58001", "url": "https://lore.kernel.org/linux-cve-announce/2025022654-CVE-2024-58001-3f9c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58002", "url": "https://lore.kernel.org/linux-cve-announce/2025022654-CVE-2024-58002-6f93@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58003", "url": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58003-2b9b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58004", "url": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58004-cf99@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58005", "url": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58005-f2fa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58006", "url": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58006-9855@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58007", "url": "https://lore.kernel.org/linux-cve-announce/2025022655-CVE-2024-58007-123c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58008", "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58008-548d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58009", "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58009-b2d2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58010", "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58010-39bc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58011", "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58011-5ed8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58012", "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58012-90ce@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58013", "url": "https://lore.kernel.org/linux-cve-announce/2025022656-CVE-2024-58013-55de@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58014", "url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58014-6269@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58015", "url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58015-f72e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58016", "url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58016-115b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58017", "url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58017-fb48@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58018", "url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2024-58018-605c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58019", "url": "https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2024-58019-64da@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58020", "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2024-58020-a097@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-58021", "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2024-58021-0769@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21705", "url": "https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2025-21705-c7e5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21706", "url": "https://lore.kernel.org/linux-cve-announce/2025022642-CVE-2025-21706-f5bd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21707", "url": "https://lore.kernel.org/linux-cve-announce/2025022643-CVE-2025-21707-2961@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21708", "url": "https://lore.kernel.org/linux-cve-announce/2025022643-CVE-2025-21708-77ac@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21709", "url": "https://lore.kernel.org/linux-cve-announce/2025022643-CVE-2025-21709-e967@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21710", "url": "https://lore.kernel.org/linux-cve-announce/2025022644-CVE-2025-21710-5e28@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21711", "url": "https://lore.kernel.org/linux-cve-announce/2025022644-CVE-2025-21711-9e79@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21712", "url": "https://lore.kernel.org/linux-cve-announce/2025022644-CVE-2025-21712-8345@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21713", "url": "https://lore.kernel.org/linux-cve-announce/2025022645-CVE-2025-21713-4c72@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21714", "url": "https://lore.kernel.org/linux-cve-announce/2025022645-CVE-2025-21714-8169@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21715", "url": "https://lore.kernel.org/linux-cve-announce/2025022645-CVE-2025-21715-2837@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21716", "url": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2025-21716-3afa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21717", "url": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2025-21717-3893@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21718", "url": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2025-21718-d976@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21719", "url": "https://lore.kernel.org/linux-cve-announce/2025022646-CVE-2025-21719-dbee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21720", "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21720-063a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21721", "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21721-28d2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21722", "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21722-5415@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21723", "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21723-9f05@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21724", "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21724-f4b1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21725", "url": "https://lore.kernel.org/linux-cve-announce/2025022647-CVE-2025-21725-3a4d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21726", "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21726-73b1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21727", "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21727-b034@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21728", "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21728-5da4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21729", "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21729-24e3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21730", "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21730-5bfb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21731", "url": "https://lore.kernel.org/linux-cve-announce/2025022649-CVE-2025-21731-c18b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21732", "url": "https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2025-21732-e800@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21733", "url": "https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2025-21733-f0b8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21734", "url": "https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2025-21734-ac40@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21735", "url": "https://lore.kernel.org/linux-cve-announce/2025022658-CVE-2025-21735-259b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21736", "url": "https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2025-21736-6d94@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21737", "url": "https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2025-21737-db6e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21738", "url": "https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2025-21738-f502@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21739", "url": "https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2025-21739-5578@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21740", "url": "https://lore.kernel.org/linux-cve-announce/2025022659-CVE-2025-21740-083e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21741", "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21741-cbfd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21742", "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21742-7d50@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21743", "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21743-c67f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21744", "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21744-2585@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21745", "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21745-19ee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21746", "url": "https://lore.kernel.org/linux-cve-announce/2025022600-CVE-2025-21746-380d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21747", "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2025-21747-a514@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21748", "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2025-21748-c980@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21749", "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2025-21749-cd11@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21750", "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2025-21750-d10d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21751", "url": "https://lore.kernel.org/linux-cve-announce/2025022601-CVE-2025-21751-101c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21752", "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2025-21752-5815@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21753", "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2025-21753-91bd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21754", "url": "https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2025-21754-9daa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21755", "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2025-21755-5887@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21756", "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2025-21756-5e09@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21757", "url": "https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2025-21757-912a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21758", "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21758-9f8c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21759", "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21759-ad7c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21760", "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21760-fb9d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21761", "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21761-218b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21762", "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21762-8b8d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21763", "url": "https://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21763-dcff@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21764", "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21764-1061@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21765", "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21765-4d5e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21766", "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21766-a004@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21767", "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21767-4c7f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21768", "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21768-512b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21769", "url": "https://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21769-c349@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21770", "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21770-d7e0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21771", "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21771-6032@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21772", "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21772-5ec0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21773", "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21773-2ee7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21774", "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21774-26d5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21775", "url": "https://lore.kernel.org/linux-cve-announce/2025022606-CVE-2025-21775-3137@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21776", "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21776-5581@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21777", "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21777-0c96@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21778", "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21778-9ae4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21779", "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21779-f239@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21780", "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21780-8283@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21781", "url": "https://lore.kernel.org/linux-cve-announce/2025022607-CVE-2025-21781-7324@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21782", "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21782-9d97@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21783", "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21783-2714@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21784", "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21784-cd4e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21785", "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21785-184c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21786", "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21786-f31d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21787", "url": "https://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21787-c4f2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21788", "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21788-2619@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21789", "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21789-9691@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21790", "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21790-af3e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21791", "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21791-6074@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21792", "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21792-d8e8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21793", "url": "https://lore.kernel.org/linux-cve-announce/2025022609-CVE-2025-21793-2c1e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21794", "url": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2025-21794-ddde@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21795", "url": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2025-21795-785d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21796", "url": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2025-21796-0133@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-21797", "url": "https://lore.kernel.org/linux-cve-announce/2025022610-CVE-2025-21797-04ee@gregkh/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2474 vom 2025-03-10", "url": "https://access.redhat.com/errata/RHSA-2025:2474" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-2473 vom 2025-03-11", "url": "https://linux.oracle.com/errata/ELSA-2025-2473.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2710 vom 2025-03-20", "url": "https://access.redhat.com/errata/RHSA-2025:2710" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0983-1 vom 2025-03-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020579.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3128 vom 2025-03-25", "url": "https://access.redhat.com/errata/RHSA-2025:3128" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3127 vom 2025-03-25", "url": "https://access.redhat.com/errata/RHSA-2025:3127" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3208 vom 2025-03-26", "url": "https://access.redhat.com/errata/RHSA-2025:3208" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3212 vom 2025-03-26", "url": "https://access.redhat.com/errata/RHSA-2025:3212" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3214 vom 2025-03-26", "url": "https://access.redhat.com/errata/RHSA-2025:3214" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3213 vom 2025-03-26", "url": "https://access.redhat.com/errata/RHSA-2025:3213" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3207 vom 2025-03-26", "url": "https://access.redhat.com/errata/RHSA-2025:3207" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3211 vom 2025-03-26", "url": "https://access.redhat.com/errata/RHSA-2025:3211" }, { "category": "external", "summary": "RedHat Security Advisory", "url": "https://access.redhat.com/errata/RHSA-2025:3216" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3209 vom 2025-03-26", "url": "https://access.redhat.com/errata/RHSA-2025:3209" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-3208 vom 2025-03-27", "url": "https://linux.oracle.com/errata/ELSA-2025-3208.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3264 vom 2025-03-26", "url": "https://access.redhat.com/errata/RHSA-2025:3264" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3260 vom 2025-03-26", "url": "https://access.redhat.com/errata/RHSA-2025:3260" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1027-1 vom 2025-03-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-3260 vom 2025-03-27", "url": "https://linux.oracle.com/errata/ELSA-2025-3260.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4102 vom 2025-04-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-069 vom 2025-04-01", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-069.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-097 vom 2025-04-01", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-097.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1195-1 vom 2025-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020680.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1194-1 vom 2025-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5900 vom 2025-04-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1263-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q4U3LRNKLFTX56NC6NKHFDU35E5WDD75/" }, { "category": "external", "summary": "Container-Optimized OS release notes vom 2025-04-16", "url": "https://cloud.google.com/container-optimized-os/docs/release-notes#April_14_2025" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2826 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2826.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-218 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-218.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-220 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-220.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-088 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-088.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-215 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-215.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-219 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-219.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-214 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-214.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-211 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-211.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-212 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-212.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-213 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-213.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-217 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-217.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-216 vom 2025-04-16", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-216.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1970 vom 2025-04-17", "url": "https://alas.aws.amazon.com/ALAS-2025-1970.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7445-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7445-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7452-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7449-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7451-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7448-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7448-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7450-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23", "url": "https://ubuntu.com/security/notices/USN-7453-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7455-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7455-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7455-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7455-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7459-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7460-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7460-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7449-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7455-3 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7455-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7455-4 vom 2025-04-25", "url": "https://ubuntu.com/security/notices/USN-7455-4" }, { "category": "external", "summary": "IBM Security Bulletin 7231915 vom 2025-04-26", "url": "https://www.ibm.com/support/pages/node/7231915" }, { "category": "external", "summary": "PoC CVE-2025-21756 vom 2025-04-28", "url": "https://github.com/hoefler02/CVE-2025-21756" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7459-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28", "url": "https://ubuntu.com/security/notices/USN-7468-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7455-5 vom 2025-04-29", "url": "https://ubuntu.com/security/notices/USN-7455-5" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-225 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-225.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-228 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-228.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-227 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-227.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-226 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-226.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-224 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-224.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-100 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-100.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-098 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-098.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7475-1 vom 2025-05-02", "url": "https://ubuntu.com/security/notices/USN-7475-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7423 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:7423" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7652 vom 2025-05-15", "url": "https://access.redhat.com/errata/RHSA-2025:7652" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7682 vom 2025-05-16", "url": "https://access.redhat.com/errata/RHSA-2025:7682" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7676 vom 2025-05-15", "url": "https://access.redhat.com/errata/RHSA-2025:7676" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7683 vom 2025-05-16", "url": "https://access.redhat.com/errata/RHSA-2025:7683" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1574-1 vom 2025-05-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7510-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7903 vom 2025-05-19", "url": "https://access.redhat.com/errata/RHSA-2025:7903" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7516-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7897 vom 2025-05-19", "url": "https://access.redhat.com/errata/RHSA-2025:7897" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7901 vom 2025-05-19", "url": "https://access.redhat.com/errata/RHSA-2025:7901" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1573-1 vom 2025-05-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7896 vom 2025-05-19", "url": "https://access.redhat.com/errata/RHSA-2025:7896" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7902 vom 2025-05-19", "url": "https://access.redhat.com/errata/RHSA-2025:7902" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7511-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7511-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7512-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7510-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16", "url": "https://ubuntu.com/security/notices/USN-7517-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7518-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7516-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7523-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8057 vom 2025-05-21", "url": "https://access.redhat.com/errata/RHSA-2025:8057" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8056 vom 2025-05-21", "url": "https://access.redhat.com/errata/RHSA-2025:8056" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7511-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7510-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7521-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7521-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8058 vom 2025-05-21", "url": "https://access.redhat.com/errata/RHSA-2025:8058" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01627-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020866.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21", "url": "https://ubuntu.com/security/notices/USN-7516-4" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-8056 vom 2025-05-22", "url": "https://linux.oracle.com/errata/ELSA-2025-8056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01633-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020864.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21", "url": "https://ubuntu.com/security/notices/USN-7517-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7521-2 vom 2025-05-22", "url": "https://ubuntu.com/security/notices/USN-7521-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23", "url": "https://ubuntu.com/security/notices/USN-7516-5" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-7423 vom 2025-05-23", "url": "https://linux.oracle.com/errata/ELSA-2025-7423.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-7903 vom 2025-05-23", "url": "https://linux.oracle.com/errata/ELSA-2025-7903.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8137 vom 2025-05-26", "url": "https://access.redhat.com/errata/RHSA-2025:8137" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7516-6" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7517-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26", "url": "https://ubuntu.com/security/notices/USN-7524-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27", "url": "https://ubuntu.com/security/notices/USN-7510-6" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8248 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8248" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7510-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7521-3 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7521-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7510-8" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-7" }, { "category": "external", "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-9" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29", "url": "https://ubuntu.com/security/notices/USN-7516-8" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2865 vom 2025-05-29", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2865.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30", "url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8345 vom 2025-06-02", "url": "https://access.redhat.com/errata/RHSA-2025:8345" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8347 vom 2025-06-02", "url": "https://access.redhat.com/errata/RHSA-2025:8347" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8346 vom 2025-06-02", "url": "https://access.redhat.com/errata/RHSA-2025:8346" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8342 vom 2025-06-02", "url": "https://access.redhat.com/errata/RHSA-2025:8342" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8344 vom 2025-06-02", "url": "https://access.redhat.com/errata/RHSA-2025:8344" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8333 vom 2025-06-02", "url": "https://access.redhat.com/errata/RHSA-2025:8333" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8343 vom 2025-06-02", "url": "https://access.redhat.com/errata/RHSA-2025:8343" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8348 vom 2025-06-02", "url": "https://access.redhat.com/errata/RHSA-2025:8348" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-8333 vom 2025-06-03", "url": "https://linux.oracle.com/errata/ELSA-2025-8333.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01844-1 vom 2025-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021438.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01843-1 vom 2025-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021432.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01839-1 vom 2025-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021433.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01840-1 vom 2025-06-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021434.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-1983 vom 2025-06-10", "url": "https://alas.aws.amazon.com/ALAS-2025-1983.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01849-1 vom 2025-06-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021443.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01853-1 vom 2025-06-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021441.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01851-1 vom 2025-06-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021442.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01869-1 vom 2025-06-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021449.html" }, { "category": "external", "summary": "Siemens Security Advisory SSA-082556 vom 2025-06-10", "url": "https://cert-portal.siemens.com/productcert/html/ssa-082556.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01868-1 vom 2025-06-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021447.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01875-1 vom 2025-06-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MS3XXVHXB3HEZP3HNHCCJLMN3IGQ7UNZ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01873-1 vom 2025-06-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021451.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01892-1 vom 2025-06-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021465.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01901-1 vom 2025-06-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021471.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01893-1 vom 2025-06-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021468.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01894-1 vom 2025-06-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021467.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01899-1 vom 2025-06-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021466.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01908-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021473.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01907-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021474.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01906-1 vom 2025-06-12", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/555WAYKDPARZFWYJBA7IPHKL7OLUGFCD/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01927-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021493.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20381-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021488.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01929-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021498.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01930-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021497.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20387-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021482.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01928-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021499.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20388-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021481.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01922-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021479.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20386-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021483.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20382-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021487.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20383-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021486.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20389-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021480.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20384-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021485.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01935-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021500.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01932-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021501.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01950-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021510.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01944-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021505.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01958-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021516.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01957-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021517.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01948-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021512.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01949-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021511.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01956-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021518.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20402-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021520.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20401-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021521.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20400-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021522.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20399-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021523.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20398-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021524.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20397-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021525.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9079 vom 2025-06-16", "url": "https://access.redhat.com/errata/RHSA-2025:9079" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01965-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20408-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021550.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02000-1 vom 2025-06-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021568.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20419-1 vom 2025-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021591.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7593-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9497 vom 2025-06-24", "url": "https://access.redhat.com/errata/RHSA-2025:9497" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9492 vom 2025-06-24", "url": "https://access.redhat.com/errata/RHSA-2025:9492" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9493 vom 2025-06-24", "url": "https://access.redhat.com/errata/RHSA-2025:9493" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9494 vom 2025-06-24", "url": "https://access.redhat.com/errata/RHSA-2025:9494" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9490 vom 2025-06-24", "url": "https://access.redhat.com/errata/RHSA-2025:9490" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9498 vom 2025-06-24", "url": "https://access.redhat.com/errata/RHSA-2025:9498" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9491 vom 2025-06-24", "url": "https://access.redhat.com/errata/RHSA-2025:9491" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9581 vom 2025-06-25", "url": "https://access.redhat.com/errata/RHSA-2025:9581" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9580 vom 2025-06-25", "url": "https://access.redhat.com/errata/RHSA-2025:9580" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9584 vom 2025-06-25", "url": "https://access.redhat.com/errata/RHSA-2025:9584" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-9580 vom 2025-06-26", "url": "https://linux.oracle.com/errata/ELSA-2025-9580.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26", "url": "https://ubuntu.com/security/notices/USN-7602-1" }, { "category": "external", "summary": "SEM 2025.2.1 release notes vom 2025-07-02", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10211 vom 2025-07-02", "url": "https://access.redhat.com/errata/RHSA-2025:10211" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-9079 vom 2025-07-04", "url": "https://linux.oracle.com/errata/ELSA-2025-9079.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-8137 vom 2025-07-04", "url": "https://linux.oracle.com/errata/ELSA-2025-8137.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10371 vom 2025-07-07", "url": "https://access.redhat.com/errata/RHSA-2025:10371" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10379 vom 2025-07-07", "url": "https://access.redhat.com/errata/RHSA-2025:10379" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-10371 vom 2025-07-08", "url": "https://linux.oracle.com/errata/ELSA-2025-10371.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08", "url": "https://linux.oracle.com/errata/ELSA-2025-20406.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-10379 vom 2025-07-08", "url": "https://linux.oracle.com/errata/ELSA-2025-10379.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-082 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-082.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10830 vom 2025-07-14", "url": "https://access.redhat.com/errata/RHSA-2025:10830" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10829 vom 2025-07-14", "url": "https://access.redhat.com/errata/RHSA-2025:10829" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html" }, { "category": "external", "summary": "RedHat Security Advisory", "url": "https://access.redhat.com/errata/RHSA-2025:11299" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02322-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021810.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11298 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11298" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11245 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11245" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11298 vom 2025-07-17", "url": "https://linux.oracle.com/errata/ELSA-2025-11298.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16", "url": "https://ubuntu.com/security/notices/USN-7640-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7653-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7653-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7652-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7652-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7651-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7651-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20480 vom 2025-07-18", "url": "https://linux.oracle.com/errata/ELSA-2025-20480.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11411 vom 2025-07-21", "url": "https://access.redhat.com/errata/RHSA-2025:11411" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02387-1 vom 2025-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021861.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02385-1 vom 2025-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021862.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02388-1 vom 2025-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021860.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02390-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021881.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02402-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021875.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02412-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021866.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02405-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021868.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02410-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7JYI4RKW2E7EB4ZJ6UB45TTF2H6PEYR/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11428 vom 2025-07-21", "url": "https://access.redhat.com/errata/RHSA-2025:11428" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02399-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76DMKQMABVDV4KDJA6FQ7PDOF7RSG4ZQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02400-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFZK6V3WCARPDN2N3X7GFGJTK7UFSP6T/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02413-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021865.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02401-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2CTS27REDRGOT26DT2AKNCWHEMLXFPV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02389-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021882.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02398-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZIQSMDCERQHP4JSQ3YSIO5TMBD637EV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02393-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/536XR3DQAUU4EJXWQKQRE6QHNW7W4M5C/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02411-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DEKG43SVEEUNQXJBCRXWGSWJ6NQ36NUC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02392-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021879.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02394-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021878.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02396-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021876.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02391-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021880.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02403-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXLF63OLKSA5LWF3BYMVRASA55GHVYJY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02433-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021883.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02420-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021886.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02428-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021889.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02418-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021888.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02451-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22P3K2RHZ424E6JGDSKSXUABXRESY6GY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02416-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021890.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02415-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021891.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02446-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYAKCPI3CQKIWHWVXLDBJMK5CDOB5VRS/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02436-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOC4XFCSYMATM6FYIQWRDFK5AQF4P2LT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02434-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HM6XIBRQQ4DT55UN4XNTKFRWGXRY73A5/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11411 vom 2025-07-22", "url": "https://linux.oracle.com/errata/ELSA-2025-11411.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02454-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NNLH3GVII5RPJKDTSNRRAF2IHEZBWAO/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02444-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAPR5ITSSKHG4EAWNWSLSEMDSVTCH3CA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02438-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C4GMDP2SNO4HPRFRHQVRBAS7WAZ5PYIZ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02449-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOIECZ42HAJGKZ7TVGI4LLLNAG27ZF7L/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20483-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021917.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02442-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7BWN4GTGQU33LC3C2LNMXQT72KBQAYTF/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20475-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021919.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02422-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021884.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02421-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021885.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02419-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02445-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYJ3O67PBJST6GKMJJXDEBLGGDV5KJKJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02440-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON72ZMOEO6E3K3KZFRVFHX5LUYA6RAXJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02437-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCEZBA2U7C5F2MCQC3AIBIKAHNQBPFOI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02455-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2GXZ2EL5OVKMNFWDPFV7NT367YYOFZO/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-3 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7651-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02459-1 vom 2025-07-22", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNBGONL5CBCKJ2ZQN6XVJFDFNJMHMLDW/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11428 vom 2025-07-23", "url": "https://linux.oracle.com/errata/ELSA-2025-11428.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7651-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02468-1 vom 2025-07-22", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7LXLV4ZFW2U2LQ7EL4MR5BCEPMCAILY/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-5 vom 2025-07-24", "url": "https://ubuntu.com/security/notices/USN-7651-5" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02507-1 vom 2025-07-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021949.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-6 vom 2025-07-24", "url": "https://ubuntu.com/security/notices/USN-7651-6" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20493-1 vom 2025-07-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021967.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20498-1 vom 2025-07-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021965.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11861 vom 2025-07-28", "url": "https://access.redhat.com/errata/RHSA-2025:11861" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02537-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021978.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11861 vom 2025-07-30", "url": "https://linux.oracle.com/errata/ELSA-2025-11861.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12209 vom 2025-07-29", "url": "https://access.redhat.com/errata/RHSA-2025:12209" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12311 vom 2025-07-30", "url": "https://access.redhat.com/errata/RHSA-2025:12311" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12525 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12525" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20526-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022026.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20527-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20518-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022033.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20520-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022031.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20528-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022024.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20525-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022027.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12662 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12662" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20517-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022034.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20519-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022032.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12746 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12746" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-098 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-098.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12526 vom 2025-08-05", "url": "https://access.redhat.com/errata/RHSA-2025:12526" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13061 vom 2025-08-05", "url": "https://access.redhat.com/errata/RHSA-2025:13061" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13135 vom 2025-08-06", "url": "https://access.redhat.com/errata/RHSA-2025:13135" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20545-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022099.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20541-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022103.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20540-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022104.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13120 vom 2025-08-06", "url": "https://access.redhat.com/errata/RHSA-2025:13120" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20542-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022102.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20546-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022098.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13029 vom 2025-08-05", "url": "https://access.redhat.com/errata/RHSA-2025:13029" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20544-1 vom 2025-08-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022100.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13030 vom 2025-08-05", "url": "https://access.redhat.com/errata/RHSA-2025:13030" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-12746 vom 2025-08-06", "url": "https://linux.oracle.com/errata/ELSA-2025-12746.html" }, { "category": "external", "summary": "IBM Security Bulletin 7241589 vom 2025-08-06", "url": "https://www.ibm.com/support/pages/node/7241589" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13590 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13590" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13589 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13589" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20520 vom 2025-08-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20520.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-12662 vom 2025-08-11", "url": "https://linux.oracle.com/errata/ELSA-2025-12662.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13633 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13633" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-13589 vom 2025-08-12", "url": "https://linux.oracle.com/errata/ELSA-2025-13589.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13776 vom 2025-08-13", "url": "https://access.redhat.com/errata/RHSA-2025:13776" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13781 vom 2025-08-13", "url": "https://access.redhat.com/errata/RHSA-2025:13781" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14054 vom 2025-08-19", "url": "https://access.redhat.com/errata/RHSA-2025:14054" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14094 vom 2025-08-19", "url": "https://access.redhat.com/errata/RHSA-2025:14094" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7703-1 vom 2025-08-20", "url": "https://ubuntu.com/security/notices/USN-7703-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14136 vom 2025-08-20", "url": "https://access.redhat.com/errata/RHSA-2025:14136" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7703-2 vom 2025-08-20", "url": "https://ubuntu.com/security/notices/USN-7703-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7703-3 vom 2025-08-21", "url": "https://ubuntu.com/security/notices/USN-7703-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7712-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7711-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7719-1 vom 2025-08-26", "url": "https://ubuntu.com/security/notices/USN-7719-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14748 vom 2025-08-27", "url": "https://access.redhat.com/errata/RHSA-2025:14748" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14746 vom 2025-08-27", "url": "https://access.redhat.com/errata/RHSA-2025:14746" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7703-4 vom 2025-08-28", "url": "https://ubuntu.com/security/notices/USN-7703-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-1 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-2 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7726-3 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7726-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7726-2 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7726-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7726-1 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7726-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7725-1 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7725-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7725-2 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7725-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14985 vom 2025-09-02", "url": "https://access.redhat.com/errata/RHSA-2025:14985" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15035 vom 2025-09-02", "url": "https://access.redhat.com/errata/RHSA-2025:15035" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7712-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7725-3 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7725-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7726-4 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7726-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-3 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7727-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03", "url": "https://ubuntu.com/security/notices/USN-7737-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09", "url": "https://linux.oracle.com/errata/ELSA-2025-20551.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2025:13590 vom 2025-09-08", "url": "https://errata.build.resf.org/RLSA-2025:13590" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10", "url": "https://linux.oracle.com/errata/ELSA-2025-20553.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15656 vom 2025-09-10", "url": "https://access.redhat.com/errata/RHSA-2025:15656" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15660 vom 2025-09-11", "url": "https://access.redhat.com/errata/RHSA-2025:15660" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7754-2 vom 2025-09-17", "url": "https://ubuntu.com/security/notices/USN-7754-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7754-1 vom 2025-09-17", "url": "https://ubuntu.com/security/notices/USN-7754-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-109 vom 2025-09-16", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-109.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7755-2 vom 2025-09-17", "url": "https://ubuntu.com/security/notices/USN-7755-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7755-1 vom 2025-09-17", "url": "https://ubuntu.com/security/notices/USN-7755-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-14987 vom 2025-09-18", "url": "https://linux.oracle.com/errata/ELSA-2025-14987.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-14748 vom 2025-09-18", "url": "https://linux.oracle.com/errata/ELSA-2025-14748.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7726-5 vom 2025-09-18", "url": "https://ubuntu.com/security/notices/USN-7726-5" }, { "category": "external", "summary": "Debian Security Advisory DSA-6008 vom 2025-09-23", "url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-22T22:00:00.000+00:00", "generator": { "date": "2025-09-23T04:56:31.748+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0453", "initial_release_date": "2025-02-26T23:00:00.000+00:00", "revision_history": [ { "date": "2025-02-26T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-03-09T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-10T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-12T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-13T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-19T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2025-03-23T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-24T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-25T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-26T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen" }, { "date": "2025-03-31T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-10T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-13T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-14T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-15T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-16T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-04-21T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-04-22T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-23T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-27T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "26", "summary": "PoC f\u00fcr CVE-2025-21756 aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-05-01T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-14T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-15T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von SUSE, Ubuntu und Red Hat aufgenommen" }, { "date": "2025-05-19T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Ubuntu, SUSE und Red Hat aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von SUSE, Ubuntu und Oracle Linux aufgenommen" }, { "date": "2025-05-22T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen" }, { "date": "2025-05-25T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu, Debian und SUSE aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu, Debian, SUSE und Amazon aufgenommen" }, { "date": "2025-06-01T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2025-06-10T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE und Siemens aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-12T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-19T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2025-06-24T22:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-06-25T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2025-06-26T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-01T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates aufgenommen" }, { "date": "2025-07-03T22:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-06T22:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-07T22:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "61", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2025-07-13T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-07-22T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von Oracle Linux, Ubuntu und SUSE aufgenommen" }, { "date": "2025-07-23T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-24T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-27T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "73", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "74", "summary": "Neue Updates von Ubuntu, Oracle Linux und Red Hat aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "75", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "76", "summary": "Referenz(en) aufgenommen:" }, { "date": "2025-08-03T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von Red Hat und Amazon aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von Red Hat, SUSE und Ubuntu aufgenommen" }, { "date": "2025-08-06T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von Oracle Linux und IBM aufgenommen" }, { "date": "2025-08-10T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-11T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-18T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2025-08-19T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2025-08-20T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-21T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-26T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-27T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-28T22:00:00.000+00:00", "number": "91", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-01T22:00:00.000+00:00", "number": "92", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-03T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-08T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2025-09-09T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-09-10T22:00:00.000+00:00", "number": "97", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-09-16T22:00:00.000+00:00", "number": "98", "summary": "Neue Updates von Ubuntu und Amazon aufgenommen" }, { "date": "2025-09-17T22:00:00.000+00:00", "number": "99", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-18T22:00:00.000+00:00", "number": "100", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2025-09-22T22:00:00.000+00:00", "number": "101", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "101" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Avamar", "product": { "name": "Dell Avamar", "product_id": "T039664", "product_identification_helper": { "cpe": "cpe:/a:dell:avamar:-" } } }, { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Google Container-Optimized OS", "product": { "name": "Google Container-Optimized OS", "product_id": "1607324", "product_identification_helper": { "cpe": "cpe:/o:google:container-optimized_os:-" } } } ], "category": "vendor", "name": "Google" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP11 IF04", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04", "product_id": "T043169" } }, { "category": "product_version", "name": "7.5.0 UP11 IF04", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11 IF04", "product_id": "T043169-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP13", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP13", "product_id": "T045828" } }, { "category": "product_version", "name": "7.5.0 UP13", "product": { "name": "IBM QRadar SIEM 7.5.0 UP13", "product_id": "T045828-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up13" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T046484", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "Container Platform \u003c4.14.49", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.49", "product_id": "T042010" } }, { "category": "product_version", "name": "Container Platform 4.14.49", "product": { "name": "Red Hat OpenShift Container Platform 4.14.49", "product_id": "T042010-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.49" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "1500 CPU", "product": { "name": "Siemens SIMATIC S7 1500 CPU", "product_id": "T025776", "product_identification_helper": { "cpe": "cpe:/h:siemens:simatic_s7:1500_cpu" } } } ], "category": "product_name", "name": "SIMATIC S7" } ], "category": "vendor", "name": "Siemens" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2025.2.1", "product": { "name": "SolarWinds Security Event Manager \u003c2025.2.1", "product_id": "T044986" } }, { "category": "product_version", "name": "2025.2.1", "product": { "name": "SolarWinds Security Event Manager 2025.2.1", "product_id": "T044986-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1" } } } ], "category": "product_name", "name": "Security Event Manager" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-49732", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2022-49732" }, { "cve": "CVE-2024-49570", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-49570" }, { "cve": "CVE-2024-52557", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-52557" }, { "cve": "CVE-2024-52559", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-52559" }, { "cve": "CVE-2024-52560", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-52560" }, { "cve": "CVE-2024-54456", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-54456" }, { "cve": "CVE-2024-54458", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-54458" }, { "cve": "CVE-2024-57834", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57834" }, { "cve": "CVE-2024-57852", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57852" }, { "cve": "CVE-2024-57953", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57953" }, { "cve": "CVE-2024-57973", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57973" }, { "cve": "CVE-2024-57974", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57974" }, { "cve": "CVE-2024-57975", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57975" }, { "cve": "CVE-2024-57976", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57976" }, { "cve": "CVE-2024-57977", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57977" }, { "cve": "CVE-2024-57978", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57978" }, { "cve": "CVE-2024-57979", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57979" }, { "cve": "CVE-2024-57980", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57980" }, { "cve": "CVE-2024-57981", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57981" }, { "cve": "CVE-2024-57982", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57982" }, { "cve": "CVE-2024-57983", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57983" }, { "cve": "CVE-2024-57984", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57984" }, { "cve": "CVE-2024-57985", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57985" }, { "cve": "CVE-2024-57986", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57986" }, { "cve": "CVE-2024-57987", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57987" }, { "cve": "CVE-2024-57988", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57988" }, { "cve": "CVE-2024-57989", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57989" }, { "cve": "CVE-2024-57990", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57990" }, { "cve": "CVE-2024-57991", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57991" }, { "cve": "CVE-2024-57992", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57992" }, { "cve": "CVE-2024-57993", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57993" }, { "cve": "CVE-2024-57994", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57994" }, { "cve": "CVE-2024-57995", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57995" }, { "cve": "CVE-2024-57996", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57996" }, { "cve": "CVE-2024-57997", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57997" }, { "cve": "CVE-2024-57998", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57998" }, { "cve": "CVE-2024-57999", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-57999" }, { "cve": "CVE-2024-58000", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58000" }, { "cve": "CVE-2024-58001", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58001" }, { "cve": "CVE-2024-58002", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58002" }, { "cve": "CVE-2024-58003", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58003" }, { "cve": "CVE-2024-58004", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58004" }, { "cve": "CVE-2024-58005", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58005" }, { "cve": "CVE-2024-58006", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58006" }, { "cve": "CVE-2024-58007", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58007" }, { "cve": "CVE-2024-58008", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58008" }, { "cve": "CVE-2024-58009", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58009" }, { "cve": "CVE-2024-58010", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58010" }, { "cve": "CVE-2024-58011", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58011" }, { "cve": "CVE-2024-58012", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58012" }, { "cve": "CVE-2024-58013", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58013" }, { "cve": "CVE-2024-58014", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58014" }, { "cve": "CVE-2024-58015", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58015" }, { "cve": "CVE-2024-58016", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58016" }, { "cve": "CVE-2024-58017", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58017" }, { "cve": "CVE-2024-58018", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58018" }, { "cve": "CVE-2024-58019", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58019" }, { "cve": "CVE-2024-58020", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58020" }, { "cve": "CVE-2024-58021", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2024-58021" }, { "cve": "CVE-2025-21705", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21705" }, { "cve": "CVE-2025-21706", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21706" }, { "cve": "CVE-2025-21707", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21707" }, { "cve": "CVE-2025-21708", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21708" }, { "cve": "CVE-2025-21709", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21709" }, { "cve": "CVE-2025-21710", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21710" }, { "cve": "CVE-2025-21711", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21711" }, { "cve": "CVE-2025-21712", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21712" }, { "cve": "CVE-2025-21713", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21713" }, { "cve": "CVE-2025-21714", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21714" }, { "cve": "CVE-2025-21715", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21715" }, { "cve": "CVE-2025-21716", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21716" }, { "cve": "CVE-2025-21717", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21717" }, { "cve": "CVE-2025-21718", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21718" }, { "cve": "CVE-2025-21719", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21719" }, { "cve": "CVE-2025-21720", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21720" }, { "cve": "CVE-2025-21721", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21721" }, { "cve": "CVE-2025-21722", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21722" }, { "cve": "CVE-2025-21723", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21723" }, { "cve": "CVE-2025-21724", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21724" }, { "cve": "CVE-2025-21725", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21725" }, { "cve": "CVE-2025-21726", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21726" }, { "cve": "CVE-2025-21727", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21727" }, { "cve": "CVE-2025-21728", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21728" }, { "cve": "CVE-2025-21729", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21729" }, { "cve": "CVE-2025-21730", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21730" }, { "cve": "CVE-2025-21731", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21731" }, { "cve": "CVE-2025-21732", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21732" }, { "cve": "CVE-2025-21733", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21733" }, { "cve": "CVE-2025-21734", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21734" }, { "cve": "CVE-2025-21735", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21735" }, { "cve": "CVE-2025-21736", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21736" }, { "cve": "CVE-2025-21737", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21737" }, { "cve": "CVE-2025-21738", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21738" }, { "cve": "CVE-2025-21739", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21739" }, { "cve": "CVE-2025-21740", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21740" }, { "cve": "CVE-2025-21741", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21741" }, { "cve": "CVE-2025-21742", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21742" }, { "cve": "CVE-2025-21743", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21743" }, { "cve": "CVE-2025-21744", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21744" }, { "cve": "CVE-2025-21745", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21745" }, { "cve": "CVE-2025-21746", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21746" }, { "cve": "CVE-2025-21747", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21747" }, { "cve": "CVE-2025-21748", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21748" }, { "cve": "CVE-2025-21749", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21749" }, { "cve": "CVE-2025-21750", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21750" }, { "cve": "CVE-2025-21751", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21751" }, { "cve": "CVE-2025-21752", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21752" }, { "cve": "CVE-2025-21753", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21753" }, { "cve": "CVE-2025-21754", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21754" }, { "cve": "CVE-2025-21755", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21755" }, { "cve": "CVE-2025-21756", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21756" }, { "cve": "CVE-2025-21757", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21757" }, { "cve": "CVE-2025-21758", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21758" }, { "cve": "CVE-2025-21759", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21759" }, { "cve": "CVE-2025-21760", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21760" }, { "cve": "CVE-2025-21761", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21761" }, { "cve": "CVE-2025-21762", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21762" }, { "cve": "CVE-2025-21763", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21763" }, { "cve": "CVE-2025-21764", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21764" }, { "cve": "CVE-2025-21765", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21765" }, { "cve": "CVE-2025-21766", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21766" }, { "cve": "CVE-2025-21767", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21767" }, { "cve": "CVE-2025-21768", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21768" }, { "cve": "CVE-2025-21769", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21769" }, { "cve": "CVE-2025-21770", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21770" }, { "cve": "CVE-2025-21771", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21771" }, { "cve": "CVE-2025-21772", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21772" }, { "cve": "CVE-2025-21773", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21773" }, { "cve": "CVE-2025-21774", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21774" }, { "cve": "CVE-2025-21775", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21775" }, { "cve": "CVE-2025-21776", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21776" }, { "cve": "CVE-2025-21777", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21777" }, { "cve": "CVE-2025-21778", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21778" }, { "cve": "CVE-2025-21779", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21779" }, { "cve": "CVE-2025-21780", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21780" }, { "cve": "CVE-2025-21781", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21781" }, { "cve": "CVE-2025-21782", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21782" }, { "cve": "CVE-2025-21783", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21783" }, { "cve": "CVE-2025-21784", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21784" }, { "cve": "CVE-2025-21785", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21785" }, { "cve": "CVE-2025-21786", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21786" }, { "cve": "CVE-2025-21787", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21787" }, { "cve": "CVE-2025-21788", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21788" }, { "cve": "CVE-2025-21789", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21789" }, { "cve": "CVE-2025-21790", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21790" }, { "cve": "CVE-2025-21791", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21791" }, { "cve": "CVE-2025-21792", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21792" }, { "cve": "CVE-2025-21793", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21793" }, { "cve": "CVE-2025-21794", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21794" }, { "cve": "CVE-2025-21795", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21795" }, { "cve": "CVE-2025-21796", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21796" }, { "cve": "CVE-2025-21797", "product_status": { "known_affected": [ "67646", "T034583", "T045828", "T004914", "T032255", "T039664", "T043169", "T044986", "2951", "T002207", "T000126", "T046484", "398363", "T025776", "1607324", "T042010" ] }, "release_date": "2025-02-26T23:00:00.000+00:00", "title": "CVE-2025-21797" } ] }
fkie_cve-2025-21755
Vulnerability from fkie_nvd
▼ | URL | Tags |
---|
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "id": "CVE-2025-21755", "lastModified": "2025-03-27T14:15:42.423", "metrics": {}, "published": "2025-02-27T03:15:16.150", "references": [], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Rejected" }
suse-su-2025:03397-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.14.21-150500_55_103 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2025-38177: sch_hfsc: make hfsc_qlen_notify() idempotent (bsc#1246356).\n- CVE-2025-38181: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246001).\n- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247499).\n- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248298).\n- CVE-2025-21756: vsock: Keep the binding until socket destruction (bsc#1245795).\n- CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1245795).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-3397,SUSE-2025-3398,SUSE-2025-3399,SUSE-SLE-Module-Live-Patching-15-SP5-2025-3399", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_03397-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:03397-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503397-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:03397-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041958.html" }, { "category": "self", "summary": "SUSE Bug 1245795", "url": "https://bugzilla.suse.com/1245795" }, { "category": "self", "summary": "SUSE Bug 1246001", "url": "https://bugzilla.suse.com/1246001" }, { "category": "self", "summary": "SUSE Bug 1246356", "url": "https://bugzilla.suse.com/1246356" }, { "category": "self", "summary": "SUSE Bug 1247499", "url": "https://bugzilla.suse.com/1247499" }, { "category": "self", "summary": "SUSE Bug 1248298", "url": "https://bugzilla.suse.com/1248298" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21755 page", "url": "https://www.suse.com/security/cve/CVE-2025-21755/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21756 page", "url": "https://www.suse.com/security/cve/CVE-2025-21756/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38177 page", "url": "https://www.suse.com/security/cve/CVE-2025-38177/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38181 page", "url": "https://www.suse.com/security/cve/CVE-2025-38181/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38498 page", "url": "https://www.suse.com/security/cve/CVE-2025-38498/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38555 page", "url": "https://www.suse.com/security/cve/CVE-2025-38555/" } ], "title": "Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5)", "tracking": { "current_release_date": "2025-09-27T18:03:46Z", "generator": { "date": "2025-09-27T18:03:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:03397-1", "initial_release_date": "2025-09-27T18:03:46Z", "revision_history": [ { "date": "2025-09-27T18:03:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_83-default-15-150500.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_14_21-150500_55_83-default-15-150500.2.1.ppc64le", "product_id": "kernel-livepatch-5_14_21-150500_55_83-default-15-150500.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_91-default-11-150500.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_14_21-150500_55_91-default-11-150500.2.1.ppc64le", "product_id": "kernel-livepatch-5_14_21-150500_55_91-default-11-150500.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "product_id": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_83-default-15-150500.2.1.s390x", "product": { "name": "kernel-livepatch-5_14_21-150500_55_83-default-15-150500.2.1.s390x", "product_id": "kernel-livepatch-5_14_21-150500_55_83-default-15-150500.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_91-default-11-150500.2.1.s390x", "product": { "name": "kernel-livepatch-5_14_21-150500_55_91-default-11-150500.2.1.s390x", "product_id": "kernel-livepatch-5_14_21-150500_55_91-default-11-150500.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "product": { "name": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "product_id": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_83-default-15-150500.2.1.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150500_55_83-default-15-150500.2.1.x86_64", "product_id": "kernel-livepatch-5_14_21-150500_55_83-default-15-150500.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_91-default-11-150500.2.1.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150500_55_91-default-11-150500.2.1.x86_64", "product_id": "kernel-livepatch-5_14_21-150500_55_91-default-11-150500.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64", "product_id": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x" }, "product_reference": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-21755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21755" } ], "notes": [ { "category": "general", "text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21755", "url": "https://www.suse.com/security/cve/CVE-2025-21755" }, { "category": "external", "summary": "SUSE Bug 1237882 for CVE-2025-21755", "url": "https://bugzilla.suse.com/1237882" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T18:03:46Z", "details": "moderate" } ], "title": "CVE-2025-21755" }, { "cve": "CVE-2025-21756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21756" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Keep the binding until socket destruction\n\nPreserve sockets bindings; this includes both resulting from an explicit\nbind() and those implicitly bound through autobind during connect().\n\nPrevents socket unbinding during a transport reassignment, which fixes a\nuse-after-free:\n\n 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2)\n 2. transport-\u003erelease() calls vsock_remove_bound() without checking if\n sk was bound and moved to bound list (refcnt=1)\n 3. vsock_bind() assumes sk is in unbound list and before\n __vsock_insert_bound(vsock_bound_sockets()) calls\n __vsock_remove_bound() which does:\n list_del_init(\u0026vsk-\u003ebound_table); // nop\n sock_put(\u0026vsk-\u003esk); // refcnt=0\n\nBUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730\nRead of size 4 at addr ffff88816b46a74c by task a.out/2057\n dump_stack_lvl+0x68/0x90\n print_report+0x174/0x4f6\n kasan_report+0xb9/0x190\n __vsock_bind+0x62e/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nAllocated by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n __kasan_slab_alloc+0x85/0x90\n kmem_cache_alloc_noprof+0x131/0x450\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x2c/0x870\n __vsock_create.constprop.0+0x2e/0xb60\n vsock_create+0xe4/0x420\n __sock_create+0x241/0x650\n __sys_socket+0xf2/0x1a0\n __x64_sys_socket+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kmem_cache_free+0x1a1/0x590\n __sk_destruct+0x388/0x5a0\n __vsock_bind+0x5e1/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150\nRIP: 0010:refcount_warn_saturate+0xce/0x150\n __vsock_bind+0x66d/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150\nRIP: 0010:refcount_warn_saturate+0xee/0x150\n vsock_remove_bound+0x187/0x1e0\n __vsock_release+0x383/0x4a0\n vsock_release+0x90/0x120\n __sock_release+0xa3/0x250\n sock_close+0x14/0x20\n __fput+0x359/0xa80\n task_work_run+0x107/0x1d0\n do_exit+0x847/0x2560\n do_group_exit+0xb8/0x250\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0xfec/0x14f0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21756", "url": "https://www.suse.com/security/cve/CVE-2025-21756" }, { "category": "external", "summary": "SUSE Bug 1238876 for CVE-2025-21756", "url": "https://bugzilla.suse.com/1238876" }, { "category": "external", "summary": "SUSE Bug 1245795 for CVE-2025-21756", "url": "https://bugzilla.suse.com/1245795" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T18:03:46Z", "details": "important" } ], "title": "CVE-2025-21756" }, { "cve": "CVE-2025-38177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38177" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: make hfsc_qlen_notify() idempotent\n\nhfsc_qlen_notify() is not idempotent either and not friendly\nto its callers, like fq_codel_dequeue(). Let\u0027s make it idempotent\nto ease qdisc_tree_reduce_backlog() callers\u0027 life:\n\n1. update_vf() decreases cl-\u003ecl_nactive, so we can check whether it is\nnon-zero before calling it.\n\n2. eltree_remove() always removes RB node cl-\u003eel_node, but we can use\n RB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38177", "url": "https://www.suse.com/security/cve/CVE-2025-38177" }, { "category": "external", "summary": "SUSE Bug 1245986 for CVE-2025-38177", "url": "https://bugzilla.suse.com/1245986" }, { "category": "external", "summary": "SUSE Bug 1246356 for CVE-2025-38177", "url": "https://bugzilla.suse.com/1246356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T18:03:46Z", "details": "important" } ], "title": "CVE-2025-38177" }, { "cve": "CVE-2025-38181", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38181" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: Fix null-ptr-deref in calipso_req_{set,del}attr().\n\nsyzkaller reported a null-ptr-deref in sock_omalloc() while allocating\na CALIPSO option. [0]\n\nThe NULL is of struct sock, which was fetched by sk_to_full_sk() in\ncalipso_req_setattr().\n\nSince commit a1a5344ddbe8 (\"tcp: avoid two atomic ops for syncookies\"),\nreqsk-\u003ersk_listener could be NULL when SYN Cookie is returned to its\nclient, as hinted by the leading SYN Cookie log.\n\nHere are 3 options to fix the bug:\n\n 1) Return 0 in calipso_req_setattr()\n 2) Return an error in calipso_req_setattr()\n 3) Alaways set rsk_listener\n\n1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie\nfor CALIPSO. 3) is also no go as there have been many efforts to reduce\natomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35\n(\"tcp/dccp: do not touch listener sk_refcnt under synflood\").\n\nAs of the blamed commit, SYN Cookie already did not need refcounting,\nand no one has stumbled on the bug for 9 years, so no CALIPSO user will\ncare about SYN Cookie.\n\nLet\u0027s return an error in calipso_req_setattr() and calipso_req_delattr()\nin the SYN Cookie case.\n\nThis can be reproduced by [1] on Fedora and now connect() of nc times out.\n\n[0]:\nTCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\nCPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nRIP: 0010:read_pnet include/net/net_namespace.h:406 [inline]\nRIP: 0010:sock_net include/net/sock.h:655 [inline]\nRIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806\nCode: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b\nRSP: 0018:ffff88811af89038 EFLAGS: 00010216\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400\nRDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030\nRBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e\nR10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000\nR13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050\nFS: 00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0\nPKRU: 80000000\nCall Trace:\n \u003cIRQ\u003e\n ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288\n calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204\n calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597\n netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249\n selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342\n selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551\n security_inet_conn_request+0x50/0xa0 security/security.c:4945\n tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825\n tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275\n tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328\n tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781\n tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667\n tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904\n ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436\n ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491\n dst_input include/net/dst.h:469 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]\n ip6_rcv_finish+0xb6/0x490 net/ipv6/ip6_input.c:69\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netf\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38181", "url": "https://www.suse.com/security/cve/CVE-2025-38181" }, { "category": "external", "summary": "SUSE Bug 1246000 for CVE-2025-38181", "url": "https://bugzilla.suse.com/1246000" }, { "category": "external", "summary": "SUSE Bug 1246001 for CVE-2025-38181", "url": "https://bugzilla.suse.com/1246001" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T18:03:46Z", "details": "important" } ], "title": "CVE-2025-38181" }, { "cve": "CVE-2025-38498", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38498" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndo_change_type(): refuse to operate on unmounted/not ours mounts\n\nEnsure that propagation settings can only be changed for mounts located\nin the caller\u0027s mount namespace. This change aligns permission checking\nwith the rest of mount(2).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38498", "url": "https://www.suse.com/security/cve/CVE-2025-38498" }, { "category": "external", "summary": "SUSE Bug 1247374 for CVE-2025-38498", "url": "https://bugzilla.suse.com/1247374" }, { "category": "external", "summary": "SUSE Bug 1247499 for CVE-2025-38498", "url": "https://bugzilla.suse.com/1247499" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T18:03:46Z", "details": "important" } ], "title": "CVE-2025-38498" }, { "cve": "CVE-2025-38555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38555" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget : fix use-after-free in composite_dev_cleanup()\n\n1. In func configfs_composite_bind() -\u003e composite_os_desc_req_prepare():\nif kmalloc fails, the pointer cdev-\u003eos_desc_req will be freed but not\nset to NULL. Then it will return a failure to the upper-level function.\n2. in func configfs_composite_bind() -\u003e composite_dev_cleanup():\nit will checks whether cdev-\u003eos_desc_req is NULL. If it is not NULL, it\nwill attempt to use it.This will lead to a use-after-free issue.\n\nBUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0\nRead of size 8 at addr 0000004827837a00 by task init/1\n\nCPU: 10 PID: 1 Comm: init Tainted: G O 5.10.97-oh #1\n kasan_report+0x188/0x1cc\n __asan_load8+0xb4/0xbc\n composite_dev_cleanup+0xf4/0x2c0\n configfs_composite_bind+0x210/0x7ac\n udc_bind_to_driver+0xb4/0x1ec\n usb_gadget_probe_driver+0xec/0x21c\n gadget_dev_desc_UDC_store+0x264/0x27c", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38555", "url": "https://www.suse.com/security/cve/CVE-2025-38555" }, { "category": "external", "summary": "SUSE Bug 1248297 for CVE-2025-38555", "url": "https://bugzilla.suse.com/1248297" }, { "category": "external", "summary": "SUSE Bug 1248298 for CVE-2025-38555", "url": "https://bugzilla.suse.com/1248298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_103-default-6-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T18:03:46Z", "details": "important" } ], "title": "CVE-2025-38555" } ] }
suse-su-2025:03400-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.14.21-150500_55_94 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2025-38177: sch_hfsc: make hfsc_qlen_notify() idempotent (bsc#1246356).\n- CVE-2025-38181: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246001).\n- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247499).\n- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248298).\n- CVE-2025-21756: vsock: Keep the binding until socket destruction (bsc#1245795).\n- CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1245795).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-3400,SUSE-2025-3401,SUSE-2025-3402,SUSE-SLE-Module-Live-Patching-15-SP5-2025-3400", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_03400-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:03400-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503400-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:03400-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041957.html" }, { "category": "self", "summary": "SUSE Bug 1245795", "url": "https://bugzilla.suse.com/1245795" }, { "category": "self", "summary": "SUSE Bug 1246001", "url": "https://bugzilla.suse.com/1246001" }, { "category": "self", "summary": "SUSE Bug 1246356", "url": "https://bugzilla.suse.com/1246356" }, { "category": "self", "summary": "SUSE Bug 1247499", "url": "https://bugzilla.suse.com/1247499" }, { "category": "self", "summary": "SUSE Bug 1248298", "url": "https://bugzilla.suse.com/1248298" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21755 page", "url": "https://www.suse.com/security/cve/CVE-2025-21755/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21756 page", "url": "https://www.suse.com/security/cve/CVE-2025-21756/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38177 page", "url": "https://www.suse.com/security/cve/CVE-2025-38177/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38181 page", "url": "https://www.suse.com/security/cve/CVE-2025-38181/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38498 page", "url": "https://www.suse.com/security/cve/CVE-2025-38498/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-38555 page", "url": "https://www.suse.com/security/cve/CVE-2025-38555/" } ], "title": "Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5)", "tracking": { "current_release_date": "2025-09-27T20:03:55Z", "generator": { "date": "2025-09-27T20:03:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:03400-1", "initial_release_date": "2025-09-27T20:03:55Z", "revision_history": [ { "date": "2025-09-27T20:03:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "product_id": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_100-default-6-150500.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_14_21-150500_55_100-default-6-150500.2.1.ppc64le", "product_id": "kernel-livepatch-5_14_21-150500_55_100-default-6-150500.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_110-default-5-150500.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_14_21-150500_55_110-default-5-150500.2.1.ppc64le", "product_id": "kernel-livepatch-5_14_21-150500_55_110-default-5-150500.2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "product": { "name": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "product_id": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_100-default-6-150500.2.1.s390x", "product": { "name": "kernel-livepatch-5_14_21-150500_55_100-default-6-150500.2.1.s390x", "product_id": "kernel-livepatch-5_14_21-150500_55_100-default-6-150500.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_110-default-5-150500.2.1.s390x", "product": { "name": "kernel-livepatch-5_14_21-150500_55_110-default-5-150500.2.1.s390x", "product_id": "kernel-livepatch-5_14_21-150500_55_110-default-5-150500.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64", "product_id": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_100-default-6-150500.2.1.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150500_55_100-default-6-150500.2.1.x86_64", "product_id": "kernel-livepatch-5_14_21-150500_55_100-default-6-150500.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150500_55_110-default-5-150500.2.1.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150500_55_110-default-5-150500.2.1.x86_64", "product_id": "kernel-livepatch-5_14_21-150500_55_110-default-5-150500.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x" }, "product_reference": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", "product_id": "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-21755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21755" } ], "notes": [ { "category": "general", "text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21755", "url": "https://www.suse.com/security/cve/CVE-2025-21755" }, { "category": "external", "summary": "SUSE Bug 1237882 for CVE-2025-21755", "url": "https://bugzilla.suse.com/1237882" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T20:03:55Z", "details": "moderate" } ], "title": "CVE-2025-21755" }, { "cve": "CVE-2025-21756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21756" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Keep the binding until socket destruction\n\nPreserve sockets bindings; this includes both resulting from an explicit\nbind() and those implicitly bound through autobind during connect().\n\nPrevents socket unbinding during a transport reassignment, which fixes a\nuse-after-free:\n\n 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2)\n 2. transport-\u003erelease() calls vsock_remove_bound() without checking if\n sk was bound and moved to bound list (refcnt=1)\n 3. vsock_bind() assumes sk is in unbound list and before\n __vsock_insert_bound(vsock_bound_sockets()) calls\n __vsock_remove_bound() which does:\n list_del_init(\u0026vsk-\u003ebound_table); // nop\n sock_put(\u0026vsk-\u003esk); // refcnt=0\n\nBUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730\nRead of size 4 at addr ffff88816b46a74c by task a.out/2057\n dump_stack_lvl+0x68/0x90\n print_report+0x174/0x4f6\n kasan_report+0xb9/0x190\n __vsock_bind+0x62e/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nAllocated by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n __kasan_slab_alloc+0x85/0x90\n kmem_cache_alloc_noprof+0x131/0x450\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x2c/0x870\n __vsock_create.constprop.0+0x2e/0xb60\n vsock_create+0xe4/0x420\n __sock_create+0x241/0x650\n __sys_socket+0xf2/0x1a0\n __x64_sys_socket+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kmem_cache_free+0x1a1/0x590\n __sk_destruct+0x388/0x5a0\n __vsock_bind+0x5e1/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150\nRIP: 0010:refcount_warn_saturate+0xce/0x150\n __vsock_bind+0x66d/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150\nRIP: 0010:refcount_warn_saturate+0xee/0x150\n vsock_remove_bound+0x187/0x1e0\n __vsock_release+0x383/0x4a0\n vsock_release+0x90/0x120\n __sock_release+0xa3/0x250\n sock_close+0x14/0x20\n __fput+0x359/0xa80\n task_work_run+0x107/0x1d0\n do_exit+0x847/0x2560\n do_group_exit+0xb8/0x250\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0xfec/0x14f0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21756", "url": "https://www.suse.com/security/cve/CVE-2025-21756" }, { "category": "external", "summary": "SUSE Bug 1238876 for CVE-2025-21756", "url": "https://bugzilla.suse.com/1238876" }, { "category": "external", "summary": "SUSE Bug 1245795 for CVE-2025-21756", "url": "https://bugzilla.suse.com/1245795" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T20:03:55Z", "details": "important" } ], "title": "CVE-2025-21756" }, { "cve": "CVE-2025-38177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38177" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: make hfsc_qlen_notify() idempotent\n\nhfsc_qlen_notify() is not idempotent either and not friendly\nto its callers, like fq_codel_dequeue(). Let\u0027s make it idempotent\nto ease qdisc_tree_reduce_backlog() callers\u0027 life:\n\n1. update_vf() decreases cl-\u003ecl_nactive, so we can check whether it is\nnon-zero before calling it.\n\n2. eltree_remove() always removes RB node cl-\u003eel_node, but we can use\n RB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38177", "url": "https://www.suse.com/security/cve/CVE-2025-38177" }, { "category": "external", "summary": "SUSE Bug 1245986 for CVE-2025-38177", "url": "https://bugzilla.suse.com/1245986" }, { "category": "external", "summary": "SUSE Bug 1246356 for CVE-2025-38177", "url": "https://bugzilla.suse.com/1246356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T20:03:55Z", "details": "important" } ], "title": "CVE-2025-38177" }, { "cve": "CVE-2025-38181", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38181" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: Fix null-ptr-deref in calipso_req_{set,del}attr().\n\nsyzkaller reported a null-ptr-deref in sock_omalloc() while allocating\na CALIPSO option. [0]\n\nThe NULL is of struct sock, which was fetched by sk_to_full_sk() in\ncalipso_req_setattr().\n\nSince commit a1a5344ddbe8 (\"tcp: avoid two atomic ops for syncookies\"),\nreqsk-\u003ersk_listener could be NULL when SYN Cookie is returned to its\nclient, as hinted by the leading SYN Cookie log.\n\nHere are 3 options to fix the bug:\n\n 1) Return 0 in calipso_req_setattr()\n 2) Return an error in calipso_req_setattr()\n 3) Alaways set rsk_listener\n\n1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie\nfor CALIPSO. 3) is also no go as there have been many efforts to reduce\natomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35\n(\"tcp/dccp: do not touch listener sk_refcnt under synflood\").\n\nAs of the blamed commit, SYN Cookie already did not need refcounting,\nand no one has stumbled on the bug for 9 years, so no CALIPSO user will\ncare about SYN Cookie.\n\nLet\u0027s return an error in calipso_req_setattr() and calipso_req_delattr()\nin the SYN Cookie case.\n\nThis can be reproduced by [1] on Fedora and now connect() of nc times out.\n\n[0]:\nTCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\nCPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nRIP: 0010:read_pnet include/net/net_namespace.h:406 [inline]\nRIP: 0010:sock_net include/net/sock.h:655 [inline]\nRIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806\nCode: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b\nRSP: 0018:ffff88811af89038 EFLAGS: 00010216\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400\nRDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030\nRBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e\nR10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000\nR13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050\nFS: 00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0\nPKRU: 80000000\nCall Trace:\n \u003cIRQ\u003e\n ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288\n calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204\n calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597\n netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249\n selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342\n selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551\n security_inet_conn_request+0x50/0xa0 security/security.c:4945\n tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825\n tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275\n tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328\n tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781\n tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667\n tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904\n ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436\n ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491\n dst_input include/net/dst.h:469 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]\n ip6_rcv_finish+0xb6/0x490 net/ipv6/ip6_input.c:69\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netf\n---truncated---", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38181", "url": "https://www.suse.com/security/cve/CVE-2025-38181" }, { "category": "external", "summary": "SUSE Bug 1246000 for CVE-2025-38181", "url": "https://bugzilla.suse.com/1246000" }, { "category": "external", "summary": "SUSE Bug 1246001 for CVE-2025-38181", "url": "https://bugzilla.suse.com/1246001" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T20:03:55Z", "details": "important" } ], "title": "CVE-2025-38181" }, { "cve": "CVE-2025-38498", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38498" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndo_change_type(): refuse to operate on unmounted/not ours mounts\n\nEnsure that propagation settings can only be changed for mounts located\nin the caller\u0027s mount namespace. This change aligns permission checking\nwith the rest of mount(2).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38498", "url": "https://www.suse.com/security/cve/CVE-2025-38498" }, { "category": "external", "summary": "SUSE Bug 1247374 for CVE-2025-38498", "url": "https://bugzilla.suse.com/1247374" }, { "category": "external", "summary": "SUSE Bug 1247499 for CVE-2025-38498", "url": "https://bugzilla.suse.com/1247499" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T20:03:55Z", "details": "important" } ], "title": "CVE-2025-38498" }, { "cve": "CVE-2025-38555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-38555" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget : fix use-after-free in composite_dev_cleanup()\n\n1. In func configfs_composite_bind() -\u003e composite_os_desc_req_prepare():\nif kmalloc fails, the pointer cdev-\u003eos_desc_req will be freed but not\nset to NULL. Then it will return a failure to the upper-level function.\n2. in func configfs_composite_bind() -\u003e composite_dev_cleanup():\nit will checks whether cdev-\u003eos_desc_req is NULL. If it is not NULL, it\nwill attempt to use it.This will lead to a use-after-free issue.\n\nBUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0\nRead of size 8 at addr 0000004827837a00 by task init/1\n\nCPU: 10 PID: 1 Comm: init Tainted: G O 5.10.97-oh #1\n kasan_report+0x188/0x1cc\n __asan_load8+0xb4/0xbc\n composite_dev_cleanup+0xf4/0x2c0\n configfs_composite_bind+0x210/0x7ac\n udc_bind_to_driver+0xb4/0x1ec\n usb_gadget_probe_driver+0xec/0x21c\n gadget_dev_desc_UDC_store+0x264/0x27c", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-38555", "url": "https://www.suse.com/security/cve/CVE-2025-38555" }, { "category": "external", "summary": "SUSE Bug 1248297 for CVE-2025-38555", "url": "https://bugzilla.suse.com/1248297" }, { "category": "external", "summary": "SUSE Bug 1248298 for CVE-2025-38555", "url": "https://bugzilla.suse.com/1248298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_94-default-7-150500.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-27T20:03:55Z", "details": "important" } ], "title": "CVE-2025-38555" } ] }
ncsc-2025-0273
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Google heeft kwetsbaarheden verholpen in Android. Samsung heeft de voor Samsung Mobile relevante kwetsbaarheden verholpen in Samsung Mobile.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden in de Android kernel omvatten onder andere een raceconditie tussen functies die CPU-timers beheren, wat kan leiden tot systeeminstabiliteit. Daarnaast zijn er kwetsbaarheden gerapporteerd die ongeautoriseerde toegang tot gevoelige informatie mogelijk maken door onjuist gebruik van geheugen en systeemoproepen. Dit kan resulteren in ernstige beveiligingsimplicaties, waaronder het uitvoeren van ongewenste code en het compromitteren van systeemintegriteit.\n\nNaast kwetsbaarheden in Android zijn ook kwetsbaarheden verholpen in Closed-source componenten van Arm, Mediatek, Imagination Technologies en Qualcomm.\n\nGoogle meldt informatie te hebben ontvangen dat de kwetsbaarheden met kenmerk CVE-2025-38352 en CVE-2025-48543 beperkt en gericht zijn misbruikt. Er is geen publieke Proof-of-Concept-code of exploit bekend van deze kwetsbaarheden.", "title": "Interpretaties" }, { "category": "description", "text": "Google heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Samsung heeft updates uitgebracht om de voor Samsung Mobile relevante kwetsbaarheden te verhelpen.\n\nZie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "Improper Validation of Array Index", "title": "CWE-129" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Improper Neutralization of Value Delimiters", "title": "CWE-142" }, { "category": "general", "text": "Improper Handling of Insufficient Permissions or Privileges ", "title": "CWE-280" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "general", "text": "Channel Accessible by Non-Endpoint", "title": "CWE-300" }, { "category": "general", "text": "Inadequate Encryption Strength", "title": "CWE-326" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "CWE-371", "title": "CWE-371" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Reachable Assertion", "title": "CWE-617" }, { "category": "general", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Use of Out-of-range Pointer Offset", "title": "CWE-823" }, { "category": "general", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "general", "text": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution", "title": "CWE-1422" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference", "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=09" }, { "category": "external", "summary": "Reference", "url": "https://source.android.com/docs/security/bulletin/2025-09-01" } ], "title": "Kwetsbaarheden verholpen in Google Android en Samsung Mobile", "tracking": { "current_release_date": "2025-09-04T08:15:14.806733Z", "generator": { "date": "2025-08-04T16:30:00Z", "engine": { "name": "V.A.", "version": "1.2" } }, "id": "NCSC-2025-0273", "initial_release_date": "2025-09-04T08:15:14.806733Z", "revision_history": [ { "date": "2025-09-04T08:15:14.806733Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/13 \u003c2025-09-05", "product": { "name": "vers:unknown/13 \u003c2025-09-05", "product_id": "CSAFPID-3094337" } }, { "category": "product_version_range", "name": "vers:unknown/14 \u003c2025-09-05", "product": { "name": "vers:unknown/14 \u003c2025-09-05", "product_id": "CSAFPID-3094338" } }, { "category": "product_version_range", "name": "vers:unknown/15 \u003c2025-09-05", "product": { "name": "vers:unknown/15 \u003c2025-09-05", "product_id": "CSAFPID-3094335" } }, { "category": "product_version_range", "name": "vers:unknown/16 \u003c2025-09-05", "product": { "name": "vers:unknown/16 \u003c2025-09-05", "product_id": "CSAFPID-3094336" } } ], "category": "product_name", "name": "Android" } ], "category": "vendor", "name": "Google" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/smrsep-2025releaseinandroid13|14|15|16", "product": { "name": "vers:unknown/smrsep-2025releaseinandroid13|14|15|16", "product_id": "CSAFPID-3094178" } }, { "category": "product_version_range", "name": "vers:unknown/smrsep-2025releaseinandroid14|15", "product": { "name": "vers:unknown/smrsep-2025releaseinandroid14|15", "product_id": "CSAFPID-3094177" } }, { "category": "product_version_range", "name": "vers:unknown/smrsep-2025releaseinandroid15|16", "product": { "name": "vers:unknown/smrsep-2025releaseinandroid15|16", "product_id": "CSAFPID-3094180" } }, { "category": "product_version_range", "name": "vers:unknown/smrsep-2025releaseinchineseandroid15|16", "product": { "name": "vers:unknown/smrsep-2025releaseinchineseandroid15|16", "product_id": "CSAFPID-3094179" } } ], "category": "product_name", "name": "Samsung Mobile Devices" } ], "category": "vendor", "name": "Samsung" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-39810", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2021-39810 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-39810.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2021-39810" }, { "cve": "CVE-2023-24023", "cwe": { "id": "CWE-300", "name": "Channel Accessible by Non-Endpoint" }, "notes": [ { "category": "other", "text": "Channel Accessible by Non-Endpoint", "title": "CWE-300" }, { "category": "other", "text": "Inadequate Encryption Strength", "title": "CWE-326" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2023-24023 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-24023.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2023-24023" }, { "cve": "CVE-2024-7881", "cwe": { "id": "CWE-1422", "name": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution", "title": "CWE-1422" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7881 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7881.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2024-7881" }, { "cve": "CVE-2024-47898", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47898 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47898.json" } ], "title": "CVE-2024-47898" }, { "cve": "CVE-2024-47899", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47899 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47899.json" } ], "title": "CVE-2024-47899" }, { "cve": "CVE-2024-49714", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2024-49714 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-49714.json" } ], "title": "CVE-2024-49714" }, { "cve": "CVE-2025-0076", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-0076 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0076.json" } ], "title": "CVE-2025-0076" }, { "cve": "CVE-2025-0089", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-0089 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0089.json" } ], "title": "CVE-2025-0089" }, { "cve": "CVE-2025-0467", "cwe": { "id": "CWE-823", "name": "Use of Out-of-range Pointer Offset" }, "notes": [ { "category": "other", "text": "Use of Out-of-range Pointer Offset", "title": "CWE-823" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-0467 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0467.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-0467" }, { "cve": "CVE-2025-1246", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-1246 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1246.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-1246" }, { "cve": "CVE-2025-1706", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-1706 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1706.json" } ], "title": "CVE-2025-1706" }, { "cve": "CVE-2025-3212", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-3212 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3212.json" } ], "title": "CVE-2025-3212" }, { "cve": "CVE-2025-8109", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "notes": [ { "category": "other", "text": "Improper Handling of Insufficient Permissions or Privileges ", "title": "CWE-280" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-8109 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8109.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-8109" }, { "cve": "CVE-2025-20696", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20696 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20696.json" } ], "title": "CVE-2025-20696" }, { "cve": "CVE-2025-20703", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20703 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20703.json" } ], "title": "CVE-2025-20703" }, { "cve": "CVE-2025-20704", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20704 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20704.json" } ], "title": "CVE-2025-20704" }, { "cve": "CVE-2025-20708", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20708 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-20708.json" } ], "title": "CVE-2025-20708" }, { "cve": "CVE-2025-21025", "notes": [ { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21025 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21025" }, { "cve": "CVE-2025-21026", "notes": [ { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21026 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21026.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21026" }, { "cve": "CVE-2025-21027", "notes": [ { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21027 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21027.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21027" }, { "cve": "CVE-2025-21028", "notes": [ { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21028 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21028.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21028" }, { "cve": "CVE-2025-21029", "notes": [ { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21029 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21029.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21029" }, { "cve": "CVE-2025-21030", "notes": [ { "category": "general", "text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21030 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21030.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21030" }, { "cve": "CVE-2025-21031", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21031 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21031.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21031" }, { "cve": "CVE-2025-21032", "notes": [ { "category": "general", "text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21032 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21032.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21032" }, { "cve": "CVE-2025-21033", "notes": [ { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21033 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21033.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21033" }, { "cve": "CVE-2025-21034", "notes": [ { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21034 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21034.json" } ], "title": "CVE-2025-21034" }, { "cve": "CVE-2025-21427", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21427 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21427.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21427" }, { "cve": "CVE-2025-21432", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21432 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21432.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21432" }, { "cve": "CVE-2025-21433", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21433 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21433.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21433" }, { "cve": "CVE-2025-21446", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21446 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21446.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21446" }, { "cve": "CVE-2025-21449", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21449 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21449.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21449" }, { "cve": "CVE-2025-21450", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21450 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21450" }, { "cve": "CVE-2025-21454", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21454 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21454.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21454" }, { "cve": "CVE-2025-21464", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21464 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21464.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21464" }, { "cve": "CVE-2025-21465", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21465 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21465.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21465" }, { "cve": "CVE-2025-21477", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21477 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21477.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-21477" }, { "cve": "CVE-2025-21481", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21481 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21481.json" } ], "title": "CVE-2025-21481" }, { "cve": "CVE-2025-21482", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21482 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21482.json" } ], "title": "CVE-2025-21482" }, { "cve": "CVE-2025-21483", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21483 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21483.json" } ], "title": "CVE-2025-21483" }, { "cve": "CVE-2025-21484", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21484 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21484.json" } ], "title": "CVE-2025-21484" }, { "cve": "CVE-2025-21487", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21487 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21487.json" } ], "title": "CVE-2025-21487" }, { "cve": "CVE-2025-21488", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21488 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21488.json" } ], "title": "CVE-2025-21488" }, { "cve": "CVE-2025-21755", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21755 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-21755.json" } ], "title": "CVE-2025-21755" }, { "cve": "CVE-2025-25179", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "notes": [ { "category": "other", "text": "Improper Handling of Insufficient Permissions or Privileges ", "title": "CWE-280" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-25179 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25179.json" } ], "title": "CVE-2025-25179" }, { "cve": "CVE-2025-25180", "cwe": { "id": "CWE-823", "name": "Use of Out-of-range Pointer Offset" }, "notes": [ { "category": "other", "text": "Use of Out-of-range Pointer Offset", "title": "CWE-823" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-25180 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25180.json" } ], "title": "CVE-2025-25180" }, { "cve": "CVE-2025-26454", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26454 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26454.json" } ], "title": "CVE-2025-26454" }, { "cve": "CVE-2025-26464", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26464 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-26464.json" } ], "title": "CVE-2025-26464" }, { "cve": "CVE-2025-27032", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27032 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27032.json" } ], "title": "CVE-2025-27032" }, { "cve": "CVE-2025-27034", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27034 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27034.json" } ], "title": "CVE-2025-27034" }, { "cve": "CVE-2025-27042", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27042 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27042.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-27042" }, { "cve": "CVE-2025-27043", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27043 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27043.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-27043" }, { "cve": "CVE-2025-27052", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27052 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27052.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-27052" }, { "cve": "CVE-2025-27056", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27056 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27056.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-27056" }, { "cve": "CVE-2025-27057", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27057 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27057.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-27057" }, { "cve": "CVE-2025-27061", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27061 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-27061" }, { "cve": "CVE-2025-27065", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27065 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27065.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-27065" }, { "cve": "CVE-2025-27066", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "other", "text": "Reachable Assertion", "title": "CWE-617" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27066 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27066.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-27066" }, { "cve": "CVE-2025-27073", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "other", "text": "Reachable Assertion", "title": "CWE-617" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27073 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27073.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-27073" }, { "cve": "CVE-2025-32321", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32321 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32321.json" } ], "title": "CVE-2025-32321" }, { "cve": "CVE-2025-32323", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32323 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32323.json" } ], "title": "CVE-2025-32323" }, { "cve": "CVE-2025-32324", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32324 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32324.json" } ], "title": "CVE-2025-32324" }, { "cve": "CVE-2025-32325", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32325 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32325.json" } ], "title": "CVE-2025-32325" }, { "cve": "CVE-2025-32326", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32326 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32326.json" } ], "title": "CVE-2025-32326" }, { "cve": "CVE-2025-32327", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32327 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32327.json" } ], "title": "CVE-2025-32327" }, { "cve": "CVE-2025-32330", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32330 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32330.json" } ], "title": "CVE-2025-32330" }, { "cve": "CVE-2025-32331", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32331 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32331.json" } ], "title": "CVE-2025-32331" }, { "cve": "CVE-2025-32332", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32332 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32332.json" } ], "title": "CVE-2025-32332" }, { "cve": "CVE-2025-32333", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32333 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32333.json" } ], "title": "CVE-2025-32333" }, { "cve": "CVE-2025-32345", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32345 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32345.json" } ], "title": "CVE-2025-32345" }, { "cve": "CVE-2025-32346", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32346 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32346.json" } ], "title": "CVE-2025-32346" }, { "cve": "CVE-2025-32347", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32347 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32347.json" } ], "title": "CVE-2025-32347" }, { "cve": "CVE-2025-32349", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32349 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32349.json" } ], "title": "CVE-2025-32349" }, { "cve": "CVE-2025-32350", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-32350 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32350.json" } ], "title": "CVE-2025-32350" }, { "cve": "CVE-2025-38352", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-38352 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38352.json" } ], "title": "CVE-2025-38352" }, { "cve": "CVE-2025-46707", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "other", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-46707 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46707.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] } ], "title": "CVE-2025-46707" }, { "cve": "CVE-2025-46708", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "notes": [ { "category": "other", "text": "Improper Handling of Insufficient Permissions or Privileges ", "title": "CWE-280" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-46708 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46708.json" } ], "title": "CVE-2025-46708" }, { "cve": "CVE-2025-46710", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-46710 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46710.json" } ], "title": "CVE-2025-46710" }, { "cve": "CVE-2025-47317", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-47317 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47317.json" } ], "title": "CVE-2025-47317" }, { "cve": "CVE-2025-47318", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-47318 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47318.json" } ], "title": "CVE-2025-47318" }, { "cve": "CVE-2025-47326", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-47326 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47326.json" } ], "title": "CVE-2025-47326" }, { "cve": "CVE-2025-47328", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-47328 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47328.json" } ], "title": "CVE-2025-47328" }, { "cve": "CVE-2025-47329", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-47329 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47329.json" } ], "title": "CVE-2025-47329" }, { "cve": "CVE-2025-48522", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48522 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48522.json" } ], "title": "CVE-2025-48522" }, { "cve": "CVE-2025-48523", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48523 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48523.json" } ], "title": "CVE-2025-48523" }, { "cve": "CVE-2025-48524", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48524 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48524.json" } ], "title": "CVE-2025-48524" }, { "cve": "CVE-2025-48526", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48526 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48526.json" } ], "title": "CVE-2025-48526" }, { "cve": "CVE-2025-48527", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48527 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48527.json" } ], "title": "CVE-2025-48527" }, { "cve": "CVE-2025-48528", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48528 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48528.json" } ], "title": "CVE-2025-48528" }, { "cve": "CVE-2025-48529", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48529 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48529.json" } ], "title": "CVE-2025-48529" }, { "cve": "CVE-2025-48531", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48531 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48531.json" } ], "title": "CVE-2025-48531" }, { "cve": "CVE-2025-48532", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48532 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48532.json" } ], "title": "CVE-2025-48532" }, { "cve": "CVE-2025-48534", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48534 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48534.json" } ], "title": "CVE-2025-48534" }, { "cve": "CVE-2025-48535", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48535 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48535.json" } ], "title": "CVE-2025-48535" }, { "cve": "CVE-2025-48537", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48537 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48537.json" } ], "title": "CVE-2025-48537" }, { "cve": "CVE-2025-48538", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48538 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48538.json" } ], "title": "CVE-2025-48538" }, { "cve": "CVE-2025-48539", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48539 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48539.json" } ], "title": "CVE-2025-48539" }, { "cve": "CVE-2025-48540", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48540 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48540.json" } ], "title": "CVE-2025-48540" }, { "cve": "CVE-2025-48541", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48541 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48541.json" } ], "title": "CVE-2025-48541" }, { "cve": "CVE-2025-48542", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48542 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48542.json" } ], "title": "CVE-2025-48542" }, { "cve": "CVE-2025-48543", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48543 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48543.json" } ], "title": "CVE-2025-48543" }, { "cve": "CVE-2025-48544", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48544 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48544.json" } ], "title": "CVE-2025-48544" }, { "cve": "CVE-2025-48545", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48545 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48545.json" } ], "title": "CVE-2025-48545" }, { "cve": "CVE-2025-48546", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48546 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48546.json" } ], "title": "CVE-2025-48546" }, { "cve": "CVE-2025-48547", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48547 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48547.json" } ], "title": "CVE-2025-48547" }, { "cve": "CVE-2025-48548", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48548 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48548.json" } ], "title": "CVE-2025-48548" }, { "cve": "CVE-2025-48549", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48549 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48549.json" } ], "title": "CVE-2025-48549" }, { "cve": "CVE-2025-48550", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48550 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48550.json" } ], "title": "CVE-2025-48550" }, { "cve": "CVE-2025-48551", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48551 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48551.json" } ], "title": "CVE-2025-48551" }, { "cve": "CVE-2025-48552", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48552 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48552.json" } ], "title": "CVE-2025-48552" }, { "cve": "CVE-2025-48553", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48553 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48553.json" } ], "title": "CVE-2025-48553" }, { "cve": "CVE-2025-48554", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48554 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48554.json" } ], "title": "CVE-2025-48554" }, { "cve": "CVE-2025-48556", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48556 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48556.json" } ], "title": "CVE-2025-48556" }, { "cve": "CVE-2025-48558", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48558 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48558.json" } ], "title": "CVE-2025-48558" }, { "cve": "CVE-2025-48559", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48559 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48559.json" } ], "title": "CVE-2025-48559" }, { "cve": "CVE-2025-48560", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48560 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48560.json" } ], "title": "CVE-2025-48560" }, { "cve": "CVE-2025-48561", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48561 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48561.json" } ], "title": "CVE-2025-48561" }, { "cve": "CVE-2025-48562", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48562 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48562.json" } ], "title": "CVE-2025-48562" }, { "cve": "CVE-2025-48563", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48563 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48563.json" } ], "title": "CVE-2025-48563" }, { "cve": "CVE-2025-48581", "product_status": { "known_affected": [ "CSAFPID-3094337", "CSAFPID-3094338", "CSAFPID-3094335", "CSAFPID-3094336", "CSAFPID-3094178", "CSAFPID-3094177", "CSAFPID-3094180", "CSAFPID-3094179" ] }, "references": [ { "category": "self", "summary": "CVE-2025-48581 | NCSC-NL Website", "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48581.json" } ], "title": "CVE-2025-48581" } ] }
ghsa-pf6p-pjxv-jwqh
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
vsock: Orphan socket after transport release
During socket release, sock_orphan() is called without considering that it sets sk->sk_wq to NULL. Later, if SO_LINGER is enabled, this leads to a null pointer dereferenced in virtio_transport_wait_close().
Orphan the socket only after transport release.
Partially reverts the 'Fixes:' commit.
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] lock_acquire+0x19e/0x500 _raw_spin_lock_irqsave+0x47/0x70 add_wait_queue+0x46/0x230 virtio_transport_release+0x4e7/0x7f0 __vsock_release+0xfd/0x490 vsock_release+0x90/0x120 __sock_release+0xa3/0x250 sock_close+0x14/0x20 __fput+0x35e/0xa90 __x64_sys_close+0x78/0xd0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e
{ "affected": [], "aliases": [ "CVE-2025-21755" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-02-27T03:15:16Z", "severity": "MODERATE" }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Orphan socket after transport release\n\nDuring socket release, sock_orphan() is called without considering that it\nsets sk-\u003esk_wq to NULL. Later, if SO_LINGER is enabled, this leads to a\nnull pointer dereferenced in virtio_transport_wait_close().\n\nOrphan the socket only after transport release.\n\nPartially reverts the \u0027Fixes:\u0027 commit.\n\nKASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]\n lock_acquire+0x19e/0x500\n _raw_spin_lock_irqsave+0x47/0x70\n add_wait_queue+0x46/0x230\n virtio_transport_release+0x4e7/0x7f0\n __vsock_release+0xfd/0x490\n vsock_release+0x90/0x120\n __sock_release+0xa3/0x250\n sock_close+0x14/0x20\n __fput+0x35e/0xa90\n __x64_sys_close+0x78/0xd0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e", "id": "GHSA-pf6p-pjxv-jwqh", "modified": "2025-03-13T15:32:50Z", "published": "2025-02-27T03:34:05Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21755" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/3a866f8376f0a5c848dcb59cd26df845fffbe6d8" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/631e00fdac7acca676103d6cbc96eb152625f449" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/78dafe1cf3afa02ed71084b350713b07e72a18fb" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/94d81870eec7ad2dd7af80bffd314ded26caea1a" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/bab61f41c942a20ef7b4feea50e9d36d19ad1a26" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/c6acb650a73d5705a93b9c5a2cd5e9c8161f0be3" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f3b8e9d3414b2eb083d8293be25a949fe480897b" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.