Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-21907 (GCVE-0-2025-21907)
Vulnerability from cvelistv5
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"mm/internal.h",
"mm/memory-failure.c",
"mm/memory_hotplug.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "608cc7deb428f1122ed426060233622ebf667b6e",
"status": "affected",
"version": "6da6b1d4a7df8c35770186b53ef65d388398e139",
"versionType": "git"
},
{
"lessThan": "425c12c076e6fc6b2cb04b9f960319d31dcabc76",
"status": "affected",
"version": "6da6b1d4a7df8c35770186b53ef65d388398e139",
"versionType": "git"
},
{
"lessThan": "b81679b1633aa43c0d973adfa816d78c1ed0d032",
"status": "affected",
"version": "6da6b1d4a7df8c35770186b53ef65d388398e139",
"versionType": "git"
},
{
"status": "affected",
"version": "deab8114fb67dcb0e6293b665c3c7083fbadff17",
"versionType": "git"
},
{
"status": "affected",
"version": "6dcf132fe236045bd7f50c008660ea086d09af1f",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"mm/internal.h",
"mm/memory-failure.c",
"mm/memory_hotplug.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.3"
},
{
"lessThan": "6.3",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.19",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.13.*",
"status": "unaffected",
"version": "6.13.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.14",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.19",
"versionStartIncluding": "6.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.13.7",
"versionStartIncluding": "6.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.14",
"versionStartIncluding": "6.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memory-failure: update ttu flag inside unmap_poisoned_folio\n\nPatch series \"mm: memory_failure: unmap poisoned folio during migrate\nproperly\", v3.\n\nFix two bugs during folio migration if the folio is poisoned.\n\n\nThis patch (of 3):\n\nCommit 6da6b1d4a7df (\"mm/hwpoison: convert TTU_IGNORE_HWPOISON to\nTTU_HWPOISON\") introduce TTU_HWPOISON to replace TTU_IGNORE_HWPOISON in\norder to stop send SIGBUS signal when accessing an error page after a\nmemory error on a clean folio. However during page migration, anon folio\nmust be set with TTU_HWPOISON during unmap_*(). For pagecache we need\nsome policy just like the one in hwpoison_user_mappings to set this flag. \nSo move this policy from hwpoison_user_mappings to unmap_poisoned_folio to\nhandle this warning properly.\n\nWarning will be produced during unamp poison folio with the following log:\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 365 at mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c\n Modules linked in:\n CPU: 1 UID: 0 PID: 365 Comm: bash Tainted: G W 6.13.0-rc1-00018-gacdb4bbda7ab #42\n Tainted: [W]=WARN\n Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015\n pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : try_to_unmap_one+0x8fc/0xd3c\n lr : try_to_unmap_one+0x3dc/0xd3c\n Call trace:\n try_to_unmap_one+0x8fc/0xd3c (P)\n try_to_unmap_one+0x3dc/0xd3c (L)\n rmap_walk_anon+0xdc/0x1f8\n rmap_walk+0x3c/0x58\n try_to_unmap+0x88/0x90\n unmap_poisoned_folio+0x30/0xa8\n do_migrate_range+0x4a0/0x568\n offline_pages+0x5a4/0x670\n memory_block_action+0x17c/0x374\n memory_subsys_offline+0x3c/0x78\n device_offline+0xa4/0xd0\n state_store+0x8c/0xf0\n dev_attr_store+0x18/0x2c\n sysfs_kf_write+0x44/0x54\n kernfs_fop_write_iter+0x118/0x1a8\n vfs_write+0x3a8/0x4bc\n ksys_write+0x6c/0xf8\n __arm64_sys_write+0x1c/0x28\n invoke_syscall+0x44/0x100\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x30/0xd0\n el0t_64_sync_handler+0xc8/0xcc\n el0t_64_sync+0x198/0x19c\n ---[ end trace 0000000000000000 ]---\n\n[mawupeng1@huawei.com: unmap_poisoned_folio(): remove shadowed local `mapping\u0027, per Miaohe]"
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T13:06:44.118Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/608cc7deb428f1122ed426060233622ebf667b6e"
},
{
"url": "https://git.kernel.org/stable/c/425c12c076e6fc6b2cb04b9f960319d31dcabc76"
},
{
"url": "https://git.kernel.org/stable/c/b81679b1633aa43c0d973adfa816d78c1ed0d032"
}
],
"title": "mm: memory-failure: update ttu flag inside unmap_poisoned_folio",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-21907",
"datePublished": "2025-04-01T15:40:47.576Z",
"dateReserved": "2024-12-29T08:45:45.786Z",
"dateUpdated": "2025-05-04T13:06:44.118Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-21907\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-04-01T16:15:21.217\",\"lastModified\":\"2025-10-31T17:59:19.370\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm: memory-failure: update ttu flag inside unmap_poisoned_folio\\n\\nPatch series \\\"mm: memory_failure: unmap poisoned folio during migrate\\nproperly\\\", v3.\\n\\nFix two bugs during folio migration if the folio is poisoned.\\n\\n\\nThis patch (of 3):\\n\\nCommit 6da6b1d4a7df (\\\"mm/hwpoison: convert TTU_IGNORE_HWPOISON to\\nTTU_HWPOISON\\\") introduce TTU_HWPOISON to replace TTU_IGNORE_HWPOISON in\\norder to stop send SIGBUS signal when accessing an error page after a\\nmemory error on a clean folio. However during page migration, anon folio\\nmust be set with TTU_HWPOISON during unmap_*(). For pagecache we need\\nsome policy just like the one in hwpoison_user_mappings to set this flag. \\nSo move this policy from hwpoison_user_mappings to unmap_poisoned_folio to\\nhandle this warning properly.\\n\\nWarning will be produced during unamp poison folio with the following log:\\n\\n ------------[ cut here ]------------\\n WARNING: CPU: 1 PID: 365 at mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c\\n Modules linked in:\\n CPU: 1 UID: 0 PID: 365 Comm: bash Tainted: G W 6.13.0-rc1-00018-gacdb4bbda7ab #42\\n Tainted: [W]=WARN\\n Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015\\n pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\n pc : try_to_unmap_one+0x8fc/0xd3c\\n lr : try_to_unmap_one+0x3dc/0xd3c\\n Call trace:\\n try_to_unmap_one+0x8fc/0xd3c (P)\\n try_to_unmap_one+0x3dc/0xd3c (L)\\n rmap_walk_anon+0xdc/0x1f8\\n rmap_walk+0x3c/0x58\\n try_to_unmap+0x88/0x90\\n unmap_poisoned_folio+0x30/0xa8\\n do_migrate_range+0x4a0/0x568\\n offline_pages+0x5a4/0x670\\n memory_block_action+0x17c/0x374\\n memory_subsys_offline+0x3c/0x78\\n device_offline+0xa4/0xd0\\n state_store+0x8c/0xf0\\n dev_attr_store+0x18/0x2c\\n sysfs_kf_write+0x44/0x54\\n kernfs_fop_write_iter+0x118/0x1a8\\n vfs_write+0x3a8/0x4bc\\n ksys_write+0x6c/0xf8\\n __arm64_sys_write+0x1c/0x28\\n invoke_syscall+0x44/0x100\\n el0_svc_common.constprop.0+0x40/0xe0\\n do_el0_svc+0x1c/0x28\\n el0_svc+0x30/0xd0\\n el0t_64_sync_handler+0xc8/0xcc\\n el0t_64_sync+0x198/0x19c\\n ---[ end trace 0000000000000000 ]---\\n\\n[mawupeng1@huawei.com: unmap_poisoned_folio(): remove shadowed local `mapping\u0027, per Miaohe]\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: fallo de memoria: actualizaci\u00f3n del indicador ttu dentro de unmap_poisoned_folio. Serie de parches \\\"mm: fallo de memoria: desasignar correctamente un folio envenenado durante la migraci\u00f3n\\\", v3. Se corrigen dos errores durante la migraci\u00f3n de folios si este est\u00e1 envenenado. Este parche (de 3): El commit 6da6b1d4a7df (\\\"mm/hwpoison: convertir TTU_IGNORE_HWPOISON en TTU_HWPOISON\\\") introduce TTU_HWPOISON en lugar de TTU_IGNORE_HWPOISON para detener el env\u00edo de la se\u00f1al SIGBUS al acceder a una p\u00e1gina con error tras un error de memoria en un folio limpio. Sin embargo, durante la migraci\u00f3n de p\u00e1ginas, anon folio debe configurarse con TTU_HWPOISON durante unmap_*(). Para la cach\u00e9 de p\u00e1ginas, necesitamos una pol\u00edtica similar a la de hwpoison_user_mappings para configurar este indicador. Por lo tanto, mueva esta pol\u00edtica de hwpoison_user_mappings a unmap_poisoned_folio para gestionar esta advertencia correctamente. Se producir\u00e1 una advertencia durante el envenenamiento de folio de unamp con el siguiente registro: ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 1 PID: 365 en mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c M\u00f3dulos vinculados: CPU: 1 UID: 0 PID: 365 Comm: bash Contaminado: GW 6.13.0-rc1-00018-gacdb4bbda7ab #42 Contaminado: [W]=WARN Nombre del hardware: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015 pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : try_to_unmap_one+0x8fc/0xd3c lr : try_to_unmap_one+0x3dc/0xd3c Rastreo de llamadas: try_to_unmap_one+0x8fc/0xd3c (P) try_to_unmap_one+0x3dc/0xd3c (L) rmap_walk_anon+0xdc/0x1f8 rmap_walk+0x3c/0x58 try_to_unmap+0x88/0x90 unmap_poisoned_folio+0x30/0xa8 do_migrate_range+0x4a0/0x568 offline_pages+0x5a4/0x670 memory_block_action+0x17c/0x374 memory_subsys_offline+0x3c/0x78 device_offline+0xa4/0xd0 state_store+0x8c/0xf0 dev_attr_store+0x18/0x2c sysfs_kf_write+0x44/0x54 kernfs_fop_write_iter+0x118/0x1a8 vfs_write+0x3a8/0x4bc ksys_write+0x6c/0xf8 __arm64_sys_write+0x1c/0x28 invoke_syscall+0x44/0x100 el0_svc_common.constprop.0+0x40/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x30/0xd0 el0t_64_sync_handler+0xc8/0xcc el0t_64_sync+0x198/0x19c ---[fin de seguimiento 0000000000000000 ]--- [mawupeng1@huawei.com: unmap_poisoned_folio(): eliminar el \u0027mapeo\u0027 local sombreado, seg\u00fan Miaohe] Enlace: https://lkml.kernel.org/r/20250219060653.3849083-1-mawupeng1@huawei.com\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.16\",\"versionEndExcluding\":\"6.2\",\"matchCriteriaId\":\"E0F792B8-000E-4D97-B7F7-B3660397A964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2.3\",\"versionEndExcluding\":\"6.12.19\",\"matchCriteriaId\":\"EB5FAD40-FE0F-4A65-BFB5-0690AD42A7DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.13\",\"versionEndExcluding\":\"6.13.7\",\"matchCriteriaId\":\"842F5A44-3E71-4546-B4FD-43B0ACE3F32B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"186716B6-2B66-4BD0-852E-D48E71C0C85F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3E781C-403A-498F-9DA9-ECEE50F41E75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"66619FB8-0AAF-4166-B2CF-67B24143261D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3D6550E-6679-4560-902D-AF52DCFE905B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B90F6B-BEC7-4D4E-883A-9DBADE021750\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/425c12c076e6fc6b2cb04b9f960319d31dcabc76\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/608cc7deb428f1122ed426060233622ebf667b6e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b81679b1633aa43c0d973adfa816d78c1ed0d032\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
fkie_cve-2025-21907
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/425c12c076e6fc6b2cb04b9f960319d31dcabc76 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/608cc7deb428f1122ed426060233622ebf667b6e | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/b81679b1633aa43c0d973adfa816d78c1ed0d032 | Patch |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.14 | |
| linux | linux_kernel | 6.14 | |
| linux | linux_kernel | 6.14 | |
| linux | linux_kernel | 6.14 | |
| linux | linux_kernel | 6.14 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F792B8-000E-4D97-B7F7-B3660397A964",
"versionEndExcluding": "6.2",
"versionStartIncluding": "6.1.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB5FAD40-FE0F-4A65-BFB5-0690AD42A7DD",
"versionEndExcluding": "6.12.19",
"versionStartIncluding": "6.2.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "842F5A44-3E71-4546-B4FD-43B0ACE3F32B",
"versionEndExcluding": "6.13.7",
"versionStartIncluding": "6.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memory-failure: update ttu flag inside unmap_poisoned_folio\n\nPatch series \"mm: memory_failure: unmap poisoned folio during migrate\nproperly\", v3.\n\nFix two bugs during folio migration if the folio is poisoned.\n\n\nThis patch (of 3):\n\nCommit 6da6b1d4a7df (\"mm/hwpoison: convert TTU_IGNORE_HWPOISON to\nTTU_HWPOISON\") introduce TTU_HWPOISON to replace TTU_IGNORE_HWPOISON in\norder to stop send SIGBUS signal when accessing an error page after a\nmemory error on a clean folio. However during page migration, anon folio\nmust be set with TTU_HWPOISON during unmap_*(). For pagecache we need\nsome policy just like the one in hwpoison_user_mappings to set this flag. \nSo move this policy from hwpoison_user_mappings to unmap_poisoned_folio to\nhandle this warning properly.\n\nWarning will be produced during unamp poison folio with the following log:\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 365 at mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c\n Modules linked in:\n CPU: 1 UID: 0 PID: 365 Comm: bash Tainted: G W 6.13.0-rc1-00018-gacdb4bbda7ab #42\n Tainted: [W]=WARN\n Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015\n pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : try_to_unmap_one+0x8fc/0xd3c\n lr : try_to_unmap_one+0x3dc/0xd3c\n Call trace:\n try_to_unmap_one+0x8fc/0xd3c (P)\n try_to_unmap_one+0x3dc/0xd3c (L)\n rmap_walk_anon+0xdc/0x1f8\n rmap_walk+0x3c/0x58\n try_to_unmap+0x88/0x90\n unmap_poisoned_folio+0x30/0xa8\n do_migrate_range+0x4a0/0x568\n offline_pages+0x5a4/0x670\n memory_block_action+0x17c/0x374\n memory_subsys_offline+0x3c/0x78\n device_offline+0xa4/0xd0\n state_store+0x8c/0xf0\n dev_attr_store+0x18/0x2c\n sysfs_kf_write+0x44/0x54\n kernfs_fop_write_iter+0x118/0x1a8\n vfs_write+0x3a8/0x4bc\n ksys_write+0x6c/0xf8\n __arm64_sys_write+0x1c/0x28\n invoke_syscall+0x44/0x100\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x30/0xd0\n el0t_64_sync_handler+0xc8/0xcc\n el0t_64_sync+0x198/0x19c\n ---[ end trace 0000000000000000 ]---\n\n[mawupeng1@huawei.com: unmap_poisoned_folio(): remove shadowed local `mapping\u0027, per Miaohe]"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: fallo de memoria: actualizaci\u00f3n del indicador ttu dentro de unmap_poisoned_folio. Serie de parches \"mm: fallo de memoria: desasignar correctamente un folio envenenado durante la migraci\u00f3n\", v3. Se corrigen dos errores durante la migraci\u00f3n de folios si este est\u00e1 envenenado. Este parche (de 3): El commit 6da6b1d4a7df (\"mm/hwpoison: convertir TTU_IGNORE_HWPOISON en TTU_HWPOISON\") introduce TTU_HWPOISON en lugar de TTU_IGNORE_HWPOISON para detener el env\u00edo de la se\u00f1al SIGBUS al acceder a una p\u00e1gina con error tras un error de memoria en un folio limpio. Sin embargo, durante la migraci\u00f3n de p\u00e1ginas, anon folio debe configurarse con TTU_HWPOISON durante unmap_*(). Para la cach\u00e9 de p\u00e1ginas, necesitamos una pol\u00edtica similar a la de hwpoison_user_mappings para configurar este indicador. Por lo tanto, mueva esta pol\u00edtica de hwpoison_user_mappings a unmap_poisoned_folio para gestionar esta advertencia correctamente. Se producir\u00e1 una advertencia durante el envenenamiento de folio de unamp con el siguiente registro: ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 1 PID: 365 en mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c M\u00f3dulos vinculados: CPU: 1 UID: 0 PID: 365 Comm: bash Contaminado: GW 6.13.0-rc1-00018-gacdb4bbda7ab #42 Contaminado: [W]=WARN Nombre del hardware: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015 pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : try_to_unmap_one+0x8fc/0xd3c lr : try_to_unmap_one+0x3dc/0xd3c Rastreo de llamadas: try_to_unmap_one+0x8fc/0xd3c (P) try_to_unmap_one+0x3dc/0xd3c (L) rmap_walk_anon+0xdc/0x1f8 rmap_walk+0x3c/0x58 try_to_unmap+0x88/0x90 unmap_poisoned_folio+0x30/0xa8 do_migrate_range+0x4a0/0x568 offline_pages+0x5a4/0x670 memory_block_action+0x17c/0x374 memory_subsys_offline+0x3c/0x78 device_offline+0xa4/0xd0 state_store+0x8c/0xf0 dev_attr_store+0x18/0x2c sysfs_kf_write+0x44/0x54 kernfs_fop_write_iter+0x118/0x1a8 vfs_write+0x3a8/0x4bc ksys_write+0x6c/0xf8 __arm64_sys_write+0x1c/0x28 invoke_syscall+0x44/0x100 el0_svc_common.constprop.0+0x40/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x30/0xd0 el0t_64_sync_handler+0xc8/0xcc el0t_64_sync+0x198/0x19c ---[fin de seguimiento 0000000000000000 ]--- [mawupeng1@huawei.com: unmap_poisoned_folio(): eliminar el \u0027mapeo\u0027 local sombreado, seg\u00fan Miaohe] Enlace: https://lkml.kernel.org/r/20250219060653.3849083-1-mawupeng1@huawei.com"
}
],
"id": "CVE-2025-21907",
"lastModified": "2025-10-31T17:59:19.370",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-04-01T16:15:21.217",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/425c12c076e6fc6b2cb04b9f960319d31dcabc76"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/608cc7deb428f1122ed426060233622ebf667b6e"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/b81679b1633aa43c0d973adfa816d78c1ed0d032"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
wid-sec-w-2025-0683
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial-of-Service auszul\u00f6sen und um nicht n\u00e4her spezifizierte Auswirkungen zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0683 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0683.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0683 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0683"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21894",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21894-60f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21895",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21895-5c1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21896",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21896-395c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21897",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21897-241f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21898",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21898-22dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21899",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21899-bf75@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21900",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21900-8d31@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21901",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21901-8898@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21902",
"url": "https://lore.kernel.org/linux-cve-announce/2025040126-CVE-2025-21902-ce66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21903",
"url": "https://lore.kernel.org/linux-cve-announce/2025040128-CVE-2025-21903-4dbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21904",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21904-cd79@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21905",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21905-348b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21906",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21906-de63@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21907",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21907-5379@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21908",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21908-b8ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21909",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21909-90df@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21910",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21910-1f2f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21911",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21911-8a57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21912",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21912-5b97@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21913",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21913-b942@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21914",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21914-83dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21915",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21915-b56c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21916",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21916-28b9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21917",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21917-8a54@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21918",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21918-dc4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21919",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21919-5f2a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21920",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21920-08ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21921",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21921-9deb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21922",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21922-8c36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21923",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21923-5c6e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21924",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21924-3a08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21925",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21925-89e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21926",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21926-fd40@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21927",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21927-36d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21928",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21928-e444@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21929",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21929-bf29@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21930",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21930-cc02@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21931",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21931-3d56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21932",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21932-98f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21933",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21933-2f5b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21934",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21934-1a8d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21935",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21935-4288@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21936",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21936-fe95@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21937",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21937-90a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21938",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21938-3b75@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21939",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21939-b7d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21940",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21940-f9e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21941",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21941-8240@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21942",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21942-2957@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21943",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21943-2255@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21944",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21944-d6eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21945",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21945-d791@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21946",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21946-63a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21947",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21947-fcc5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21948",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21948-cbbb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21949",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21949-e05a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21950",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21950-11d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21951",
"url": "https://lore.kernel.org/linux-cve-announce/2025040137-CVE-2025-21951-5e0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21952",
"url": "https://lore.kernel.org/linux-cve-announce/2025040137-CVE-2025-21952-16cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21953",
"url": "https://lore.kernel.org/linux-cve-announce/2025040143-CVE-2025-21953-57ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21954",
"url": "https://lore.kernel.org/linux-cve-announce/2025040143-CVE-2025-21954-8f0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21955",
"url": "https://lore.kernel.org/linux-cve-announce/2025040143-CVE-2025-21955-c393@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21956",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21956-483d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21957",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21957-5d2c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21958",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21958-c94c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21959",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21959-a643@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21960",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21960-14ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21961",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21961-5759@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21962",
"url": "https://lore.kernel.org/linux-cve-announce/2025040145-CVE-2025-21962-9f86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21963",
"url": "https://lore.kernel.org/linux-cve-announce/2025040145-CVE-2025-21963-6e21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21964",
"url": "https://lore.kernel.org/linux-cve-announce/2025040145-CVE-2025-21964-e2c1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21965",
"url": "https://lore.kernel.org/linux-cve-announce/2025040145-CVE-2025-21965-34d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21966",
"url": "https://lore.kernel.org/linux-cve-announce/2025040145-CVE-2025-21966-afc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21967",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21967-114e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21968",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21968-c3f2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21969",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21969-d4f2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21970",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21970-fbac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21971",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21971-d17c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21972",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21972-1415@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21973",
"url": "https://lore.kernel.org/linux-cve-announce/2025040147-CVE-2025-21973-8246@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21974",
"url": "https://lore.kernel.org/linux-cve-announce/2025040147-CVE-2025-21974-1526@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21975",
"url": "https://lore.kernel.org/linux-cve-announce/2025040147-CVE-2025-21975-6693@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21976",
"url": "https://lore.kernel.org/linux-cve-announce/2025040147-CVE-2025-21976-340d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21977",
"url": "https://lore.kernel.org/linux-cve-announce/2025040147-CVE-2025-21977-5b08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21978",
"url": "https://lore.kernel.org/linux-cve-announce/2025040148-CVE-2025-21978-8f3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21979",
"url": "https://lore.kernel.org/linux-cve-announce/2025040148-CVE-2025-21979-1a5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21980",
"url": "https://lore.kernel.org/linux-cve-announce/2025040148-CVE-2025-21980-2846@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21981",
"url": "https://lore.kernel.org/linux-cve-announce/2025040148-CVE-2025-21981-963c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21982",
"url": "https://lore.kernel.org/linux-cve-announce/2025040148-CVE-2025-21982-8ddf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21983",
"url": "https://lore.kernel.org/linux-cve-announce/2025040149-CVE-2025-21983-1bcc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21984",
"url": "https://lore.kernel.org/linux-cve-announce/2025040149-CVE-2025-21984-4add@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21985",
"url": "https://lore.kernel.org/linux-cve-announce/2025040149-CVE-2025-21985-435c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21986",
"url": "https://lore.kernel.org/linux-cve-announce/2025040149-CVE-2025-21986-6729@gregkh/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-088 vom 2025-04-16",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-088.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4341 vom 2025-04-30",
"url": "https://access.redhat.com/errata/RHSA-2025:4341"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4339 vom 2025-04-30",
"url": "https://access.redhat.com/errata/RHSA-2025:4339"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-4341 vom 2025-05-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-4341.html"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2025-021 vom 2025-05-01",
"url": "https://cloud.google.com/support/bulletins#gcp-2025-021"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4498 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4498"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4471 vom 2025-05-05",
"url": "https://access.redhat.com/errata/RHSA-2025:4471"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4469 vom 2025-05-05",
"url": "https://access.redhat.com/errata/RHSA-2025:4469"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4496 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4496"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4497 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4497"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4509 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4509"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7491-1 vom 2025-05-06",
"url": "https://ubuntu.com/security/notices/USN-7491-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7499-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7499-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7500-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7500-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7500-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7500-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1977 vom 2025-05-13",
"url": "https://alas.aws.amazon.com/ALAS-2025-1977.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13",
"url": "https://ubuntu.com/security/notices/USN-7506-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7501 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:7501"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2854 vom 2025-05-14",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2854.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7423 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:7423"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7515-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7516-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7903 vom 2025-05-19",
"url": "https://access.redhat.com/errata/RHSA-2025:7903"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7514-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7512-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7517-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7956 vom 2025-05-19",
"url": "https://access.redhat.com/errata/RHSA-2025:7956"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7518-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7521-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7511-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7513-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7522-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7516-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7515-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7523-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7517-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7516-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-2 vom 2025-05-22",
"url": "https://ubuntu.com/security/notices/USN-7521-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
"url": "https://ubuntu.com/security/notices/USN-7516-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7903 vom 2025-05-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-7903.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7423 vom 2025-05-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-7423.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5925 vom 2025-05-24",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00088.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8142 vom 2025-05-26",
"url": "https://access.redhat.com/errata/RHSA-2025:8142"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7524-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7517-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7516-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
"url": "https://ubuntu.com/security/notices/USN-7510-6"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8142 vom 2025-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-8142.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-3 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7521-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-4 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7513-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7510-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-7"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-230 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-230.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-102 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-102.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7510-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-8"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-9"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-093 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-093.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-232 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-232.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-5 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7513-5"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-233 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-233.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8374 vom 2025-06-02",
"url": "https://access.redhat.com/errata/RHSA-2025:8374"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8669 vom 2025-06-09",
"url": "https://access.redhat.com/errata/RHSA-2025:8669"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8643 vom 2025-06-09",
"url": "https://access.redhat.com/errata/RHSA-2025:8643"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-094 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-094.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8643 vom 2025-06-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-8643.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20372 vom 2025-06-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-20372.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9080 vom 2025-06-16",
"url": "https://access.redhat.com/errata/RHSA-2025:9080"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9079 vom 2025-06-16",
"url": "https://access.redhat.com/errata/RHSA-2025:9079"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01965-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20408-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021550.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9080 vom 2025-06-18",
"url": "http://linux.oracle.com/errata/ELSA-2025-9080.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02000-1 vom 2025-06-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021568.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-1 vom 2025-06-19",
"url": "https://ubuntu.com/security/notices/USN-7585-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-2 vom 2025-06-19",
"url": "https://ubuntu.com/security/notices/USN-7585-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20419-1 vom 2025-06-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021591.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9302 vom 2025-06-23",
"url": "https://access.redhat.com/errata/RHSA-2025:9302"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-3 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7592-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7592-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9302 vom 2025-06-24",
"url": "https://linux.oracle.com/errata/ELSA-2025-9302.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7598-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7598-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7595-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7595-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7595-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7595-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-4 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7596-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7596-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-3 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7585-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7596-2 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7596-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-4 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7585-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7595-3 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7595-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7595-4 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7595-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9896 vom 2025-06-30",
"url": "https://access.redhat.com/errata/RHSA-2025:9896"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-5 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7585-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7606-1 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7606-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7605-1 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7605-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7595-5 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7595-5"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-102 vom 2025-06-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-102.html"
},
{
"category": "external",
"summary": "SEM 2025.2.1 release notes vom 2025-07-02",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-6 vom 2025-07-03",
"url": "https://ubuntu.com/security/notices/USN-7585-6"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9896 vom 2025-07-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-9896.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7956 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-7956.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8374 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-8374.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7501 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-7501.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9079 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-9079.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8669 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-8669.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7605-2 vom 2025-07-04",
"url": "https://ubuntu.com/security/notices/USN-7605-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-5 vom 2025-07-04",
"url": "https://ubuntu.com/security/notices/USN-7591-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7628-1 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7628-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7640-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-7 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7585-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-6 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7591-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7653-1 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7653-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7655-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11428 vom 2025-07-21",
"url": "https://access.redhat.com/errata/RHSA-2025:11428"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20483-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021917.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20475-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021919.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11428 vom 2025-07-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-11428.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20498-1 vom 2025-07-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021965.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11810 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11810"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20493-1 vom 2025-07-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021967.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11851 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11851"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11861 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11861"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11850 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11850"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11850 vom 2025-07-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-11850.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12209 vom 2025-07-29",
"url": "https://access.redhat.com/errata/RHSA-2025:12209"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12238 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12238"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11861 vom 2025-07-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-11861.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12311 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12311"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12623 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12623"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12525 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12525"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12752 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12752"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12526 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:12526"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12746 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12746"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12753 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12753"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13030 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:13030"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13029 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:13029"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13061 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:13061"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13099 vom 2025-08-06",
"url": "https://access.redhat.com/errata/RHSA-2025:13099"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13135 vom 2025-08-06",
"url": "https://access.redhat.com/errata/RHSA-2025:13135"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12752 vom 2025-08-07",
"url": "http://linux.oracle.com/errata/ELSA-2025-12752.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12746 vom 2025-08-06",
"url": "https://linux.oracle.com/errata/ELSA-2025-12746.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13633 vom 2025-08-11",
"url": "https://access.redhat.com/errata/RHSA-2025:13633"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12662 vom 2025-08-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-12662.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13776 vom 2025-08-13",
"url": "https://access.redhat.com/errata/RHSA-2025:13776"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4271 vom 2025-08-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13781 vom 2025-08-13",
"url": "https://access.redhat.com/errata/RHSA-2025:13781"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02852-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022201.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02844-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022194.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14136 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14136"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14418 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14418"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14748 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14748"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14746 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14746"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:12753 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:12753"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:11851 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:11851"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14748 vom 2025-09-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-14748.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02844-2 vom 2025-09-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022588.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14987 vom 2025-09-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-14987.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03310-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022610.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7764-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7764-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7765-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7765-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7766-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7766-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7767-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7767-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03344-1 vom 2025-09-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKXOSPRZJUZDU6VCQLCJK56ZS5CAS3IE/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7779-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7779-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7767-2 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7767-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7764-2 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7764-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03384-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022723.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7790-1 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7790-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7800-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7800-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7802-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7802-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7801-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-2 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7801-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7809-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7809-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-3 vom 2025-10-15",
"url": "https://ubuntu.com/security/notices/USN-7801-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03671-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022929.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03664-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MTOFMRK3LB5Y4CTKRSRIRDTSJXMBKZB/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03653-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022936.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03666-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R2ZDQ56FB6HP3MW5EA7XPTYNW5AUJ3AO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03638-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03652-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022937.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03672-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBPUS7ADLARNQVEORNQNHAKFYFPWDZPM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03671-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSB4TMSU4TOG6COW7K5C7QOAGBVGEEO2/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03663-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIBX7WDZXXXRTIUDX7WFS3VGPWD7NNCX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03636-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03656-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022935.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3683-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTWL6L2BIOYRPPMWBKKXRSQCWTVL6MBK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3675-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEX3OIACWJNL3JFTCKTDDY2ZAAD3HXJ5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3679-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNHGGK5KFH4OCT6BUZCQ23FN6LMQEJ7V/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17161 vom 2025-10-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-17161.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3704-1 vom 2025-10-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H42YWEJO27NI2QHNED4NU6MIZAXTRDPY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3705-1 vom 2025-10-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2C3GDA2UXZMXIQAO2JMJJII7QMPM54ZZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3712-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZYWNRYWXLEJETDZ2TBJ7OQN7FAFP4Y6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3731-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L3TCWIIDVGY2LQ4RGEKREUVE35SBN3NV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3717-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6QLOEOUP77I4M7UKXCNO7CMNS47EZCS/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3734-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3TOUYNINXLB53MUMC4YBDKDZIK7DGUF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3733-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UN435YQKTHGRJUJEQKONJDZNHE66V4AU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3721-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZXX3UCU5EV627AL7XTBESRPRFGBRMAK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7WMM33D7UTTQM25T2XCVZHFJKIMM3TO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3740-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJK5POT6L2HZCZ5WRQBIEXVSB6FWHQGN/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022975.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3736-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R47XI57K3GXZNN6FG7VTOGIXG2ZUYHVY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3765-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022991.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3748-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYXC2NBEEGHSFXWCA3DVT5LVZMZ5RRNP/"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-23T22:00:00.000+00:00",
"generator": {
"date": "2025-10-24T08:34:33.385+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-0683",
"initial_release_date": "2025-04-01T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-16T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux und Google aufgenommen"
},
{
"date": "2025-05-05T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat und Amazon aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-05-25T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Debian, SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu, Amazon, SUSE und Debian aufgenommen"
},
{
"date": "2025-06-01T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat und Amazon aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-17T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-06-22T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-24T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Oracle Linux, SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-20T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "52",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-03T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-06T22:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-11T22:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Red Hat und Debian aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Oracle Linux aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-18T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-24T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-09-25T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-20T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "81"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.14",
"product": {
"name": "Open Source Linux Kernel \u003c6.14",
"product_id": "T042305"
}
},
{
"category": "product_version",
"name": "6.14",
"product": {
"name": "Open Source Linux Kernel 6.14",
"product_id": "T042305-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.14"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.13.9",
"product": {
"name": "Open Source Linux Kernel \u003c6.13.9",
"product_id": "T042306"
}
},
{
"category": "product_version",
"name": "6.13.9",
"product": {
"name": "Open Source Linux Kernel 6.13.9",
"product_id": "T042306-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.13.9"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.12.21",
"product": {
"name": "Open Source Linux Kernel \u003c6.12.21",
"product_id": "T042307"
}
},
{
"category": "product_version",
"name": "6.12.21",
"product": {
"name": "Open Source Linux Kernel 6.12.21",
"product_id": "T042307-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.12.21"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.1.132",
"product": {
"name": "Open Source Linux Kernel \u003c6.1.132",
"product_id": "T042309"
}
},
{
"category": "product_version",
"name": "6.1.132",
"product": {
"name": "Open Source Linux Kernel 6.1.132",
"product_id": "T042309-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.1.132"
}
}
},
{
"category": "product_version_range",
"name": "\u003c5.15.179",
"product": {
"name": "Open Source Linux Kernel \u003c5.15.179",
"product_id": "T042311"
}
},
{
"category": "product_version",
"name": "5.15.179",
"product": {
"name": "Open Source Linux Kernel 5.15.179",
"product_id": "T042311-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:5.15.179"
}
}
},
{
"category": "product_version_range",
"name": "\u003c5.10.235",
"product": {
"name": "Open Source Linux Kernel \u003c5.10.235",
"product_id": "T042312"
}
},
{
"category": "product_version",
"name": "5.10.235",
"product": {
"name": "Open Source Linux Kernel 5.10.235",
"product_id": "T042312-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:5.10.235"
}
}
},
{
"category": "product_version_range",
"name": "\u003c5.4.291",
"product": {
"name": "Open Source Linux Kernel \u003c5.4.291",
"product_id": "T042313"
}
},
{
"category": "product_version",
"name": "5.4.291",
"product": {
"name": "Open Source Linux Kernel 5.4.291",
"product_id": "T042313-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:5.4.291"
}
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager \u003c2025.2.1",
"product_id": "T044986"
}
},
{
"category": "product_version",
"name": "2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager 2025.2.1",
"product_id": "T044986-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-21894",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21894"
},
{
"cve": "CVE-2025-21895",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21895"
},
{
"cve": "CVE-2025-21896",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21896"
},
{
"cve": "CVE-2025-21897",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21897"
},
{
"cve": "CVE-2025-21898",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21898"
},
{
"cve": "CVE-2025-21899",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21899"
},
{
"cve": "CVE-2025-21900",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21900"
},
{
"cve": "CVE-2025-21901",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21901"
},
{
"cve": "CVE-2025-21902",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21902"
},
{
"cve": "CVE-2025-21903",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21903"
},
{
"cve": "CVE-2025-21904",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21904"
},
{
"cve": "CVE-2025-21905",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21905"
},
{
"cve": "CVE-2025-21906",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21906"
},
{
"cve": "CVE-2025-21907",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21907"
},
{
"cve": "CVE-2025-21908",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21908"
},
{
"cve": "CVE-2025-21909",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21909"
},
{
"cve": "CVE-2025-21910",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21910"
},
{
"cve": "CVE-2025-21911",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21911"
},
{
"cve": "CVE-2025-21912",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21912"
},
{
"cve": "CVE-2025-21913",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21913"
},
{
"cve": "CVE-2025-21914",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21914"
},
{
"cve": "CVE-2025-21915",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21915"
},
{
"cve": "CVE-2025-21916",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21916"
},
{
"cve": "CVE-2025-21917",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21917"
},
{
"cve": "CVE-2025-21918",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21918"
},
{
"cve": "CVE-2025-21919",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21919"
},
{
"cve": "CVE-2025-21920",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21920"
},
{
"cve": "CVE-2025-21921",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21921"
},
{
"cve": "CVE-2025-21922",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21922"
},
{
"cve": "CVE-2025-21923",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21923"
},
{
"cve": "CVE-2025-21924",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21924"
},
{
"cve": "CVE-2025-21925",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21925"
},
{
"cve": "CVE-2025-21926",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21926"
},
{
"cve": "CVE-2025-21927",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21927"
},
{
"cve": "CVE-2025-21928",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21928"
},
{
"cve": "CVE-2025-21929",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21929"
},
{
"cve": "CVE-2025-21930",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21930"
},
{
"cve": "CVE-2025-21931",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21931"
},
{
"cve": "CVE-2025-21932",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21932"
},
{
"cve": "CVE-2025-21933",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21933"
},
{
"cve": "CVE-2025-21934",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21934"
},
{
"cve": "CVE-2025-21935",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21935"
},
{
"cve": "CVE-2025-21936",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21936"
},
{
"cve": "CVE-2025-21937",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21937"
},
{
"cve": "CVE-2025-21938",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21938"
},
{
"cve": "CVE-2025-21939",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21939"
},
{
"cve": "CVE-2025-21940",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21940"
},
{
"cve": "CVE-2025-21941",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21941"
},
{
"cve": "CVE-2025-21942",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21942"
},
{
"cve": "CVE-2025-21943",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21943"
},
{
"cve": "CVE-2025-21944",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21944"
},
{
"cve": "CVE-2025-21945",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21945"
},
{
"cve": "CVE-2025-21946",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21946"
},
{
"cve": "CVE-2025-21947",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21947"
},
{
"cve": "CVE-2025-21948",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21948"
},
{
"cve": "CVE-2025-21949",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21949"
},
{
"cve": "CVE-2025-21950",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21950"
},
{
"cve": "CVE-2025-21951",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21951"
},
{
"cve": "CVE-2025-21952",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21952"
},
{
"cve": "CVE-2025-21953",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21953"
},
{
"cve": "CVE-2025-21954",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21954"
},
{
"cve": "CVE-2025-21955",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21955"
},
{
"cve": "CVE-2025-21956",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21956"
},
{
"cve": "CVE-2025-21957",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21957"
},
{
"cve": "CVE-2025-21958",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21958"
},
{
"cve": "CVE-2025-21959",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21959"
},
{
"cve": "CVE-2025-21960",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21960"
},
{
"cve": "CVE-2025-21961",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21961"
},
{
"cve": "CVE-2025-21962",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21962"
},
{
"cve": "CVE-2025-21963",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21963"
},
{
"cve": "CVE-2025-21964",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21964"
},
{
"cve": "CVE-2025-21965",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21965"
},
{
"cve": "CVE-2025-21966",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21966"
},
{
"cve": "CVE-2025-21967",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21967"
},
{
"cve": "CVE-2025-21968",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21968"
},
{
"cve": "CVE-2025-21969",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21969"
},
{
"cve": "CVE-2025-21970",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21970"
},
{
"cve": "CVE-2025-21971",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21971"
},
{
"cve": "CVE-2025-21972",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21972"
},
{
"cve": "CVE-2025-21973",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21973"
},
{
"cve": "CVE-2025-21974",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21974"
},
{
"cve": "CVE-2025-21975",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21975"
},
{
"cve": "CVE-2025-21976",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21976"
},
{
"cve": "CVE-2025-21977",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21977"
},
{
"cve": "CVE-2025-21978",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21978"
},
{
"cve": "CVE-2025-21979",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21979"
},
{
"cve": "CVE-2025-21980",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21980"
},
{
"cve": "CVE-2025-21981",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21981"
},
{
"cve": "CVE-2025-21982",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21982"
},
{
"cve": "CVE-2025-21983",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21983"
},
{
"cve": "CVE-2025-21984",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21984"
},
{
"cve": "CVE-2025-21985",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21985"
},
{
"cve": "CVE-2025-21986",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21986"
}
]
}
ghsa-497m-pmwp-3283
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
mm: memory-failure: update ttu flag inside unmap_poisoned_folio
Patch series "mm: memory_failure: unmap poisoned folio during migrate properly", v3.
Fix two bugs during folio migration if the folio is poisoned.
This patch (of 3):
Commit 6da6b1d4a7df ("mm/hwpoison: convert TTU_IGNORE_HWPOISON to TTU_HWPOISON") introduce TTU_HWPOISON to replace TTU_IGNORE_HWPOISON in order to stop send SIGBUS signal when accessing an error page after a memory error on a clean folio. However during page migration, anon folio must be set with TTU_HWPOISON during unmap_*(). For pagecache we need some policy just like the one in hwpoison_user_mappings to set this flag. So move this policy from hwpoison_user_mappings to unmap_poisoned_folio to handle this warning properly.
Warning will be produced during unamp poison folio with the following log:
------------[ cut here ]------------ WARNING: CPU: 1 PID: 365 at mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c Modules linked in: CPU: 1 UID: 0 PID: 365 Comm: bash Tainted: G W 6.13.0-rc1-00018-gacdb4bbda7ab #42 Tainted: [W]=WARN Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015 pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : try_to_unmap_one+0x8fc/0xd3c lr : try_to_unmap_one+0x3dc/0xd3c Call trace: try_to_unmap_one+0x8fc/0xd3c (P) try_to_unmap_one+0x3dc/0xd3c (L) rmap_walk_anon+0xdc/0x1f8 rmap_walk+0x3c/0x58 try_to_unmap+0x88/0x90 unmap_poisoned_folio+0x30/0xa8 do_migrate_range+0x4a0/0x568 offline_pages+0x5a4/0x670 memory_block_action+0x17c/0x374 memory_subsys_offline+0x3c/0x78 device_offline+0xa4/0xd0 state_store+0x8c/0xf0 dev_attr_store+0x18/0x2c sysfs_kf_write+0x44/0x54 kernfs_fop_write_iter+0x118/0x1a8 vfs_write+0x3a8/0x4bc ksys_write+0x6c/0xf8 __arm64_sys_write+0x1c/0x28 invoke_syscall+0x44/0x100 el0_svc_common.constprop.0+0x40/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x30/0xd0 el0t_64_sync_handler+0xc8/0xcc el0t_64_sync+0x198/0x19c ---[ end trace 0000000000000000 ]---
[mawupeng1@huawei.com: unmap_poisoned_folio(): remove shadowed local `mapping', per Miaohe] Link: https://lkml.kernel.org/r/20250219060653.3849083-1-mawupeng1@huawei.com
{
"affected": [],
"aliases": [
"CVE-2025-21907"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-04-01T16:15:21Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memory-failure: update ttu flag inside unmap_poisoned_folio\n\nPatch series \"mm: memory_failure: unmap poisoned folio during migrate\nproperly\", v3.\n\nFix two bugs during folio migration if the folio is poisoned.\n\n\nThis patch (of 3):\n\nCommit 6da6b1d4a7df (\"mm/hwpoison: convert TTU_IGNORE_HWPOISON to\nTTU_HWPOISON\") introduce TTU_HWPOISON to replace TTU_IGNORE_HWPOISON in\norder to stop send SIGBUS signal when accessing an error page after a\nmemory error on a clean folio. However during page migration, anon folio\nmust be set with TTU_HWPOISON during unmap_*(). For pagecache we need\nsome policy just like the one in hwpoison_user_mappings to set this flag. \nSo move this policy from hwpoison_user_mappings to unmap_poisoned_folio to\nhandle this warning properly.\n\nWarning will be produced during unamp poison folio with the following log:\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 365 at mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c\n Modules linked in:\n CPU: 1 UID: 0 PID: 365 Comm: bash Tainted: G W 6.13.0-rc1-00018-gacdb4bbda7ab #42\n Tainted: [W]=WARN\n Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015\n pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : try_to_unmap_one+0x8fc/0xd3c\n lr : try_to_unmap_one+0x3dc/0xd3c\n Call trace:\n try_to_unmap_one+0x8fc/0xd3c (P)\n try_to_unmap_one+0x3dc/0xd3c (L)\n rmap_walk_anon+0xdc/0x1f8\n rmap_walk+0x3c/0x58\n try_to_unmap+0x88/0x90\n unmap_poisoned_folio+0x30/0xa8\n do_migrate_range+0x4a0/0x568\n offline_pages+0x5a4/0x670\n memory_block_action+0x17c/0x374\n memory_subsys_offline+0x3c/0x78\n device_offline+0xa4/0xd0\n state_store+0x8c/0xf0\n dev_attr_store+0x18/0x2c\n sysfs_kf_write+0x44/0x54\n kernfs_fop_write_iter+0x118/0x1a8\n vfs_write+0x3a8/0x4bc\n ksys_write+0x6c/0xf8\n __arm64_sys_write+0x1c/0x28\n invoke_syscall+0x44/0x100\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x30/0xd0\n el0t_64_sync_handler+0xc8/0xcc\n el0t_64_sync+0x198/0x19c\n ---[ end trace 0000000000000000 ]---\n\n[mawupeng1@huawei.com: unmap_poisoned_folio(): remove shadowed local `mapping\u0027, per Miaohe]\n Link: https://lkml.kernel.org/r/20250219060653.3849083-1-mawupeng1@huawei.com",
"id": "GHSA-497m-pmwp-3283",
"modified": "2025-10-31T18:31:10Z",
"published": "2025-04-01T18:30:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21907"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/425c12c076e6fc6b2cb04b9f960319d31dcabc76"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/608cc7deb428f1122ed426060233622ebf667b6e"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/b81679b1633aa43c0d973adfa816d78c1ed0d032"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.