Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-21983 (GCVE-0-2025-21983)
Vulnerability from cvelistv5
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"mm/slab_common.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "a74979dce9e9c61f6d797c3761020252c4d8dc63",
"status": "affected",
"version": "6c6c47b063b593785202be158e61fe5c827d6677",
"versionType": "git"
},
{
"lessThan": "656e35bf66a11e1adde44c4c12050086dc39f241",
"status": "affected",
"version": "6c6c47b063b593785202be158e61fe5c827d6677",
"versionType": "git"
},
{
"lessThan": "dfd3df31c9db752234d7d2e09bef2aeabb643ce4",
"status": "affected",
"version": "6c6c47b063b593785202be158e61fe5c827d6677",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"mm/slab_common.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.12"
},
{
"lessThan": "6.12",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.20",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.13.*",
"status": "unaffected",
"version": "6.13.8",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.14",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.20",
"versionStartIncluding": "6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.13.8",
"versionStartIncluding": "6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.14",
"versionStartIncluding": "6.12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq\n\nCurrently kvfree_rcu() APIs use a system workqueue which is\n\"system_unbound_wq\" to driver RCU machinery to reclaim a memory.\n\nRecently, it has been noted that the following kernel warning can\nbe observed:\n\n\u003csnip\u003e\nworkqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work\n WARNING: CPU: 21 PID: 330 at kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120\n Modules linked in: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ...\n CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: G E 6.13.2-0_g925d379822da #1\n Hardware name: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 02/01/2023\n Workqueue: nvme-wq nvme_scan_work\n RIP: 0010:check_flush_dependency+0x112/0x120\n Code: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ...\n RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082\n RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027\n RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88\n RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd\n R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400\n R13: 0000000000000000 R14: ffff88907f420fb8 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000\n CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0\n PKRU: 55555554\n Call Trace:\n \u003cTASK\u003e\n ? __warn+0xa4/0x140\n ? check_flush_dependency+0x112/0x120\n ? report_bug+0xe1/0x140\n ? check_flush_dependency+0x112/0x120\n ? handle_bug+0x5e/0x90\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? timer_recalc_next_expiry+0x190/0x190\n ? check_flush_dependency+0x112/0x120\n ? check_flush_dependency+0x112/0x120\n __flush_work.llvm.1643880146586177030+0x174/0x2c0\n flush_rcu_work+0x28/0x30\n kvfree_rcu_barrier+0x12f/0x160\n kmem_cache_destroy+0x18/0x120\n bioset_exit+0x10c/0x150\n disk_release.llvm.6740012984264378178+0x61/0xd0\n device_release+0x4f/0x90\n kobject_put+0x95/0x180\n nvme_put_ns+0x23/0xc0\n nvme_remove_invalid_namespaces+0xb3/0xd0\n nvme_scan_work+0x342/0x490\n process_scheduled_works+0x1a2/0x370\n worker_thread+0x2ff/0x390\n ? pwq_release_workfn+0x1e0/0x1e0\n kthread+0xb1/0xe0\n ? __kthread_parkme+0x70/0x70\n ret_from_fork+0x30/0x40\n ? __kthread_parkme+0x70/0x70\n ret_from_fork_asm+0x11/0x20\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\u003csnip\u003e\n\nTo address this switch to use of independent WQ_MEM_RECLAIM\nworkqueue, so the rules are not violated from workqueue framework\npoint of view.\n\nApart of that, since kvfree_rcu() does reclaim memory it is worth\nto go with WQ_MEM_RECLAIM type of wq because it is designed for\nthis purpose."
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T07:26:34.652Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/a74979dce9e9c61f6d797c3761020252c4d8dc63"
},
{
"url": "https://git.kernel.org/stable/c/656e35bf66a11e1adde44c4c12050086dc39f241"
},
{
"url": "https://git.kernel.org/stable/c/dfd3df31c9db752234d7d2e09bef2aeabb643ce4"
}
],
"title": "mm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-21983",
"datePublished": "2025-04-01T15:47:10.949Z",
"dateReserved": "2024-12-29T08:45:45.799Z",
"dateUpdated": "2025-05-04T07:26:34.652Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-21983\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-04-01T16:15:29.710\",\"lastModified\":\"2025-10-30T19:14:06.180\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq\\n\\nCurrently kvfree_rcu() APIs use a system workqueue which is\\n\\\"system_unbound_wq\\\" to driver RCU machinery to reclaim a memory.\\n\\nRecently, it has been noted that the following kernel warning can\\nbe observed:\\n\\n\u003csnip\u003e\\nworkqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work\\n WARNING: CPU: 21 PID: 330 at kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120\\n Modules linked in: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ...\\n CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: G E 6.13.2-0_g925d379822da #1\\n Hardware name: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 02/01/2023\\n Workqueue: nvme-wq nvme_scan_work\\n RIP: 0010:check_flush_dependency+0x112/0x120\\n Code: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ...\\n RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082\\n RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027\\n RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88\\n RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd\\n R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400\\n R13: 0000000000000000 R14: ffff88907f420fb8 R15: 0000000000000000\\n FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000\\n CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0\\n PKRU: 55555554\\n Call Trace:\\n \u003cTASK\u003e\\n ? __warn+0xa4/0x140\\n ? check_flush_dependency+0x112/0x120\\n ? report_bug+0xe1/0x140\\n ? check_flush_dependency+0x112/0x120\\n ? handle_bug+0x5e/0x90\\n ? exc_invalid_op+0x16/0x40\\n ? asm_exc_invalid_op+0x16/0x20\\n ? timer_recalc_next_expiry+0x190/0x190\\n ? check_flush_dependency+0x112/0x120\\n ? check_flush_dependency+0x112/0x120\\n __flush_work.llvm.1643880146586177030+0x174/0x2c0\\n flush_rcu_work+0x28/0x30\\n kvfree_rcu_barrier+0x12f/0x160\\n kmem_cache_destroy+0x18/0x120\\n bioset_exit+0x10c/0x150\\n disk_release.llvm.6740012984264378178+0x61/0xd0\\n device_release+0x4f/0x90\\n kobject_put+0x95/0x180\\n nvme_put_ns+0x23/0xc0\\n nvme_remove_invalid_namespaces+0xb3/0xd0\\n nvme_scan_work+0x342/0x490\\n process_scheduled_works+0x1a2/0x370\\n worker_thread+0x2ff/0x390\\n ? pwq_release_workfn+0x1e0/0x1e0\\n kthread+0xb1/0xe0\\n ? __kthread_parkme+0x70/0x70\\n ret_from_fork+0x30/0x40\\n ? __kthread_parkme+0x70/0x70\\n ret_from_fork_asm+0x11/0x20\\n \u003c/TASK\u003e\\n ---[ end trace 0000000000000000 ]---\\n\u003csnip\u003e\\n\\nTo address this switch to use of independent WQ_MEM_RECLAIM\\nworkqueue, so the rules are not violated from workqueue framework\\npoint of view.\\n\\nApart of that, since kvfree_rcu() does reclaim memory it is worth\\nto go with WQ_MEM_RECLAIM type of wq because it is designed for\\nthis purpose.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/slab/kvfree_rcu: Cambiar a WQ_MEM_RECLAIM wq Actualmente, las API kvfree_rcu() utilizan una cola de trabajo del sistema que es \\\"system_unbound_wq\\\" para controlar la maquinaria RCU para recuperar una memoria. Recientemente, se ha observado la siguiente advertencia del kernel: workqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work ADVERTENCIA: CPU: 21 PID: 330 en kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120 M\u00f3dulos vinculados: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ... CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: GE 6.13.2-0_g925d379822da #1 Nombre del hardware: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 01/02/2023 Cola de trabajo: nvme-wq nvme_scan_work RIP: 0010:check_flush_dependency+0x112/0x120 C\u00f3digo: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ... RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082 RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027 RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88 RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400 R13: 0000000000000000 R14: ffff88907f420fb8 R15: 000000000000000 FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000 CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0 PKRU: 55555554 Seguimiento de llamadas: ? __warn+0xa4/0x140 ? check_flush_dependency+0x112/0x120 ? report_bug+0xe1/0x140 ? check_flush_dependency+0x112/0x120 ? handle_bug+0x5e/0x90 ? exc_invalid_op+0x16/0x40 ? asm_exc_invalid_op+0x16/0x20 ? temporizador_recalc_pr\u00f3xima_expiraci\u00f3n+0x190/0x190 ? comprobaci\u00f3n_vaciado_dependencia+0x112/0x120 ? check_flush_dependency+0x112/0x120 __flush_work.llvm.1643880146586177030+0x174/0x2c0 flush_rcu_work+0x28/0x30 kvfree_rcu_barrier+0x12f/0x160 kmem_cache_destroy+0x18/0x120 bioset_exit+0x10c/0x150 disk_release.llvm.6740012984264378178+0x61/0xd0 device_release+0x4f/0x90 kobject_put+0x95/0x180 nvme_put_ns+0x23/0xc0 nvme_remove_invalid_namespaces+0xb3/0xd0 nvme_scan_work+0x342/0x490 process_scheduled_works+0x1a2/0x370 work_thread+0x2ff/0x390 ? pwq_release_workfn+0x1e0/0x1e0 kthread+0xb1/0xe0 ? __kthread_parkme+0x70/0x70 ret_from_fork+0x30/0x40 ? __kthread_parkme+0x70/0x70 ret_from_fork_asm+0x11/0x20 ---[ end trace 0000000000000000 ]--- Para solucionar esto, se cambia al uso de la cola de trabajo independiente WQ_MEM_RECLAIM, de modo que no se violen las reglas desde la perspectiva del marco de trabajo de la cola de trabajo. Adem\u00e1s, dado que kvfree_rcu() recupera memoria, conviene usar el tipo de cola de trabajo WQ_MEM_RECLAIM, ya que est\u00e1 dise\u00f1ado para este prop\u00f3sito.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.12\",\"versionEndExcluding\":\"6.12.20\",\"matchCriteriaId\":\"F6AE02FC-5B2D-426A-B8D7-3D71FBE28D40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.13\",\"versionEndExcluding\":\"6.13.8\",\"matchCriteriaId\":\"0A20D4D7-B329-4C68-B662-76062EA7DCF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"186716B6-2B66-4BD0-852E-D48E71C0C85F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3E781C-403A-498F-9DA9-ECEE50F41E75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"66619FB8-0AAF-4166-B2CF-67B24143261D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3D6550E-6679-4560-902D-AF52DCFE905B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B90F6B-BEC7-4D4E-883A-9DBADE021750\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/656e35bf66a11e1adde44c4c12050086dc39f241\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a74979dce9e9c61f6d797c3761020252c4d8dc63\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/dfd3df31c9db752234d7d2e09bef2aeabb643ce4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
wid-sec-w-2025-0683
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial-of-Service auszul\u00f6sen und um nicht n\u00e4her spezifizierte Auswirkungen zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0683 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0683.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0683 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0683"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21894",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21894-60f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21895",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21895-5c1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21896",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21896-395c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21897",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21897-241f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21898",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21898-22dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21899",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21899-bf75@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21900",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21900-8d31@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21901",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21901-8898@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21902",
"url": "https://lore.kernel.org/linux-cve-announce/2025040126-CVE-2025-21902-ce66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21903",
"url": "https://lore.kernel.org/linux-cve-announce/2025040128-CVE-2025-21903-4dbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21904",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21904-cd79@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21905",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21905-348b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21906",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21906-de63@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21907",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21907-5379@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21908",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21908-b8ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21909",
"url": "https://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21909-90df@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21910",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21910-1f2f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21911",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21911-8a57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21912",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21912-5b97@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21913",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21913-b942@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21914",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21914-83dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21915",
"url": "https://lore.kernel.org/linux-cve-announce/2025040130-CVE-2025-21915-b56c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21916",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21916-28b9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21917",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21917-8a54@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21918",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21918-dc4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21919",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21919-5f2a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21920",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21920-08ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21921",
"url": "https://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21921-9deb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21922",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21922-8c36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21923",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21923-5c6e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21924",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21924-3a08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21925",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21925-89e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21926",
"url": "https://lore.kernel.org/linux-cve-announce/2025040132-CVE-2025-21926-fd40@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21927",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21927-36d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21928",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21928-e444@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21929",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21929-bf29@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21930",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21930-cc02@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21931",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21931-3d56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21932",
"url": "https://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21932-98f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21933",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21933-2f5b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21934",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21934-1a8d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21935",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21935-4288@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21936",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21936-fe95@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21937",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21937-90a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21938",
"url": "https://lore.kernel.org/linux-cve-announce/2025040134-CVE-2025-21938-3b75@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21939",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21939-b7d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21940",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21940-f9e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21941",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21941-8240@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21942",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21942-2957@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21943",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21943-2255@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21944",
"url": "https://lore.kernel.org/linux-cve-announce/2025040135-CVE-2025-21944-d6eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21945",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21945-d791@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21946",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21946-63a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21947",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21947-fcc5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21948",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21948-cbbb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21949",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21949-e05a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21950",
"url": "https://lore.kernel.org/linux-cve-announce/2025040136-CVE-2025-21950-11d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21951",
"url": "https://lore.kernel.org/linux-cve-announce/2025040137-CVE-2025-21951-5e0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21952",
"url": "https://lore.kernel.org/linux-cve-announce/2025040137-CVE-2025-21952-16cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21953",
"url": "https://lore.kernel.org/linux-cve-announce/2025040143-CVE-2025-21953-57ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21954",
"url": "https://lore.kernel.org/linux-cve-announce/2025040143-CVE-2025-21954-8f0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21955",
"url": "https://lore.kernel.org/linux-cve-announce/2025040143-CVE-2025-21955-c393@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21956",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21956-483d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21957",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21957-5d2c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21958",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21958-c94c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21959",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21959-a643@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21960",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21960-14ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21961",
"url": "https://lore.kernel.org/linux-cve-announce/2025040144-CVE-2025-21961-5759@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21962",
"url": "https://lore.kernel.org/linux-cve-announce/2025040145-CVE-2025-21962-9f86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21963",
"url": "https://lore.kernel.org/linux-cve-announce/2025040145-CVE-2025-21963-6e21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21964",
"url": "https://lore.kernel.org/linux-cve-announce/2025040145-CVE-2025-21964-e2c1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21965",
"url": "https://lore.kernel.org/linux-cve-announce/2025040145-CVE-2025-21965-34d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21966",
"url": "https://lore.kernel.org/linux-cve-announce/2025040145-CVE-2025-21966-afc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21967",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21967-114e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21968",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21968-c3f2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21969",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21969-d4f2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21970",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21970-fbac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21971",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21971-d17c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21972",
"url": "https://lore.kernel.org/linux-cve-announce/2025040146-CVE-2025-21972-1415@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21973",
"url": "https://lore.kernel.org/linux-cve-announce/2025040147-CVE-2025-21973-8246@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21974",
"url": "https://lore.kernel.org/linux-cve-announce/2025040147-CVE-2025-21974-1526@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21975",
"url": "https://lore.kernel.org/linux-cve-announce/2025040147-CVE-2025-21975-6693@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21976",
"url": "https://lore.kernel.org/linux-cve-announce/2025040147-CVE-2025-21976-340d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21977",
"url": "https://lore.kernel.org/linux-cve-announce/2025040147-CVE-2025-21977-5b08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21978",
"url": "https://lore.kernel.org/linux-cve-announce/2025040148-CVE-2025-21978-8f3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21979",
"url": "https://lore.kernel.org/linux-cve-announce/2025040148-CVE-2025-21979-1a5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21980",
"url": "https://lore.kernel.org/linux-cve-announce/2025040148-CVE-2025-21980-2846@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21981",
"url": "https://lore.kernel.org/linux-cve-announce/2025040148-CVE-2025-21981-963c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21982",
"url": "https://lore.kernel.org/linux-cve-announce/2025040148-CVE-2025-21982-8ddf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21983",
"url": "https://lore.kernel.org/linux-cve-announce/2025040149-CVE-2025-21983-1bcc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21984",
"url": "https://lore.kernel.org/linux-cve-announce/2025040149-CVE-2025-21984-4add@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21985",
"url": "https://lore.kernel.org/linux-cve-announce/2025040149-CVE-2025-21985-435c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-21986",
"url": "https://lore.kernel.org/linux-cve-announce/2025040149-CVE-2025-21986-6729@gregkh/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-088 vom 2025-04-16",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-088.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4341 vom 2025-04-30",
"url": "https://access.redhat.com/errata/RHSA-2025:4341"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4339 vom 2025-04-30",
"url": "https://access.redhat.com/errata/RHSA-2025:4339"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-4341 vom 2025-05-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-4341.html"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2025-021 vom 2025-05-01",
"url": "https://cloud.google.com/support/bulletins#gcp-2025-021"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4498 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4498"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4471 vom 2025-05-05",
"url": "https://access.redhat.com/errata/RHSA-2025:4471"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4469 vom 2025-05-05",
"url": "https://access.redhat.com/errata/RHSA-2025:4469"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4496 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4496"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4497 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4497"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4509 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4509"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7491-1 vom 2025-05-06",
"url": "https://ubuntu.com/security/notices/USN-7491-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7499-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7499-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7500-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7500-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7500-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7500-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1977 vom 2025-05-13",
"url": "https://alas.aws.amazon.com/ALAS-2025-1977.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13",
"url": "https://ubuntu.com/security/notices/USN-7506-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7501 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:7501"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2854 vom 2025-05-14",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2854.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7423 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:7423"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7515-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7516-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7903 vom 2025-05-19",
"url": "https://access.redhat.com/errata/RHSA-2025:7903"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7514-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7512-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7517-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7956 vom 2025-05-19",
"url": "https://access.redhat.com/errata/RHSA-2025:7956"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7518-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7521-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7511-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7513-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7522-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7516-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7515-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7523-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7517-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7516-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-2 vom 2025-05-22",
"url": "https://ubuntu.com/security/notices/USN-7521-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
"url": "https://ubuntu.com/security/notices/USN-7516-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7903 vom 2025-05-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-7903.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7423 vom 2025-05-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-7423.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5925 vom 2025-05-24",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00088.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8142 vom 2025-05-26",
"url": "https://access.redhat.com/errata/RHSA-2025:8142"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7524-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7517-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7516-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
"url": "https://ubuntu.com/security/notices/USN-7510-6"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8142 vom 2025-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-8142.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7521-3 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7521-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-4 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7513-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7510-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-7"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-230 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-230.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-102 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-102.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7510-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-8"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-9"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-093 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-093.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-232 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-232.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-5 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7513-5"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-233 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-233.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8374 vom 2025-06-02",
"url": "https://access.redhat.com/errata/RHSA-2025:8374"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8669 vom 2025-06-09",
"url": "https://access.redhat.com/errata/RHSA-2025:8669"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8643 vom 2025-06-09",
"url": "https://access.redhat.com/errata/RHSA-2025:8643"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-094 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-094.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8643 vom 2025-06-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-8643.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20372 vom 2025-06-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-20372.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9080 vom 2025-06-16",
"url": "https://access.redhat.com/errata/RHSA-2025:9080"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9079 vom 2025-06-16",
"url": "https://access.redhat.com/errata/RHSA-2025:9079"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01965-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20408-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021550.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9080 vom 2025-06-18",
"url": "http://linux.oracle.com/errata/ELSA-2025-9080.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02000-1 vom 2025-06-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021568.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-1 vom 2025-06-19",
"url": "https://ubuntu.com/security/notices/USN-7585-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-2 vom 2025-06-19",
"url": "https://ubuntu.com/security/notices/USN-7585-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20419-1 vom 2025-06-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021591.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9302 vom 2025-06-23",
"url": "https://access.redhat.com/errata/RHSA-2025:9302"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-3 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7592-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7592-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9302 vom 2025-06-24",
"url": "https://linux.oracle.com/errata/ELSA-2025-9302.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7598-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7598-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7595-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7595-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7597-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7597-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7595-2 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7595-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-4 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7591-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7596-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7596-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-3 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7585-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7596-2 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7596-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-4 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7585-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7595-3 vom 2025-06-25",
"url": "https://ubuntu.com/security/notices/USN-7595-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7595-4 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7595-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9896 vom 2025-06-30",
"url": "https://access.redhat.com/errata/RHSA-2025:9896"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-5 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7585-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7606-1 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7606-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7605-1 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7605-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7595-5 vom 2025-06-30",
"url": "https://ubuntu.com/security/notices/USN-7595-5"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-102 vom 2025-06-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-102.html"
},
{
"category": "external",
"summary": "SEM 2025.2.1 release notes vom 2025-07-02",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-6 vom 2025-07-03",
"url": "https://ubuntu.com/security/notices/USN-7585-6"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9896 vom 2025-07-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-9896.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7956 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-7956.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8374 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-8374.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7501 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-7501.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-9079 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-9079.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8669 vom 2025-07-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-8669.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7605-2 vom 2025-07-04",
"url": "https://ubuntu.com/security/notices/USN-7605-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-5 vom 2025-07-04",
"url": "https://ubuntu.com/security/notices/USN-7591-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7628-1 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7628-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7640-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7585-7 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7585-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7591-6 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7591-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7653-1 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7653-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7655-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11428 vom 2025-07-21",
"url": "https://access.redhat.com/errata/RHSA-2025:11428"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20483-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021917.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20475-1 vom 2025-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021919.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11428 vom 2025-07-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-11428.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20498-1 vom 2025-07-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021965.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11810 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11810"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20493-1 vom 2025-07-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021967.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11851 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11851"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11861 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11861"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11850 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11850"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11850 vom 2025-07-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-11850.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12209 vom 2025-07-29",
"url": "https://access.redhat.com/errata/RHSA-2025:12209"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12238 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12238"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11861 vom 2025-07-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-11861.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12311 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12311"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12623 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12623"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12525 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12525"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12752 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12752"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12526 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:12526"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12746 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12746"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12753 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12753"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13030 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:13030"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13029 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:13029"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13061 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:13061"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13099 vom 2025-08-06",
"url": "https://access.redhat.com/errata/RHSA-2025:13099"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13135 vom 2025-08-06",
"url": "https://access.redhat.com/errata/RHSA-2025:13135"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12752 vom 2025-08-07",
"url": "http://linux.oracle.com/errata/ELSA-2025-12752.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12746 vom 2025-08-06",
"url": "https://linux.oracle.com/errata/ELSA-2025-12746.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13633 vom 2025-08-11",
"url": "https://access.redhat.com/errata/RHSA-2025:13633"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12662 vom 2025-08-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-12662.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13776 vom 2025-08-13",
"url": "https://access.redhat.com/errata/RHSA-2025:13776"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4271 vom 2025-08-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13781 vom 2025-08-13",
"url": "https://access.redhat.com/errata/RHSA-2025:13781"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02849-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022204.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02852-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022201.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02844-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022194.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02851-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022202.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14136 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14136"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14418 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14418"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14748 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14748"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14746 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14746"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:12753 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:12753"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:11851 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:11851"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14748 vom 2025-09-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-14748.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02844-2 vom 2025-09-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022588.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14987 vom 2025-09-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-14987.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03310-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022610.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7764-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7764-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7765-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7765-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7766-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7766-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7767-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7767-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03344-1 vom 2025-09-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKXOSPRZJUZDU6VCQLCJK56ZS5CAS3IE/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7779-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7779-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7767-2 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7767-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7764-2 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7764-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03384-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022723.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7790-1 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7790-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7800-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7800-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7802-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7802-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7801-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-2 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7801-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7809-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7809-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7801-3 vom 2025-10-15",
"url": "https://ubuntu.com/security/notices/USN-7801-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03671-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022929.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03664-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MTOFMRK3LB5Y4CTKRSRIRDTSJXMBKZB/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03653-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022936.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03666-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R2ZDQ56FB6HP3MW5EA7XPTYNW5AUJ3AO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03638-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03652-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022937.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03672-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBPUS7ADLARNQVEORNQNHAKFYFPWDZPM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03671-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSB4TMSU4TOG6COW7K5C7QOAGBVGEEO2/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03663-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIBX7WDZXXXRTIUDX7WFS3VGPWD7NNCX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03636-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03656-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022935.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3683-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTWL6L2BIOYRPPMWBKKXRSQCWTVL6MBK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3675-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEX3OIACWJNL3JFTCKTDDY2ZAAD3HXJ5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3679-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNHGGK5KFH4OCT6BUZCQ23FN6LMQEJ7V/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17161 vom 2025-10-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-17161.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3704-1 vom 2025-10-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H42YWEJO27NI2QHNED4NU6MIZAXTRDPY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3705-1 vom 2025-10-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2C3GDA2UXZMXIQAO2JMJJII7QMPM54ZZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3712-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZYWNRYWXLEJETDZ2TBJ7OQN7FAFP4Y6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3731-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L3TCWIIDVGY2LQ4RGEKREUVE35SBN3NV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3717-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6QLOEOUP77I4M7UKXCNO7CMNS47EZCS/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3734-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3TOUYNINXLB53MUMC4YBDKDZIK7DGUF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3733-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UN435YQKTHGRJUJEQKONJDZNHE66V4AU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3721-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZXX3UCU5EV627AL7XTBESRPRFGBRMAK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7WMM33D7UTTQM25T2XCVZHFJKIMM3TO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3740-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJK5POT6L2HZCZ5WRQBIEXVSB6FWHQGN/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022975.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3736-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R47XI57K3GXZNN6FG7VTOGIXG2ZUYHVY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3765-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022991.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3748-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYXC2NBEEGHSFXWCA3DVT5LVZMZ5RRNP/"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-23T22:00:00.000+00:00",
"generator": {
"date": "2025-10-24T08:34:33.385+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-0683",
"initial_release_date": "2025-04-01T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-16T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux und Google aufgenommen"
},
{
"date": "2025-05-05T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat und Amazon aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-05-25T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Debian, SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu, Amazon, SUSE und Debian aufgenommen"
},
{
"date": "2025-06-01T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat und Amazon aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-17T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-06-22T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-24T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Oracle Linux, SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-20T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "52",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-03T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-06T22:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-11T22:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Red Hat und Debian aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Oracle Linux aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-18T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-24T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-09-25T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-20T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "81"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.14",
"product": {
"name": "Open Source Linux Kernel \u003c6.14",
"product_id": "T042305"
}
},
{
"category": "product_version",
"name": "6.14",
"product": {
"name": "Open Source Linux Kernel 6.14",
"product_id": "T042305-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.14"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.13.9",
"product": {
"name": "Open Source Linux Kernel \u003c6.13.9",
"product_id": "T042306"
}
},
{
"category": "product_version",
"name": "6.13.9",
"product": {
"name": "Open Source Linux Kernel 6.13.9",
"product_id": "T042306-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.13.9"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.12.21",
"product": {
"name": "Open Source Linux Kernel \u003c6.12.21",
"product_id": "T042307"
}
},
{
"category": "product_version",
"name": "6.12.21",
"product": {
"name": "Open Source Linux Kernel 6.12.21",
"product_id": "T042307-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.12.21"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.1.132",
"product": {
"name": "Open Source Linux Kernel \u003c6.1.132",
"product_id": "T042309"
}
},
{
"category": "product_version",
"name": "6.1.132",
"product": {
"name": "Open Source Linux Kernel 6.1.132",
"product_id": "T042309-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.1.132"
}
}
},
{
"category": "product_version_range",
"name": "\u003c5.15.179",
"product": {
"name": "Open Source Linux Kernel \u003c5.15.179",
"product_id": "T042311"
}
},
{
"category": "product_version",
"name": "5.15.179",
"product": {
"name": "Open Source Linux Kernel 5.15.179",
"product_id": "T042311-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:5.15.179"
}
}
},
{
"category": "product_version_range",
"name": "\u003c5.10.235",
"product": {
"name": "Open Source Linux Kernel \u003c5.10.235",
"product_id": "T042312"
}
},
{
"category": "product_version",
"name": "5.10.235",
"product": {
"name": "Open Source Linux Kernel 5.10.235",
"product_id": "T042312-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:5.10.235"
}
}
},
{
"category": "product_version_range",
"name": "\u003c5.4.291",
"product": {
"name": "Open Source Linux Kernel \u003c5.4.291",
"product_id": "T042313"
}
},
{
"category": "product_version",
"name": "5.4.291",
"product": {
"name": "Open Source Linux Kernel 5.4.291",
"product_id": "T042313-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:5.4.291"
}
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager \u003c2025.2.1",
"product_id": "T044986"
}
},
{
"category": "product_version",
"name": "2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager 2025.2.1",
"product_id": "T044986-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-21894",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21894"
},
{
"cve": "CVE-2025-21895",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21895"
},
{
"cve": "CVE-2025-21896",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21896"
},
{
"cve": "CVE-2025-21897",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21897"
},
{
"cve": "CVE-2025-21898",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21898"
},
{
"cve": "CVE-2025-21899",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21899"
},
{
"cve": "CVE-2025-21900",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21900"
},
{
"cve": "CVE-2025-21901",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21901"
},
{
"cve": "CVE-2025-21902",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21902"
},
{
"cve": "CVE-2025-21903",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21903"
},
{
"cve": "CVE-2025-21904",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21904"
},
{
"cve": "CVE-2025-21905",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21905"
},
{
"cve": "CVE-2025-21906",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21906"
},
{
"cve": "CVE-2025-21907",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21907"
},
{
"cve": "CVE-2025-21908",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21908"
},
{
"cve": "CVE-2025-21909",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21909"
},
{
"cve": "CVE-2025-21910",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21910"
},
{
"cve": "CVE-2025-21911",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21911"
},
{
"cve": "CVE-2025-21912",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21912"
},
{
"cve": "CVE-2025-21913",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21913"
},
{
"cve": "CVE-2025-21914",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21914"
},
{
"cve": "CVE-2025-21915",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21915"
},
{
"cve": "CVE-2025-21916",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21916"
},
{
"cve": "CVE-2025-21917",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21917"
},
{
"cve": "CVE-2025-21918",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21918"
},
{
"cve": "CVE-2025-21919",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21919"
},
{
"cve": "CVE-2025-21920",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21920"
},
{
"cve": "CVE-2025-21921",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21921"
},
{
"cve": "CVE-2025-21922",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21922"
},
{
"cve": "CVE-2025-21923",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21923"
},
{
"cve": "CVE-2025-21924",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21924"
},
{
"cve": "CVE-2025-21925",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21925"
},
{
"cve": "CVE-2025-21926",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21926"
},
{
"cve": "CVE-2025-21927",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21927"
},
{
"cve": "CVE-2025-21928",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21928"
},
{
"cve": "CVE-2025-21929",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21929"
},
{
"cve": "CVE-2025-21930",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21930"
},
{
"cve": "CVE-2025-21931",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21931"
},
{
"cve": "CVE-2025-21932",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21932"
},
{
"cve": "CVE-2025-21933",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21933"
},
{
"cve": "CVE-2025-21934",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21934"
},
{
"cve": "CVE-2025-21935",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21935"
},
{
"cve": "CVE-2025-21936",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21936"
},
{
"cve": "CVE-2025-21937",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21937"
},
{
"cve": "CVE-2025-21938",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21938"
},
{
"cve": "CVE-2025-21939",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21939"
},
{
"cve": "CVE-2025-21940",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21940"
},
{
"cve": "CVE-2025-21941",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21941"
},
{
"cve": "CVE-2025-21942",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21942"
},
{
"cve": "CVE-2025-21943",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21943"
},
{
"cve": "CVE-2025-21944",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21944"
},
{
"cve": "CVE-2025-21945",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21945"
},
{
"cve": "CVE-2025-21946",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21946"
},
{
"cve": "CVE-2025-21947",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21947"
},
{
"cve": "CVE-2025-21948",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21948"
},
{
"cve": "CVE-2025-21949",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21949"
},
{
"cve": "CVE-2025-21950",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21950"
},
{
"cve": "CVE-2025-21951",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21951"
},
{
"cve": "CVE-2025-21952",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21952"
},
{
"cve": "CVE-2025-21953",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21953"
},
{
"cve": "CVE-2025-21954",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21954"
},
{
"cve": "CVE-2025-21955",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21955"
},
{
"cve": "CVE-2025-21956",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21956"
},
{
"cve": "CVE-2025-21957",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21957"
},
{
"cve": "CVE-2025-21958",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21958"
},
{
"cve": "CVE-2025-21959",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21959"
},
{
"cve": "CVE-2025-21960",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21960"
},
{
"cve": "CVE-2025-21961",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21961"
},
{
"cve": "CVE-2025-21962",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21962"
},
{
"cve": "CVE-2025-21963",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21963"
},
{
"cve": "CVE-2025-21964",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21964"
},
{
"cve": "CVE-2025-21965",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21965"
},
{
"cve": "CVE-2025-21966",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21966"
},
{
"cve": "CVE-2025-21967",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21967"
},
{
"cve": "CVE-2025-21968",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21968"
},
{
"cve": "CVE-2025-21969",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21969"
},
{
"cve": "CVE-2025-21970",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21970"
},
{
"cve": "CVE-2025-21971",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21971"
},
{
"cve": "CVE-2025-21972",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21972"
},
{
"cve": "CVE-2025-21973",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21973"
},
{
"cve": "CVE-2025-21974",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21974"
},
{
"cve": "CVE-2025-21975",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21975"
},
{
"cve": "CVE-2025-21976",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21976"
},
{
"cve": "CVE-2025-21977",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21977"
},
{
"cve": "CVE-2025-21978",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21978"
},
{
"cve": "CVE-2025-21979",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21979"
},
{
"cve": "CVE-2025-21980",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21980"
},
{
"cve": "CVE-2025-21981",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21981"
},
{
"cve": "CVE-2025-21982",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21982"
},
{
"cve": "CVE-2025-21983",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21983"
},
{
"cve": "CVE-2025-21984",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21984"
},
{
"cve": "CVE-2025-21985",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21985"
},
{
"cve": "CVE-2025-21986",
"product_status": {
"known_affected": [
"67646",
"T042307",
"T042309",
"T004914",
"T032255",
"T042311",
"T042312",
"T044986",
"T042313",
"2951",
"T002207",
"T000126",
"T042305",
"T042306",
"398363",
"1607324"
]
},
"release_date": "2025-04-01T22:00:00.000+00:00",
"title": "CVE-2025-21986"
}
]
}
ghsa-jxrr-3gxj-w229
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
mm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq
Currently kvfree_rcu() APIs use a system workqueue which is "system_unbound_wq" to driver RCU machinery to reclaim a memory.
Recently, it has been noted that the following kernel warning can be observed:
workqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work WARNING: CPU: 21 PID: 330 at kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120 Modules linked in: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ... CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: G E 6.13.2-0_g925d379822da #1 Hardware name: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 02/01/2023 Workqueue: nvme-wq nvme_scan_work RIP: 0010:check_flush_dependency+0x112/0x120 Code: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ... RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082 RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027 RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88 RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400 R13: 0000000000000000 R14: ffff88907f420fb8 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000 CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0 PKRU: 55555554 Call Trace: ? __warn+0xa4/0x140 ? check_flush_dependency+0x112/0x120 ? report_bug+0xe1/0x140 ? check_flush_dependency+0x112/0x120 ? handle_bug+0x5e/0x90 ? exc_invalid_op+0x16/0x40 ? asm_exc_invalid_op+0x16/0x20 ? timer_recalc_next_expiry+0x190/0x190 ? check_flush_dependency+0x112/0x120 ? check_flush_dependency+0x112/0x120 __flush_work.llvm.1643880146586177030+0x174/0x2c0 flush_rcu_work+0x28/0x30 kvfree_rcu_barrier+0x12f/0x160 kmem_cache_destroy+0x18/0x120 bioset_exit+0x10c/0x150 disk_release.llvm.6740012984264378178+0x61/0xd0 device_release+0x4f/0x90 kobject_put+0x95/0x180 nvme_put_ns+0x23/0xc0 nvme_remove_invalid_namespaces+0xb3/0xd0 nvme_scan_work+0x342/0x490 process_scheduled_works+0x1a2/0x370 worker_thread+0x2ff/0x390 ? pwq_release_workfn+0x1e0/0x1e0 kthread+0xb1/0xe0 ? __kthread_parkme+0x70/0x70 ret_from_fork+0x30/0x40 ? __kthread_parkme+0x70/0x70 ret_from_fork_asm+0x11/0x20 ---[ end trace 0000000000000000 ]---
To address this switch to use of independent WQ_MEM_RECLAIM workqueue, so the rules are not violated from workqueue framework point of view.
Apart of that, since kvfree_rcu() does reclaim memory it is worth to go with WQ_MEM_RECLAIM type of wq because it is designed for this purpose.
{
"affected": [],
"aliases": [
"CVE-2025-21983"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-04-01T16:15:29Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq\n\nCurrently kvfree_rcu() APIs use a system workqueue which is\n\"system_unbound_wq\" to driver RCU machinery to reclaim a memory.\n\nRecently, it has been noted that the following kernel warning can\nbe observed:\n\n\u003csnip\u003e\nworkqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work\n WARNING: CPU: 21 PID: 330 at kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120\n Modules linked in: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ...\n CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: G E 6.13.2-0_g925d379822da #1\n Hardware name: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 02/01/2023\n Workqueue: nvme-wq nvme_scan_work\n RIP: 0010:check_flush_dependency+0x112/0x120\n Code: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ...\n RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082\n RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027\n RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88\n RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd\n R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400\n R13: 0000000000000000 R14: ffff88907f420fb8 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000\n CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0\n PKRU: 55555554\n Call Trace:\n \u003cTASK\u003e\n ? __warn+0xa4/0x140\n ? check_flush_dependency+0x112/0x120\n ? report_bug+0xe1/0x140\n ? check_flush_dependency+0x112/0x120\n ? handle_bug+0x5e/0x90\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? timer_recalc_next_expiry+0x190/0x190\n ? check_flush_dependency+0x112/0x120\n ? check_flush_dependency+0x112/0x120\n __flush_work.llvm.1643880146586177030+0x174/0x2c0\n flush_rcu_work+0x28/0x30\n kvfree_rcu_barrier+0x12f/0x160\n kmem_cache_destroy+0x18/0x120\n bioset_exit+0x10c/0x150\n disk_release.llvm.6740012984264378178+0x61/0xd0\n device_release+0x4f/0x90\n kobject_put+0x95/0x180\n nvme_put_ns+0x23/0xc0\n nvme_remove_invalid_namespaces+0xb3/0xd0\n nvme_scan_work+0x342/0x490\n process_scheduled_works+0x1a2/0x370\n worker_thread+0x2ff/0x390\n ? pwq_release_workfn+0x1e0/0x1e0\n kthread+0xb1/0xe0\n ? __kthread_parkme+0x70/0x70\n ret_from_fork+0x30/0x40\n ? __kthread_parkme+0x70/0x70\n ret_from_fork_asm+0x11/0x20\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\u003csnip\u003e\n\nTo address this switch to use of independent WQ_MEM_RECLAIM\nworkqueue, so the rules are not violated from workqueue framework\npoint of view.\n\nApart of that, since kvfree_rcu() does reclaim memory it is worth\nto go with WQ_MEM_RECLAIM type of wq because it is designed for\nthis purpose.",
"id": "GHSA-jxrr-3gxj-w229",
"modified": "2025-10-30T21:30:41Z",
"published": "2025-04-01T18:30:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21983"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/656e35bf66a11e1adde44c4c12050086dc39f241"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a74979dce9e9c61f6d797c3761020252c4d8dc63"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/dfd3df31c9db752234d7d2e09bef2aeabb643ce4"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
fkie_cve-2025-21983
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/656e35bf66a11e1adde44c4c12050086dc39f241 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/a74979dce9e9c61f6d797c3761020252c4d8dc63 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/dfd3df31c9db752234d7d2e09bef2aeabb643ce4 | Patch |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.14 | |
| linux | linux_kernel | 6.14 | |
| linux | linux_kernel | 6.14 | |
| linux | linux_kernel | 6.14 | |
| linux | linux_kernel | 6.14 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AE02FC-5B2D-426A-B8D7-3D71FBE28D40",
"versionEndExcluding": "6.12.20",
"versionStartIncluding": "6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0",
"versionEndExcluding": "6.13.8",
"versionStartIncluding": "6.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq\n\nCurrently kvfree_rcu() APIs use a system workqueue which is\n\"system_unbound_wq\" to driver RCU machinery to reclaim a memory.\n\nRecently, it has been noted that the following kernel warning can\nbe observed:\n\n\u003csnip\u003e\nworkqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work\n WARNING: CPU: 21 PID: 330 at kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120\n Modules linked in: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ...\n CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: G E 6.13.2-0_g925d379822da #1\n Hardware name: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 02/01/2023\n Workqueue: nvme-wq nvme_scan_work\n RIP: 0010:check_flush_dependency+0x112/0x120\n Code: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ...\n RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082\n RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027\n RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88\n RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd\n R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400\n R13: 0000000000000000 R14: ffff88907f420fb8 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000\n CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0\n PKRU: 55555554\n Call Trace:\n \u003cTASK\u003e\n ? __warn+0xa4/0x140\n ? check_flush_dependency+0x112/0x120\n ? report_bug+0xe1/0x140\n ? check_flush_dependency+0x112/0x120\n ? handle_bug+0x5e/0x90\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? timer_recalc_next_expiry+0x190/0x190\n ? check_flush_dependency+0x112/0x120\n ? check_flush_dependency+0x112/0x120\n __flush_work.llvm.1643880146586177030+0x174/0x2c0\n flush_rcu_work+0x28/0x30\n kvfree_rcu_barrier+0x12f/0x160\n kmem_cache_destroy+0x18/0x120\n bioset_exit+0x10c/0x150\n disk_release.llvm.6740012984264378178+0x61/0xd0\n device_release+0x4f/0x90\n kobject_put+0x95/0x180\n nvme_put_ns+0x23/0xc0\n nvme_remove_invalid_namespaces+0xb3/0xd0\n nvme_scan_work+0x342/0x490\n process_scheduled_works+0x1a2/0x370\n worker_thread+0x2ff/0x390\n ? pwq_release_workfn+0x1e0/0x1e0\n kthread+0xb1/0xe0\n ? __kthread_parkme+0x70/0x70\n ret_from_fork+0x30/0x40\n ? __kthread_parkme+0x70/0x70\n ret_from_fork_asm+0x11/0x20\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\u003csnip\u003e\n\nTo address this switch to use of independent WQ_MEM_RECLAIM\nworkqueue, so the rules are not violated from workqueue framework\npoint of view.\n\nApart of that, since kvfree_rcu() does reclaim memory it is worth\nto go with WQ_MEM_RECLAIM type of wq because it is designed for\nthis purpose."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/slab/kvfree_rcu: Cambiar a WQ_MEM_RECLAIM wq Actualmente, las API kvfree_rcu() utilizan una cola de trabajo del sistema que es \"system_unbound_wq\" para controlar la maquinaria RCU para recuperar una memoria. Recientemente, se ha observado la siguiente advertencia del kernel: workqueue: WQ_MEM_RECLAIM nvme-wq:nvme_scan_work is flushing !WQ_MEM_RECLAIM events_unbound:kfree_rcu_work ADVERTENCIA: CPU: 21 PID: 330 en kernel/workqueue.c:3719 check_flush_dependency+0x112/0x120 M\u00f3dulos vinculados: intel_uncore_frequency(E) intel_uncore_frequency_common(E) skx_edac(E) ... CPU: 21 UID: 0 PID: 330 Comm: kworker/u144:6 Tainted: GE 6.13.2-0_g925d379822da #1 Nombre del hardware: Wiwynn Twin Lakes MP/Twin Lakes Passive MP, BIOS YMM20 01/02/2023 Cola de trabajo: nvme-wq nvme_scan_work RIP: 0010:check_flush_dependency+0x112/0x120 C\u00f3digo: 05 9a 40 14 02 01 48 81 c6 c0 00 00 00 48 8b 50 18 48 81 c7 c0 00 00 00 48 89 f9 48 ... RSP: 0018:ffffc90000df7bd8 EFLAGS: 00010082 RAX: 000000000000006a RBX: ffffffff81622390 RCX: 0000000000000027 RDX: 00000000fffeffff RSI: 000000000057ffa8 RDI: ffff88907f960c88 RBP: 0000000000000000 R08: ffffffff83068e50 R09: 000000000002fffd R10: 0000000000000004 R11: 0000000000000000 R12: ffff8881001a4400 R13: 0000000000000000 R14: ffff88907f420fb8 R15: 000000000000000 FS: 0000000000000000(0000) GS:ffff88907f940000(0000) knlGS:0000000000000000 CR2: 00007f60c3001000 CR3: 000000107d010005 CR4: 00000000007726f0 PKRU: 55555554 Seguimiento de llamadas: ? __warn+0xa4/0x140 ? check_flush_dependency+0x112/0x120 ? report_bug+0xe1/0x140 ? check_flush_dependency+0x112/0x120 ? handle_bug+0x5e/0x90 ? exc_invalid_op+0x16/0x40 ? asm_exc_invalid_op+0x16/0x20 ? temporizador_recalc_pr\u00f3xima_expiraci\u00f3n+0x190/0x190 ? comprobaci\u00f3n_vaciado_dependencia+0x112/0x120 ? check_flush_dependency+0x112/0x120 __flush_work.llvm.1643880146586177030+0x174/0x2c0 flush_rcu_work+0x28/0x30 kvfree_rcu_barrier+0x12f/0x160 kmem_cache_destroy+0x18/0x120 bioset_exit+0x10c/0x150 disk_release.llvm.6740012984264378178+0x61/0xd0 device_release+0x4f/0x90 kobject_put+0x95/0x180 nvme_put_ns+0x23/0xc0 nvme_remove_invalid_namespaces+0xb3/0xd0 nvme_scan_work+0x342/0x490 process_scheduled_works+0x1a2/0x370 work_thread+0x2ff/0x390 ? pwq_release_workfn+0x1e0/0x1e0 kthread+0xb1/0xe0 ? __kthread_parkme+0x70/0x70 ret_from_fork+0x30/0x40 ? __kthread_parkme+0x70/0x70 ret_from_fork_asm+0x11/0x20 ---[ end trace 0000000000000000 ]--- Para solucionar esto, se cambia al uso de la cola de trabajo independiente WQ_MEM_RECLAIM, de modo que no se violen las reglas desde la perspectiva del marco de trabajo de la cola de trabajo. Adem\u00e1s, dado que kvfree_rcu() recupera memoria, conviene usar el tipo de cola de trabajo WQ_MEM_RECLAIM, ya que est\u00e1 dise\u00f1ado para este prop\u00f3sito."
}
],
"id": "CVE-2025-21983",
"lastModified": "2025-10-30T19:14:06.180",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-04-01T16:15:29.710",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/656e35bf66a11e1adde44c4c12050086dc39f241"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/a74979dce9e9c61f6d797c3761020252c4d8dc63"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/dfd3df31c9db752234d7d2e09bef2aeabb643ce4"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.