Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-37774 (GCVE-0-2025-37774)
Vulnerability from cvelistv5
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "mm/slub.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8baa747193591410a853bac9c3710142dfa4937b", "status": "affected", "version": "21c690a349baab895dc68ab70d291e1598d7109d", "versionType": "git" }, { "lessThan": "28bef6622a1a874fe63aceeb0c684fab75afb3ae", "status": "affected", "version": "21c690a349baab895dc68ab70d291e1598d7109d", "versionType": "git" }, { "lessThan": "d2f5819b6ed357c0c350c0616b6b9f38be59adf6", "status": "affected", "version": "21c690a349baab895dc68ab70d291e1598d7109d", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "mm/slub.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.10" }, { "lessThan": "6.10", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.12.*", "status": "unaffected", "version": "6.12.25", "versionType": "semver" }, { "lessThanOrEqual": "6.14.*", "status": "unaffected", "version": "6.14.4", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.15", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.25", "versionStartIncluding": "6.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.14.4", "versionStartIncluding": "6.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.15", "versionStartIncluding": "6.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nslab: ensure slab-\u003eobj_exts is clear in a newly allocated slab page\n\nktest recently reported crashes while running several buffered io tests\nwith __alloc_tagging_slab_alloc_hook() at the top of the crash call stack.\nThe signature indicates an invalid address dereference with low bits of\nslab-\u003eobj_exts being set. The bits were outside of the range used by\npage_memcg_data_flags and objext_flags and hence were not masked out\nby slab_obj_exts() when obtaining the pointer stored in slab-\u003eobj_exts.\nThe typical crash log looks like this:\n\n00510 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n00510 Mem abort info:\n00510 ESR = 0x0000000096000045\n00510 EC = 0x25: DABT (current EL), IL = 32 bits\n00510 SET = 0, FnV = 0\n00510 EA = 0, S1PTW = 0\n00510 FSC = 0x05: level 1 translation fault\n00510 Data abort info:\n00510 ISV = 0, ISS = 0x00000045, ISS2 = 0x00000000\n00510 CM = 0, WnR = 1, TnD = 0, TagAccess = 0\n00510 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n00510 user pgtable: 4k pages, 39-bit VAs, pgdp=0000000104175000\n00510 [0000000000000010] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n00510 Internal error: Oops: 0000000096000045 [#1] SMP\n00510 Modules linked in:\n00510 CPU: 10 UID: 0 PID: 7692 Comm: cat Not tainted 6.15.0-rc1-ktest-g189e17946605 #19327 NONE\n00510 Hardware name: linux,dummy-virt (DT)\n00510 pstate: 20001005 (nzCv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--)\n00510 pc : __alloc_tagging_slab_alloc_hook+0xe0/0x190\n00510 lr : __kmalloc_noprof+0x150/0x310\n00510 sp : ffffff80c87df6c0\n00510 x29: ffffff80c87df6c0 x28: 000000000013d1ff x27: 000000000013d200\n00510 x26: ffffff80c87df9e0 x25: 0000000000000000 x24: 0000000000000001\n00510 x23: ffffffc08041953c x22: 000000000000004c x21: ffffff80c0002180\n00510 x20: fffffffec3120840 x19: ffffff80c4821000 x18: 0000000000000000\n00510 x17: fffffffec3d02f00 x16: fffffffec3d02e00 x15: fffffffec3d00700\n00510 x14: fffffffec3d00600 x13: 0000000000000200 x12: 0000000000000006\n00510 x11: ffffffc080bb86c0 x10: 0000000000000000 x9 : ffffffc080201e58\n00510 x8 : ffffff80c4821060 x7 : 0000000000000000 x6 : 0000000055555556\n00510 x5 : 0000000000000001 x4 : 0000000000000010 x3 : 0000000000000060\n00510 x2 : 0000000000000000 x1 : ffffffc080f50cf8 x0 : ffffff80d801d000\n00510 Call trace:\n00510 __alloc_tagging_slab_alloc_hook+0xe0/0x190 (P)\n00510 __kmalloc_noprof+0x150/0x310\n00510 __bch2_folio_create+0x5c/0xf8\n00510 bch2_folio_create+0x2c/0x40\n00510 bch2_readahead+0xc0/0x460\n00510 read_pages+0x7c/0x230\n00510 page_cache_ra_order+0x244/0x3a8\n00510 page_cache_async_ra+0x124/0x170\n00510 filemap_readahead.isra.0+0x58/0xa0\n00510 filemap_get_pages+0x454/0x7b0\n00510 filemap_read+0xdc/0x418\n00510 bch2_read_iter+0x100/0x1b0\n00510 vfs_read+0x214/0x300\n00510 ksys_read+0x6c/0x108\n00510 __arm64_sys_read+0x20/0x30\n00510 invoke_syscall.constprop.0+0x54/0xe8\n00510 do_el0_svc+0x44/0xc8\n00510 el0_svc+0x18/0x58\n00510 el0t_64_sync_handler+0x104/0x130\n00510 el0t_64_sync+0x154/0x158\n00510 Code: d5384100 f9401c01 b9401aa3 b40002e1 (f8227881)\n00510 ---[ end trace 0000000000000000 ]---\n00510 Kernel panic - not syncing: Oops: Fatal exception\n00510 SMP: stopping secondary CPUs\n00510 Kernel Offset: disabled\n00510 CPU features: 0x0000,000000e0,00000410,8240500b\n00510 Memory Limit: none\n\nInvestigation indicates that these bits are already set when we allocate\nslab page and are not zeroed out after allocation. We are not yet sure\nwhy these crashes start happening only recently but regardless of the\nreason, not initializing a field that gets used later is wrong. Fix it\nby initializing slab-\u003eobj_exts during slab page allocation." } ], "providerMetadata": { "dateUpdated": "2025-05-26T05:20:36.102Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8baa747193591410a853bac9c3710142dfa4937b" }, { "url": "https://git.kernel.org/stable/c/28bef6622a1a874fe63aceeb0c684fab75afb3ae" }, { "url": "https://git.kernel.org/stable/c/d2f5819b6ed357c0c350c0616b6b9f38be59adf6" } ], "title": "slab: ensure slab-\u003eobj_exts is clear in a newly allocated slab page", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2025-37774", "datePublished": "2025-05-01T13:07:13.593Z", "dateReserved": "2025-04-16T04:51:23.939Z", "dateUpdated": "2025-05-26T05:20:36.102Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-37774\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-01T14:15:40.877\",\"lastModified\":\"2025-05-02T13:53:20.943\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nslab: ensure slab-\u003eobj_exts is clear in a newly allocated slab page\\n\\nktest recently reported crashes while running several buffered io tests\\nwith __alloc_tagging_slab_alloc_hook() at the top of the crash call stack.\\nThe signature indicates an invalid address dereference with low bits of\\nslab-\u003eobj_exts being set. The bits were outside of the range used by\\npage_memcg_data_flags and objext_flags and hence were not masked out\\nby slab_obj_exts() when obtaining the pointer stored in slab-\u003eobj_exts.\\nThe typical crash log looks like this:\\n\\n00510 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010\\n00510 Mem abort info:\\n00510 ESR = 0x0000000096000045\\n00510 EC = 0x25: DABT (current EL), IL = 32 bits\\n00510 SET = 0, FnV = 0\\n00510 EA = 0, S1PTW = 0\\n00510 FSC = 0x05: level 1 translation fault\\n00510 Data abort info:\\n00510 ISV = 0, ISS = 0x00000045, ISS2 = 0x00000000\\n00510 CM = 0, WnR = 1, TnD = 0, TagAccess = 0\\n00510 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\\n00510 user pgtable: 4k pages, 39-bit VAs, pgdp=0000000104175000\\n00510 [0000000000000010] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\\n00510 Internal error: Oops: 0000000096000045 [#1] SMP\\n00510 Modules linked in:\\n00510 CPU: 10 UID: 0 PID: 7692 Comm: cat Not tainted 6.15.0-rc1-ktest-g189e17946605 #19327 NONE\\n00510 Hardware name: linux,dummy-virt (DT)\\n00510 pstate: 20001005 (nzCv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--)\\n00510 pc : __alloc_tagging_slab_alloc_hook+0xe0/0x190\\n00510 lr : __kmalloc_noprof+0x150/0x310\\n00510 sp : ffffff80c87df6c0\\n00510 x29: ffffff80c87df6c0 x28: 000000000013d1ff x27: 000000000013d200\\n00510 x26: ffffff80c87df9e0 x25: 0000000000000000 x24: 0000000000000001\\n00510 x23: ffffffc08041953c x22: 000000000000004c x21: ffffff80c0002180\\n00510 x20: fffffffec3120840 x19: ffffff80c4821000 x18: 0000000000000000\\n00510 x17: fffffffec3d02f00 x16: fffffffec3d02e00 x15: fffffffec3d00700\\n00510 x14: fffffffec3d00600 x13: 0000000000000200 x12: 0000000000000006\\n00510 x11: ffffffc080bb86c0 x10: 0000000000000000 x9 : ffffffc080201e58\\n00510 x8 : ffffff80c4821060 x7 : 0000000000000000 x6 : 0000000055555556\\n00510 x5 : 0000000000000001 x4 : 0000000000000010 x3 : 0000000000000060\\n00510 x2 : 0000000000000000 x1 : ffffffc080f50cf8 x0 : ffffff80d801d000\\n00510 Call trace:\\n00510 __alloc_tagging_slab_alloc_hook+0xe0/0x190 (P)\\n00510 __kmalloc_noprof+0x150/0x310\\n00510 __bch2_folio_create+0x5c/0xf8\\n00510 bch2_folio_create+0x2c/0x40\\n00510 bch2_readahead+0xc0/0x460\\n00510 read_pages+0x7c/0x230\\n00510 page_cache_ra_order+0x244/0x3a8\\n00510 page_cache_async_ra+0x124/0x170\\n00510 filemap_readahead.isra.0+0x58/0xa0\\n00510 filemap_get_pages+0x454/0x7b0\\n00510 filemap_read+0xdc/0x418\\n00510 bch2_read_iter+0x100/0x1b0\\n00510 vfs_read+0x214/0x300\\n00510 ksys_read+0x6c/0x108\\n00510 __arm64_sys_read+0x20/0x30\\n00510 invoke_syscall.constprop.0+0x54/0xe8\\n00510 do_el0_svc+0x44/0xc8\\n00510 el0_svc+0x18/0x58\\n00510 el0t_64_sync_handler+0x104/0x130\\n00510 el0t_64_sync+0x154/0x158\\n00510 Code: d5384100 f9401c01 b9401aa3 b40002e1 (f8227881)\\n00510 ---[ end trace 0000000000000000 ]---\\n00510 Kernel panic - not syncing: Oops: Fatal exception\\n00510 SMP: stopping secondary CPUs\\n00510 Kernel Offset: disabled\\n00510 CPU features: 0x0000,000000e0,00000410,8240500b\\n00510 Memory Limit: none\\n\\nInvestigation indicates that these bits are already set when we allocate\\nslab page and are not zeroed out after allocation. We are not yet sure\\nwhy these crashes start happening only recently but regardless of the\\nreason, not initializing a field that gets used later is wrong. Fix it\\nby initializing slab-\u003eobj_exts during slab page allocation.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: slab: garantizar que slab-\u0026gt;obj_exts est\u00e9 libre en una p\u00e1gina slab reci\u00e9n asignada. ktest report\u00f3 recientemente fallos al ejecutar varias pruebas de E/S con buffer con __alloc_tagging_slab_alloc_hook() en la parte superior de la pila de llamadas de fallo. La firma indica una desreferencia de direcci\u00f3n no v\u00e1lida con bits bajos de slab-\u0026gt;obj_exts activados. Los bits estaban fuera del rango utilizado por page_memcg_data_flags y objext_flags, por lo que slab_obj_exts() no los enmascar\u00f3 al obtener el puntero almacenado en slab-\u0026gt;obj_exts. El registro de fallos t\u00edpico se ve as\u00ed: 00510 No se puede controlar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 0000000000000010 00510 Informaci\u00f3n de aborto de memoria: 00510 ESR = 0x0000000096000045 00510 EC = 0x25: DABT (current EL), IL = 32 bits 00510 SET = 0, FnV = 0 00510 EA = 0, S1PTW = 0 00510 FSC = 0x05: level 1 translation fault 00510 Data abort info: 00510 ISV = 0, ISS = 0x00000045, ISS2 = 0x00000000 00510 CM = 0, WnR = 1, TnD = 0, TagAccess = 0 00510 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 00510 user pgtable: 4k pages, 39-bit VAs, pgdp=0000000104175000 00510 [0000000000000010] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000 00510 Internal error: Oops: 0000000096000045 [#1] SMP 00510 Modules linked in: 00510 CPU: 10 UID: 0 PID: 7692 Comm: cat Not tainted 6.15.0-rc1-ktest-g189e17946605 #19327 NONE 00510 Hardware name: linux,dummy-virt (DT) 00510 pstate: 20001005 (nzCv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--) 00510 pc : __alloc_tagging_slab_alloc_hook+0xe0/0x190 00510 lr : __kmalloc_noprof+0x150/0x310 00510 sp : ffffff80c87df6c0 00510 x29: ffffff80c87df6c0 x28: 000000000013d1ff x27: 000000000013d200 00510 x26: ffffff80c87df9e0 x25: 0000000000000000 x24: 0000000000000001 00510 x23: ffffffc08041953c x22: 000000000000004c x21: ffffff80c0002180 00510 x20: fffffffec3120840 x19: ffffff80c4821000 x18: 0000000000000000 00510 x17: fffffffec3d02f00 x16: fffffffec3d02e00 x15: fffffffec3d00700 00510 x14: fffffffec3d00600 x13: 0000000000000200 x12: 0000000000000006 00510 x11: ffffffc080bb86c0 x10: 0000000000000000 x9 : ffffffc080201e58 00510 x8 : ffffff80c4821060 x7 : 0000000000000000 x6 : 0000000055555556 00510 x5 : 0000000000000001 x4 : 0000000000000010 x3 : 0000000000000060 00510 x2 : 0000000000000000 x1 : ffffffc080f50cf8 x0 : ffffff80d801d000 00510 Call trace: 00510 __alloc_tagging_slab_alloc_hook+0xe0/0x190 (P) 00510 __kmalloc_noprof+0x150/0x310 00510 __bch2_folio_create+0x5c/0xf8 00510 bch2_folio_create+0x2c/0x40 00510 bch2_readahead+0xc0/0x460 00510 read_pages+0x7c/0x230 00510 page_cache_ra_order+0x244/0x3a8 00510 page_cache_async_ra+0x124/0x170 00510 filemap_readahead.isra.0+0x58/0xa0 00510 filemap_get_pages+0x454/0x7b0 00510 filemap_read+0xdc/0x418 00510 bch2_read_iter+0x100/0x1b0 00510 vfs_read+0x214/0x300 00510 ksys_read+0x6c/0x108 00510 __arm64_sys_read+0x20/0x30 00510 invoke_syscall.constprop.0+0x54/0xe8 00510 do_el0_svc+0x44/0xc8 00510 el0_svc+0x18/0x58 00510 el0t_64_sync_handler+0x104/0x130 00510 el0t_64_sync+0x154/0x158 00510 Code: d5384100 f9401c01 b9401aa3 b40002e1 (f8227881) 00510 ---[ end trace 0000000000000000 ]--- 00510 Kernel panic - not syncing: Oops: Fatal exception 00510 SMP: stopping secondary CPUs 00510 Kernel Offset: disabled 00510 CPU features: 0x0000,000000e0,00000410,8240500b 00510 L\u00edmite de memoria: ninguno. La investigaci\u00f3n indica que estos bits ya est\u00e1n configurados al asignar la p\u00e1gina slab y no se ponen a cero tras la asignaci\u00f3n. A\u00fan no sabemos con certeza por qu\u00e9 estos fallos han comenzado a ocurrir recientemente, pero independientemente del motivo, es incorrecto no inicializar un campo que se utiliza posteriormente. Para solucionarlo, inicialice slab-\u0026gt;obj_exts durante la asignaci\u00f3n de la p\u00e1gina slab.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/28bef6622a1a874fe63aceeb0c684fab75afb3ae\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8baa747193591410a853bac9c3710142dfa4937b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d2f5819b6ed357c0c350c0616b6b9f38be59adf6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
fkie_cve-2025-37774
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nslab: ensure slab-\u003eobj_exts is clear in a newly allocated slab page\n\nktest recently reported crashes while running several buffered io tests\nwith __alloc_tagging_slab_alloc_hook() at the top of the crash call stack.\nThe signature indicates an invalid address dereference with low bits of\nslab-\u003eobj_exts being set. The bits were outside of the range used by\npage_memcg_data_flags and objext_flags and hence were not masked out\nby slab_obj_exts() when obtaining the pointer stored in slab-\u003eobj_exts.\nThe typical crash log looks like this:\n\n00510 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n00510 Mem abort info:\n00510 ESR = 0x0000000096000045\n00510 EC = 0x25: DABT (current EL), IL = 32 bits\n00510 SET = 0, FnV = 0\n00510 EA = 0, S1PTW = 0\n00510 FSC = 0x05: level 1 translation fault\n00510 Data abort info:\n00510 ISV = 0, ISS = 0x00000045, ISS2 = 0x00000000\n00510 CM = 0, WnR = 1, TnD = 0, TagAccess = 0\n00510 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n00510 user pgtable: 4k pages, 39-bit VAs, pgdp=0000000104175000\n00510 [0000000000000010] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n00510 Internal error: Oops: 0000000096000045 [#1] SMP\n00510 Modules linked in:\n00510 CPU: 10 UID: 0 PID: 7692 Comm: cat Not tainted 6.15.0-rc1-ktest-g189e17946605 #19327 NONE\n00510 Hardware name: linux,dummy-virt (DT)\n00510 pstate: 20001005 (nzCv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--)\n00510 pc : __alloc_tagging_slab_alloc_hook+0xe0/0x190\n00510 lr : __kmalloc_noprof+0x150/0x310\n00510 sp : ffffff80c87df6c0\n00510 x29: ffffff80c87df6c0 x28: 000000000013d1ff x27: 000000000013d200\n00510 x26: ffffff80c87df9e0 x25: 0000000000000000 x24: 0000000000000001\n00510 x23: ffffffc08041953c x22: 000000000000004c x21: ffffff80c0002180\n00510 x20: fffffffec3120840 x19: ffffff80c4821000 x18: 0000000000000000\n00510 x17: fffffffec3d02f00 x16: fffffffec3d02e00 x15: fffffffec3d00700\n00510 x14: fffffffec3d00600 x13: 0000000000000200 x12: 0000000000000006\n00510 x11: ffffffc080bb86c0 x10: 0000000000000000 x9 : ffffffc080201e58\n00510 x8 : ffffff80c4821060 x7 : 0000000000000000 x6 : 0000000055555556\n00510 x5 : 0000000000000001 x4 : 0000000000000010 x3 : 0000000000000060\n00510 x2 : 0000000000000000 x1 : ffffffc080f50cf8 x0 : ffffff80d801d000\n00510 Call trace:\n00510 __alloc_tagging_slab_alloc_hook+0xe0/0x190 (P)\n00510 __kmalloc_noprof+0x150/0x310\n00510 __bch2_folio_create+0x5c/0xf8\n00510 bch2_folio_create+0x2c/0x40\n00510 bch2_readahead+0xc0/0x460\n00510 read_pages+0x7c/0x230\n00510 page_cache_ra_order+0x244/0x3a8\n00510 page_cache_async_ra+0x124/0x170\n00510 filemap_readahead.isra.0+0x58/0xa0\n00510 filemap_get_pages+0x454/0x7b0\n00510 filemap_read+0xdc/0x418\n00510 bch2_read_iter+0x100/0x1b0\n00510 vfs_read+0x214/0x300\n00510 ksys_read+0x6c/0x108\n00510 __arm64_sys_read+0x20/0x30\n00510 invoke_syscall.constprop.0+0x54/0xe8\n00510 do_el0_svc+0x44/0xc8\n00510 el0_svc+0x18/0x58\n00510 el0t_64_sync_handler+0x104/0x130\n00510 el0t_64_sync+0x154/0x158\n00510 Code: d5384100 f9401c01 b9401aa3 b40002e1 (f8227881)\n00510 ---[ end trace 0000000000000000 ]---\n00510 Kernel panic - not syncing: Oops: Fatal exception\n00510 SMP: stopping secondary CPUs\n00510 Kernel Offset: disabled\n00510 CPU features: 0x0000,000000e0,00000410,8240500b\n00510 Memory Limit: none\n\nInvestigation indicates that these bits are already set when we allocate\nslab page and are not zeroed out after allocation. We are not yet sure\nwhy these crashes start happening only recently but regardless of the\nreason, not initializing a field that gets used later is wrong. Fix it\nby initializing slab-\u003eobj_exts during slab page allocation." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: slab: garantizar que slab-\u0026gt;obj_exts est\u00e9 libre en una p\u00e1gina slab reci\u00e9n asignada. ktest report\u00f3 recientemente fallos al ejecutar varias pruebas de E/S con buffer con __alloc_tagging_slab_alloc_hook() en la parte superior de la pila de llamadas de fallo. La firma indica una desreferencia de direcci\u00f3n no v\u00e1lida con bits bajos de slab-\u0026gt;obj_exts activados. Los bits estaban fuera del rango utilizado por page_memcg_data_flags y objext_flags, por lo que slab_obj_exts() no los enmascar\u00f3 al obtener el puntero almacenado en slab-\u0026gt;obj_exts. El registro de fallos t\u00edpico se ve as\u00ed: 00510 No se puede controlar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 0000000000000010 00510 Informaci\u00f3n de aborto de memoria: 00510 ESR = 0x0000000096000045 00510 EC = 0x25: DABT (current EL), IL = 32 bits 00510 SET = 0, FnV = 0 00510 EA = 0, S1PTW = 0 00510 FSC = 0x05: level 1 translation fault 00510 Data abort info: 00510 ISV = 0, ISS = 0x00000045, ISS2 = 0x00000000 00510 CM = 0, WnR = 1, TnD = 0, TagAccess = 0 00510 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 00510 user pgtable: 4k pages, 39-bit VAs, pgdp=0000000104175000 00510 [0000000000000010] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000 00510 Internal error: Oops: 0000000096000045 [#1] SMP 00510 Modules linked in: 00510 CPU: 10 UID: 0 PID: 7692 Comm: cat Not tainted 6.15.0-rc1-ktest-g189e17946605 #19327 NONE 00510 Hardware name: linux,dummy-virt (DT) 00510 pstate: 20001005 (nzCv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--) 00510 pc : __alloc_tagging_slab_alloc_hook+0xe0/0x190 00510 lr : __kmalloc_noprof+0x150/0x310 00510 sp : ffffff80c87df6c0 00510 x29: ffffff80c87df6c0 x28: 000000000013d1ff x27: 000000000013d200 00510 x26: ffffff80c87df9e0 x25: 0000000000000000 x24: 0000000000000001 00510 x23: ffffffc08041953c x22: 000000000000004c x21: ffffff80c0002180 00510 x20: fffffffec3120840 x19: ffffff80c4821000 x18: 0000000000000000 00510 x17: fffffffec3d02f00 x16: fffffffec3d02e00 x15: fffffffec3d00700 00510 x14: fffffffec3d00600 x13: 0000000000000200 x12: 0000000000000006 00510 x11: ffffffc080bb86c0 x10: 0000000000000000 x9 : ffffffc080201e58 00510 x8 : ffffff80c4821060 x7 : 0000000000000000 x6 : 0000000055555556 00510 x5 : 0000000000000001 x4 : 0000000000000010 x3 : 0000000000000060 00510 x2 : 0000000000000000 x1 : ffffffc080f50cf8 x0 : ffffff80d801d000 00510 Call trace: 00510 __alloc_tagging_slab_alloc_hook+0xe0/0x190 (P) 00510 __kmalloc_noprof+0x150/0x310 00510 __bch2_folio_create+0x5c/0xf8 00510 bch2_folio_create+0x2c/0x40 00510 bch2_readahead+0xc0/0x460 00510 read_pages+0x7c/0x230 00510 page_cache_ra_order+0x244/0x3a8 00510 page_cache_async_ra+0x124/0x170 00510 filemap_readahead.isra.0+0x58/0xa0 00510 filemap_get_pages+0x454/0x7b0 00510 filemap_read+0xdc/0x418 00510 bch2_read_iter+0x100/0x1b0 00510 vfs_read+0x214/0x300 00510 ksys_read+0x6c/0x108 00510 __arm64_sys_read+0x20/0x30 00510 invoke_syscall.constprop.0+0x54/0xe8 00510 do_el0_svc+0x44/0xc8 00510 el0_svc+0x18/0x58 00510 el0t_64_sync_handler+0x104/0x130 00510 el0t_64_sync+0x154/0x158 00510 Code: d5384100 f9401c01 b9401aa3 b40002e1 (f8227881) 00510 ---[ end trace 0000000000000000 ]--- 00510 Kernel panic - not syncing: Oops: Fatal exception 00510 SMP: stopping secondary CPUs 00510 Kernel Offset: disabled 00510 CPU features: 0x0000,000000e0,00000410,8240500b 00510 L\u00edmite de memoria: ninguno. La investigaci\u00f3n indica que estos bits ya est\u00e1n configurados al asignar la p\u00e1gina slab y no se ponen a cero tras la asignaci\u00f3n. A\u00fan no sabemos con certeza por qu\u00e9 estos fallos han comenzado a ocurrir recientemente, pero independientemente del motivo, es incorrecto no inicializar un campo que se utiliza posteriormente. Para solucionarlo, inicialice slab-\u0026gt;obj_exts durante la asignaci\u00f3n de la p\u00e1gina slab." } ], "id": "CVE-2025-37774", "lastModified": "2025-05-02T13:53:20.943", "metrics": {}, "published": "2025-05-01T14:15:40.877", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/28bef6622a1a874fe63aceeb0c684fab75afb3ae" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/8baa747193591410a853bac9c3710142dfa4937b" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/d2f5819b6ed357c0c350c0616b6b9f38be59adf6" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
ghsa-g9q4-8883-7234
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
slab: ensure slab->obj_exts is clear in a newly allocated slab page
ktest recently reported crashes while running several buffered io tests with __alloc_tagging_slab_alloc_hook() at the top of the crash call stack. The signature indicates an invalid address dereference with low bits of slab->obj_exts being set. The bits were outside of the range used by page_memcg_data_flags and objext_flags and hence were not masked out by slab_obj_exts() when obtaining the pointer stored in slab->obj_exts. The typical crash log looks like this:
00510 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010 00510 Mem abort info: 00510 ESR = 0x0000000096000045 00510 EC = 0x25: DABT (current EL), IL = 32 bits 00510 SET = 0, FnV = 0 00510 EA = 0, S1PTW = 0 00510 FSC = 0x05: level 1 translation fault 00510 Data abort info: 00510 ISV = 0, ISS = 0x00000045, ISS2 = 0x00000000 00510 CM = 0, WnR = 1, TnD = 0, TagAccess = 0 00510 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 00510 user pgtable: 4k pages, 39-bit VAs, pgdp=0000000104175000 00510 [0000000000000010] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000 00510 Internal error: Oops: 0000000096000045 [#1] SMP 00510 Modules linked in: 00510 CPU: 10 UID: 0 PID: 7692 Comm: cat Not tainted 6.15.0-rc1-ktest-g189e17946605 #19327 NONE 00510 Hardware name: linux,dummy-virt (DT) 00510 pstate: 20001005 (nzCv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--) 00510 pc : __alloc_tagging_slab_alloc_hook+0xe0/0x190 00510 lr : __kmalloc_noprof+0x150/0x310 00510 sp : ffffff80c87df6c0 00510 x29: ffffff80c87df6c0 x28: 000000000013d1ff x27: 000000000013d200 00510 x26: ffffff80c87df9e0 x25: 0000000000000000 x24: 0000000000000001 00510 x23: ffffffc08041953c x22: 000000000000004c x21: ffffff80c0002180 00510 x20: fffffffec3120840 x19: ffffff80c4821000 x18: 0000000000000000 00510 x17: fffffffec3d02f00 x16: fffffffec3d02e00 x15: fffffffec3d00700 00510 x14: fffffffec3d00600 x13: 0000000000000200 x12: 0000000000000006 00510 x11: ffffffc080bb86c0 x10: 0000000000000000 x9 : ffffffc080201e58 00510 x8 : ffffff80c4821060 x7 : 0000000000000000 x6 : 0000000055555556 00510 x5 : 0000000000000001 x4 : 0000000000000010 x3 : 0000000000000060 00510 x2 : 0000000000000000 x1 : ffffffc080f50cf8 x0 : ffffff80d801d000 00510 Call trace: 00510 __alloc_tagging_slab_alloc_hook+0xe0/0x190 (P) 00510 __kmalloc_noprof+0x150/0x310 00510 __bch2_folio_create+0x5c/0xf8 00510 bch2_folio_create+0x2c/0x40 00510 bch2_readahead+0xc0/0x460 00510 read_pages+0x7c/0x230 00510 page_cache_ra_order+0x244/0x3a8 00510 page_cache_async_ra+0x124/0x170 00510 filemap_readahead.isra.0+0x58/0xa0 00510 filemap_get_pages+0x454/0x7b0 00510 filemap_read+0xdc/0x418 00510 bch2_read_iter+0x100/0x1b0 00510 vfs_read+0x214/0x300 00510 ksys_read+0x6c/0x108 00510 __arm64_sys_read+0x20/0x30 00510 invoke_syscall.constprop.0+0x54/0xe8 00510 do_el0_svc+0x44/0xc8 00510 el0_svc+0x18/0x58 00510 el0t_64_sync_handler+0x104/0x130 00510 el0t_64_sync+0x154/0x158 00510 Code: d5384100 f9401c01 b9401aa3 b40002e1 (f8227881) 00510 ---[ end trace 0000000000000000 ]--- 00510 Kernel panic - not syncing: Oops: Fatal exception 00510 SMP: stopping secondary CPUs 00510 Kernel Offset: disabled 00510 CPU features: 0x0000,000000e0,00000410,8240500b 00510 Memory Limit: none
Investigation indicates that these bits are already set when we allocate slab page and are not zeroed out after allocation. We are not yet sure why these crashes start happening only recently but regardless of the reason, not initializing a field that gets used later is wrong. Fix it by initializing slab->obj_exts during slab page allocation.
{ "affected": [], "aliases": [ "CVE-2025-37774" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-05-01T14:15:40Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nslab: ensure slab-\u003eobj_exts is clear in a newly allocated slab page\n\nktest recently reported crashes while running several buffered io tests\nwith __alloc_tagging_slab_alloc_hook() at the top of the crash call stack.\nThe signature indicates an invalid address dereference with low bits of\nslab-\u003eobj_exts being set. The bits were outside of the range used by\npage_memcg_data_flags and objext_flags and hence were not masked out\nby slab_obj_exts() when obtaining the pointer stored in slab-\u003eobj_exts.\nThe typical crash log looks like this:\n\n00510 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n00510 Mem abort info:\n00510 ESR = 0x0000000096000045\n00510 EC = 0x25: DABT (current EL), IL = 32 bits\n00510 SET = 0, FnV = 0\n00510 EA = 0, S1PTW = 0\n00510 FSC = 0x05: level 1 translation fault\n00510 Data abort info:\n00510 ISV = 0, ISS = 0x00000045, ISS2 = 0x00000000\n00510 CM = 0, WnR = 1, TnD = 0, TagAccess = 0\n00510 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n00510 user pgtable: 4k pages, 39-bit VAs, pgdp=0000000104175000\n00510 [0000000000000010] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n00510 Internal error: Oops: 0000000096000045 [#1] SMP\n00510 Modules linked in:\n00510 CPU: 10 UID: 0 PID: 7692 Comm: cat Not tainted 6.15.0-rc1-ktest-g189e17946605 #19327 NONE\n00510 Hardware name: linux,dummy-virt (DT)\n00510 pstate: 20001005 (nzCv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--)\n00510 pc : __alloc_tagging_slab_alloc_hook+0xe0/0x190\n00510 lr : __kmalloc_noprof+0x150/0x310\n00510 sp : ffffff80c87df6c0\n00510 x29: ffffff80c87df6c0 x28: 000000000013d1ff x27: 000000000013d200\n00510 x26: ffffff80c87df9e0 x25: 0000000000000000 x24: 0000000000000001\n00510 x23: ffffffc08041953c x22: 000000000000004c x21: ffffff80c0002180\n00510 x20: fffffffec3120840 x19: ffffff80c4821000 x18: 0000000000000000\n00510 x17: fffffffec3d02f00 x16: fffffffec3d02e00 x15: fffffffec3d00700\n00510 x14: fffffffec3d00600 x13: 0000000000000200 x12: 0000000000000006\n00510 x11: ffffffc080bb86c0 x10: 0000000000000000 x9 : ffffffc080201e58\n00510 x8 : ffffff80c4821060 x7 : 0000000000000000 x6 : 0000000055555556\n00510 x5 : 0000000000000001 x4 : 0000000000000010 x3 : 0000000000000060\n00510 x2 : 0000000000000000 x1 : ffffffc080f50cf8 x0 : ffffff80d801d000\n00510 Call trace:\n00510 __alloc_tagging_slab_alloc_hook+0xe0/0x190 (P)\n00510 __kmalloc_noprof+0x150/0x310\n00510 __bch2_folio_create+0x5c/0xf8\n00510 bch2_folio_create+0x2c/0x40\n00510 bch2_readahead+0xc0/0x460\n00510 read_pages+0x7c/0x230\n00510 page_cache_ra_order+0x244/0x3a8\n00510 page_cache_async_ra+0x124/0x170\n00510 filemap_readahead.isra.0+0x58/0xa0\n00510 filemap_get_pages+0x454/0x7b0\n00510 filemap_read+0xdc/0x418\n00510 bch2_read_iter+0x100/0x1b0\n00510 vfs_read+0x214/0x300\n00510 ksys_read+0x6c/0x108\n00510 __arm64_sys_read+0x20/0x30\n00510 invoke_syscall.constprop.0+0x54/0xe8\n00510 do_el0_svc+0x44/0xc8\n00510 el0_svc+0x18/0x58\n00510 el0t_64_sync_handler+0x104/0x130\n00510 el0t_64_sync+0x154/0x158\n00510 Code: d5384100 f9401c01 b9401aa3 b40002e1 (f8227881)\n00510 ---[ end trace 0000000000000000 ]---\n00510 Kernel panic - not syncing: Oops: Fatal exception\n00510 SMP: stopping secondary CPUs\n00510 Kernel Offset: disabled\n00510 CPU features: 0x0000,000000e0,00000410,8240500b\n00510 Memory Limit: none\n\nInvestigation indicates that these bits are already set when we allocate\nslab page and are not zeroed out after allocation. We are not yet sure\nwhy these crashes start happening only recently but regardless of the\nreason, not initializing a field that gets used later is wrong. Fix it\nby initializing slab-\u003eobj_exts during slab page allocation.", "id": "GHSA-g9q4-8883-7234", "modified": "2025-05-01T15:31:44Z", "published": "2025-05-01T15:31:44Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-37774" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/28bef6622a1a874fe63aceeb0c684fab75afb3ae" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/8baa747193591410a853bac9c3710142dfa4937b" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/d2f5819b6ed357c0c350c0616b6b9f38be59adf6" } ], "schema_version": "1.4.0", "severity": [] }
wid-sec-w-2025-0922
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff und nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0922 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0922.json" }, { "category": "self", "summary": "WID-SEC-2025-0922 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0922" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49834", "url": "https://lore.kernel.org/linux-cve-announce/2025050138-CVE-2022-49834-72b3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49837", "url": "https://lore.kernel.org/linux-cve-announce/2025050139-CVE-2022-49837-c13b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49838", "url": "https://lore.kernel.org/linux-cve-announce/2025050139-CVE-2022-49838-0bb8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49839", "url": "https://lore.kernel.org/linux-cve-announce/2025050139-CVE-2022-49839-37b0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49840", "url": "https://lore.kernel.org/linux-cve-announce/2025050140-CVE-2022-49840-5186@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49841", "url": "https://lore.kernel.org/linux-cve-announce/2025050140-CVE-2022-49841-8d40@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49842", "url": "https://lore.kernel.org/linux-cve-announce/2025050140-CVE-2022-49842-54c5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49843", "url": "https://lore.kernel.org/linux-cve-announce/2025050141-CVE-2022-49843-f36d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49857", "url": "https://lore.kernel.org/linux-cve-announce/2025050146-CVE-2022-49857-39d0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49858", "url": "https://lore.kernel.org/linux-cve-announce/2025050146-CVE-2022-49858-a1ee@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49859", "url": "https://lore.kernel.org/linux-cve-announce/2025050146-CVE-2022-49859-4700@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49860", "url": "https://lore.kernel.org/linux-cve-announce/2025050147-CVE-2022-49860-75f4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49861", "url": "https://lore.kernel.org/linux-cve-announce/2025050147-CVE-2022-49861-d502@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49862", "url": "https://lore.kernel.org/linux-cve-announce/2025050147-CVE-2022-49862-04f2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49863", "url": "https://lore.kernel.org/linux-cve-announce/2025050148-CVE-2022-49863-706e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49864", "url": "https://lore.kernel.org/linux-cve-announce/2025050148-CVE-2022-49864-a6b3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49865", "url": "https://lore.kernel.org/linux-cve-announce/2025050149-CVE-2022-49865-cd5b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49867", "url": "https://lore.kernel.org/linux-cve-announce/2025050149-CVE-2022-49867-e420@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49876", "url": "https://lore.kernel.org/linux-cve-announce/2025050152-CVE-2022-49876-498d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49877", "url": "https://lore.kernel.org/linux-cve-announce/2025050153-CVE-2022-49877-1f59@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49878", "url": "https://lore.kernel.org/linux-cve-announce/2025050153-CVE-2022-49878-1e05@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49879", "url": "https://lore.kernel.org/linux-cve-announce/2025050154-CVE-2022-49879-e897@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49880", "url": "https://lore.kernel.org/linux-cve-announce/2025050154-CVE-2022-49880-709b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49881", "url": "https://lore.kernel.org/linux-cve-announce/2025050154-CVE-2022-49881-3caa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49882", "url": "https://lore.kernel.org/linux-cve-announce/2025050155-CVE-2022-49882-6046@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49897", "url": "https://lore.kernel.org/linux-cve-announce/2025050100-CVE-2022-49897-6af8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49900", "url": "https://lore.kernel.org/linux-cve-announce/2025050101-CVE-2022-49900-4af3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49901", "url": "https://lore.kernel.org/linux-cve-announce/2025050101-CVE-2022-49901-1130@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49902", "url": "https://lore.kernel.org/linux-cve-announce/2025050102-CVE-2022-49902-59fe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49903", "url": "https://lore.kernel.org/linux-cve-announce/2025050102-CVE-2022-49903-23a6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49904", "url": "https://lore.kernel.org/linux-cve-announce/2025050102-CVE-2022-49904-5009@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49905", "url": "https://lore.kernel.org/linux-cve-announce/2025050103-CVE-2022-49905-1a97@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49906", "url": "https://lore.kernel.org/linux-cve-announce/2025050103-CVE-2022-49906-4d07@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49917", "url": "https://lore.kernel.org/linux-cve-announce/2025050107-CVE-2022-49917-50af@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49918", "url": "https://lore.kernel.org/linux-cve-announce/2025050107-CVE-2022-49918-8541@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49919", "url": "https://lore.kernel.org/linux-cve-announce/2025050108-CVE-2022-49919-858c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49920", "url": "https://lore.kernel.org/linux-cve-announce/2025050108-CVE-2022-49920-667b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49921", "url": "https://lore.kernel.org/linux-cve-announce/2025050108-CVE-2022-49921-e4fc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49922", "url": "https://lore.kernel.org/linux-cve-announce/2025050109-CVE-2022-49922-93fb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49923", "url": "https://lore.kernel.org/linux-cve-announce/2025050109-CVE-2022-49923-a098@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49924", "url": "https://lore.kernel.org/linux-cve-announce/2025050109-CVE-2022-49924-e8b9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49925", "url": "https://lore.kernel.org/linux-cve-announce/2025050110-CVE-2022-49925-2485@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49926", "url": "https://lore.kernel.org/linux-cve-announce/2025050110-CVE-2022-49926-d9bc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49927", "url": "https://lore.kernel.org/linux-cve-announce/2025050110-CVE-2022-49927-461e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49928", "url": "https://lore.kernel.org/linux-cve-announce/2025050111-CVE-2022-49928-3664@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49929", "url": "https://lore.kernel.org/linux-cve-announce/2025050111-CVE-2022-49929-d572@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49930", "url": "https://lore.kernel.org/linux-cve-announce/2025050112-CVE-2022-49930-91ab@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2022-49931", "url": "https://lore.kernel.org/linux-cve-announce/2025050112-CVE-2022-49931-9e35@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23146", "url": "https://lore.kernel.org/linux-cve-announce/2025050126-CVE-2025-23146-611a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23147", "url": "https://lore.kernel.org/linux-cve-announce/2025050126-CVE-2025-23147-cfd5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-23148", "url": "https://lore.kernel.org/linux-cve-announce/2025050127-CVE-2025-23148-5365@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37738", "url": "https://lore.kernel.org/linux-cve-announce/2025050132-CVE-2025-37738-deb1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37739", "url": "https://lore.kernel.org/linux-cve-announce/2025050133-CVE-2025-37739-06bb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37740", "url": "https://lore.kernel.org/linux-cve-announce/2025050133-CVE-2025-37740-bf8e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37741", "url": "https://lore.kernel.org/linux-cve-announce/2025050133-CVE-2025-37741-3219@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37742", "url": "https://lore.kernel.org/linux-cve-announce/2025050134-CVE-2025-37742-60be@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37743", "url": "https://lore.kernel.org/linux-cve-announce/2025050134-CVE-2025-37743-35a7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37744", "url": "https://lore.kernel.org/linux-cve-announce/2025050134-CVE-2025-37744-e540@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37745", "url": "https://lore.kernel.org/linux-cve-announce/2025050135-CVE-2025-37745-0aaf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37746", "url": "https://lore.kernel.org/linux-cve-announce/2025050135-CVE-2025-37746-2d53@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37747", "url": "https://lore.kernel.org/linux-cve-announce/2025050135-CVE-2025-37747-6e35@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37748", "url": "https://lore.kernel.org/linux-cve-announce/2025050136-CVE-2025-37748-56c8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37749", "url": "https://lore.kernel.org/linux-cve-announce/2025050136-CVE-2025-37749-0f49@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37750", "url": "https://lore.kernel.org/linux-cve-announce/2025050136-CVE-2025-37750-fdd8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37751", "url": "https://lore.kernel.org/linux-cve-announce/2025050137-CVE-2025-37751-8ed2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37752", "url": "https://lore.kernel.org/linux-cve-announce/2025050137-CVE-2025-37752-653f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37753", "url": "https://lore.kernel.org/linux-cve-announce/2025050138-CVE-2025-37753-9fd7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37754", "url": "https://lore.kernel.org/linux-cve-announce/2025050138-CVE-2025-37754-47b2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37755", "url": "https://lore.kernel.org/linux-cve-announce/2025050138-CVE-2025-37755-00b5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37756", "url": "https://lore.kernel.org/linux-cve-announce/2025050139-CVE-2025-37756-a06e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37757", "url": "https://lore.kernel.org/linux-cve-announce/2025050139-CVE-2025-37757-8a5e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37758", "url": "https://lore.kernel.org/linux-cve-announce/2025050139-CVE-2025-37758-32dd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37759", "url": "https://lore.kernel.org/linux-cve-announce/2025050140-CVE-2025-37759-5f57@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37768", "url": "https://lore.kernel.org/linux-cve-announce/2025050112-CVE-2025-37768-b24f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37769", "url": "https://lore.kernel.org/linux-cve-announce/2025050113-CVE-2025-37769-dd42@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37773", "url": "https://lore.kernel.org/linux-cve-announce/2025050114-CVE-2025-37773-4727@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37774", "url": "https://lore.kernel.org/linux-cve-announce/2025050114-CVE-2025-37774-8b9d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37775", "url": "https://lore.kernel.org/linux-cve-announce/2025050115-CVE-2025-37775-296d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37776", "url": "https://lore.kernel.org/linux-cve-announce/2025050115-CVE-2025-37776-9bfb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37777", "url": "https://lore.kernel.org/linux-cve-announce/2025050115-CVE-2025-37777-886d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37778", "url": "https://lore.kernel.org/linux-cve-announce/2025050116-CVE-2025-37778-7202@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37779", "url": "https://lore.kernel.org/linux-cve-announce/2025050116-CVE-2025-37779-6bed@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37780", "url": "https://lore.kernel.org/linux-cve-announce/2025050116-CVE-2025-37780-2b54@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37781", "url": "https://lore.kernel.org/linux-cve-announce/2025050117-CVE-2025-37781-3d19@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37782", "url": "https://lore.kernel.org/linux-cve-announce/2025050117-CVE-2025-37782-7cc2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37783", "url": "https://lore.kernel.org/linux-cve-announce/2025050117-CVE-2025-37783-23bf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37784", "url": "https://lore.kernel.org/linux-cve-announce/2025050118-CVE-2025-37784-159b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37786", "url": "https://lore.kernel.org/linux-cve-announce/2025050118-CVE-2025-37786-cbe7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37787", "url": "https://lore.kernel.org/linux-cve-announce/2025050119-CVE-2025-37787-746d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37788", "url": "https://lore.kernel.org/linux-cve-announce/2025050119-CVE-2025-37788-fd43@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37789", "url": "https://lore.kernel.org/linux-cve-announce/2025050119-CVE-2025-37789-3f0b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37790", "url": "https://lore.kernel.org/linux-cve-announce/2025050120-CVE-2025-37790-3927@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37791", "url": "https://lore.kernel.org/linux-cve-announce/2025050120-CVE-2025-37791-793c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37792", "url": "https://lore.kernel.org/linux-cve-announce/2025050120-CVE-2025-37792-def8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37793", "url": "https://lore.kernel.org/linux-cve-announce/2025050121-CVE-2025-37793-a56f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37794", "url": "https://lore.kernel.org/linux-cve-announce/2025050121-CVE-2025-37794-0a39@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37795", "url": "https://lore.kernel.org/linux-cve-announce/2025050121-CVE-2025-37795-1049@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37796", "url": "https://lore.kernel.org/linux-cve-announce/2025050122-CVE-2025-37796-d6f9@gregkh/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7903 vom 2025-05-19", "url": "https://access.redhat.com/errata/RHSA-2025:7903" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-7903 vom 2025-05-23", "url": "https://linux.oracle.com/errata/ELSA-2025-7903.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8248 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8248" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01918-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9080 vom 2025-06-16", "url": "https://access.redhat.com/errata/RHSA-2025:9080" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9079 vom 2025-06-16", "url": "https://access.redhat.com/errata/RHSA-2025:9079" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01965-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01966-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01982-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021539.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20408-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021550.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-9080 vom 2025-06-18", "url": "http://linux.oracle.com/errata/ELSA-2025-9080.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02000-1 vom 2025-06-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021568.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01995-1 vom 2025-06-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021572.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20419-1 vom 2025-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021591.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9302 vom 2025-06-23", "url": "https://access.redhat.com/errata/RHSA-2025:9302" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9348 vom 2025-06-23", "url": "https://access.redhat.com/errata/RHSA-2025:9348" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9393 vom 2025-06-23", "url": "https://access.redhat.com/errata/RHSA-2025:9393" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-076 vom 2025-06-24", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-076.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-9302 vom 2025-06-24", "url": "https://linux.oracle.com/errata/ELSA-2025-9302.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7594-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7594-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7594-2 vom 2025-06-26", "url": "https://ubuntu.com/security/notices/USN-7594-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02173-1 vom 2025-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021714.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-102 vom 2025-06-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-102.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-9348 vom 2025-07-04", "url": "https://linux.oracle.com/errata/ELSA-2025-9348.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-9079 vom 2025-07-04", "url": "https://linux.oracle.com/errata/ELSA-2025-9079.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02249-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021766.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10675 vom 2025-07-09", "url": "https://access.redhat.com/errata/RHSA-2025:10675" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7594-3 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7594-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10671 vom 2025-07-09", "url": "https://access.redhat.com/errata/RHSA-2025:10671" }, { "category": "external", "summary": "Google Cloud Platform Security Bulletin GCP-2025-038 vom 2025-07-09", "url": "https://cloud.google.com/support/bulletins#gcp-2025-038" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02262-1 vom 2025-07-10", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B53IHD74IRNJDAOHBW4L7JGWNOM26XE7/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-079 vom 2025-07-10", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-079.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10830 vom 2025-07-14", "url": "https://access.redhat.com/errata/RHSA-2025:10830" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10829 vom 2025-07-14", "url": "https://access.redhat.com/errata/RHSA-2025:10829" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02308-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021805.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11298 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11298" }, { "category": "external", "summary": "RedHat Security Advisory", "url": "https://access.redhat.com/errata/RHSA-2025:11299" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02322-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021810.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11245 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11245" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02320-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20471 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20471.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11298 vom 2025-07-17", "url": "https://linux.oracle.com/errata/ELSA-2025-11298.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02335-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021828.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7653-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7653-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7652-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7652-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-1 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7651-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7651-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20483-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021917.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20475-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021919.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-3 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7651-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11571 vom 2025-07-23", "url": "https://access.redhat.com/errata/RHSA-2025:11571" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7651-4" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11572 vom 2025-07-23", "url": "https://access.redhat.com/errata/RHSA-2025:11572" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-5 vom 2025-07-24", "url": "https://ubuntu.com/security/notices/USN-7651-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7651-6 vom 2025-07-24", "url": "https://ubuntu.com/security/notices/USN-7651-6" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20493-1 vom 2025-07-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021967.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20498-1 vom 2025-07-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021965.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02537-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021978.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02538-1 vom 2025-07-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021981.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12238 vom 2025-07-30", "url": "https://access.redhat.com/errata/RHSA-2025:12238" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2944 vom 2025-07-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2944.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02602-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022047.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02607-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOXFW6IMLHSFMN655UONMR2V76DWL7LG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02611-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CAY42JX32A3BASFZGJE6DQP2CXN2LUAW/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02604-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022046.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02606-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022045.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12525 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12525" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02618-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022014.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02601-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022048.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02619-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWVUGRLCXJQB55343B5DGQRVGA6GMIQ6/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12623 vom 2025-08-04", "url": "https://access.redhat.com/errata/RHSA-2025:12623" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02608-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SMY25R62WPNQL2TYEAZTDCWAVFYQUQ2E/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02610-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRIUGMNHYH2DWCCLRZ5NFTLFBXQCRTE6/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12526 vom 2025-08-05", "url": "https://access.redhat.com/errata/RHSA-2025:12526" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02673-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPKQ4BU54XGSANMAROPDJAEFKO2OEKKP/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02626-1 vom 2025-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022055.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02652-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPV72PULRBVAYNVLOGDPAXEYAOLJPHYQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02636-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CZW4BWHO76REHV7LNO6WHLF4JRL7WMEJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02676-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBQGO5F7GAWGWOOC2BA5DLBISXIOXMMS/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02648-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKXBRO2HUJQNRZTJLJHZC32ZUUQLD7RS/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02638-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT3EVLQ3E46O7RVXSFVUBEM6JEJUWQI4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02627-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HNZG2UKJBSDT23RIH4WSPIP5XJJH7AQ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02647-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LHOHSHBEJMHDNQVQMNHA7MC22TR34HJY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02687-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VW2HW4WHUKAUC34CIESGAAISQVOIIZS/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02632-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6QW6TXS545RIQWDHD4QUITTGGA4K6MY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02637-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON23RSVRQYIYWSN7KWZHAT23BQ2YH6EK/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02689-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U2TRD6KWXEAIWY33DHM2QPZCBKLAECTA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02688-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NCR2KWOE2L5E5ZMBPLRQ3ZRAPKHOJX5/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02691-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HQYM2FGJQXM5CJJ3L6LDY723WGAYBFPL/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02693-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q562SYU3GEAQLUF7RIJSZKOPWTHBMXYI/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02697-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4DC3XA5ITEIHVOJ5XXILV3NMSJPM3PS2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13061 vom 2025-08-05", "url": "https://access.redhat.com/errata/RHSA-2025:13061" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02708-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OIV3PQR5UOAFXL7SARDQRG7OSG5GJOE7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02699-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2DQYB5BZLMQ7ED2KC4BHVYYJV5JF3S5/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02704-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PAJM6DY43HWTMYM763Y57Q6KWBGTAHOM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02710-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EF7HBZKJ7TRGPEOKPY66PCZKIYFKRU56/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13099 vom 2025-08-06", "url": "https://access.redhat.com/errata/RHSA-2025:13099" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02698-1 vom 2025-08-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TM2FOPKL26WFLLS5YFPKON7STKP3HL4I/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20520 vom 2025-08-11", "url": "https://linux.oracle.com/errata/ELSA-2025-20520.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13776 vom 2025-08-13", "url": "https://access.redhat.com/errata/RHSA-2025:13776" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13805 vom 2025-08-13", "url": "https://access.redhat.com/errata/RHSA-2025:13805" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02858-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022197.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02873-1 vom 2025-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022209.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02943-1 vom 2025-08-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022246.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02942-1 vom 2025-08-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022247.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7712-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7711-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14748 vom 2025-08-27", "url": "https://access.redhat.com/errata/RHSA-2025:14748" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14746 vom 2025-08-27", "url": "https://access.redhat.com/errata/RHSA-2025:14746" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20573-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022308.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20579-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022302.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20576-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022305.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20572-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022309.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20575-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20578-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022303.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20574-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022307.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20580-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022301.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20581-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022300.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20582-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022299.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20583-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022298.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20584-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022297.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20568-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022313.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20569-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022312.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20570-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022311.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7726-3 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7726-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7726-2 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7726-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7725-1 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7725-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7726-1 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7726-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7725-2 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7725-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-2 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-1 vom 2025-08-29", "url": "https://ubuntu.com/security/notices/USN-7727-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20620-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022352.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20614-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022356.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20615-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022355.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20613-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022357.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20616-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022354.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20625-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022347.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20610-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022360.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20623-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022349.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20624-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022348.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20611-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022359.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20622-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022350.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20621-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022351.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20612-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022358.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7725-3 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7725-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7727-3 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7727-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7712-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7726-4 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7726-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03", "url": "https://ubuntu.com/security/notices/USN-7737-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09", "url": "https://linux.oracle.com/errata/ELSA-2025-20551.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10", "url": "https://linux.oracle.com/errata/ELSA-2025-20553.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-09T22:00:00.000+00:00", "generator": { "date": "2025-09-10T05:06:16.044+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0922", "initial_release_date": "2025-05-01T22:00:00.000+00:00", "revision_history": [ { "date": "2025-05-01T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-22T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE und Debian aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE und Debian aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-06-19T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-22T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat und Amazon aufgenommen" }, { "date": "2025-06-24T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-26T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2025-07-03T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von SUSE, Red Hat und Ubuntu aufgenommen" }, { "date": "2025-07-09T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Google aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2025-07-13T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-22T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2025-07-23T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-24T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-27T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "36", "summary": "Referenz(en) aufgenommen:" }, { "date": "2025-08-03T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von SUSE, Red Hat und Ubuntu aufgenommen" }, { "date": "2025-08-11T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-13T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-18T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-19T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-21T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-27T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-28T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-31T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-03T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-08T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-09-09T22:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "53" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Google Container-Optimized OS", "product": { "name": "Google Container-Optimized OS", "product_id": "1607324", "product_identification_helper": { "cpe": "cpe:/o:google:container-optimized_os:-" } } } ], "category": "vendor", "name": "Google" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c5.10.237", "product": { "name": "Open Source Linux Kernel \u003c5.10.237", "product_id": "T043254" } }, { "category": "product_version", "name": "5.10.237", "product": { "name": "Open Source Linux Kernel 5.10.237", "product_id": "T043254-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.10.237" } } }, { "category": "product_version_range", "name": "\u003c5.15.181", "product": { "name": "Open Source Linux Kernel \u003c5.15.181", "product_id": "T043255" } }, { "category": "product_version", "name": "5.15.181", "product": { "name": "Open Source Linux Kernel 5.15.181", "product_id": "T043255-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.15.181" } } }, { "category": "product_version_range", "name": "\u003c5.4.293", "product": { "name": "Open Source Linux Kernel \u003c5.4.293", "product_id": "T043256" } }, { "category": "product_version", "name": "5.4.293", "product": { "name": "Open Source Linux Kernel 5.4.293", "product_id": "T043256-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.4.293" } } }, { "category": "product_version_range", "name": "\u003c6.1.136", "product": { "name": "Open Source Linux Kernel \u003c6.1.136", "product_id": "T043257" } }, { "category": "product_version", "name": "6.1.136", "product": { "name": "Open Source Linux Kernel 6.1.136", "product_id": "T043257-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.1.136" } } }, { "category": "product_version_range", "name": "\u003c6.12.26", "product": { "name": "Open Source Linux Kernel \u003c6.12.26", "product_id": "T043259" } }, { "category": "product_version", "name": "6.12.26", "product": { "name": "Open Source Linux Kernel 6.12.26", "product_id": "T043259-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.12.26" } } }, { "category": "product_version_range", "name": "\u003c6.14.5", "product": { "name": "Open Source Linux Kernel \u003c6.14.5", "product_id": "T043260" } }, { "category": "product_version", "name": "6.14.5", "product": { "name": "Open Source Linux Kernel 6.14.5", "product_id": "T043260-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.14.5" } } }, { "category": "product_version_range", "name": "\u003c6.15-rc4", "product": { "name": "Open Source Linux Kernel \u003c6.15-rc4", "product_id": "T043261" } }, { "category": "product_version", "name": "6.15-rc4", "product": { "name": "Open Source Linux Kernel 6.15-rc4", "product_id": "T043261-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.15-rc4" } } }, { "category": "product_version_range", "name": "\u003c6.6.89", "product": { "name": "Open Source Linux Kernel \u003c6.6.89", "product_id": "T043262" } }, { "category": "product_version", "name": "6.6.89", "product": { "name": "Open Source Linux Kernel 6.6.89", "product_id": "T043262-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.6.89" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-49834", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49834" }, { "cve": "CVE-2022-49837", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49837" }, { "cve": "CVE-2022-49838", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49838" }, { "cve": "CVE-2022-49839", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49839" }, { "cve": "CVE-2022-49840", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49840" }, { "cve": "CVE-2022-49841", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49841" }, { "cve": "CVE-2022-49842", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49842" }, { "cve": "CVE-2022-49843", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49843" }, { "cve": "CVE-2022-49857", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49857" }, { "cve": "CVE-2022-49858", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49858" }, { "cve": "CVE-2022-49859", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49859" }, { "cve": "CVE-2022-49860", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49860" }, { "cve": "CVE-2022-49861", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49861" }, { "cve": "CVE-2022-49862", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49862" }, { "cve": "CVE-2022-49863", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49863" }, { "cve": "CVE-2022-49864", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49864" }, { "cve": "CVE-2022-49865", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49865" }, { "cve": "CVE-2022-49867", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49867" }, { "cve": "CVE-2022-49876", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49876" }, { "cve": "CVE-2022-49877", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49877" }, { "cve": "CVE-2022-49878", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49878" }, { "cve": "CVE-2022-49879", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49879" }, { "cve": "CVE-2022-49880", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49880" }, { "cve": "CVE-2022-49881", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49881" }, { "cve": "CVE-2022-49882", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49882" }, { "cve": "CVE-2022-49897", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49897" }, { "cve": "CVE-2022-49900", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49900" }, { "cve": "CVE-2022-49901", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49901" }, { "cve": "CVE-2022-49902", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49902" }, { "cve": "CVE-2022-49903", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49903" }, { "cve": "CVE-2022-49904", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49904" }, { "cve": "CVE-2022-49905", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49905" }, { "cve": "CVE-2022-49906", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49906" }, { "cve": "CVE-2022-49917", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49917" }, { "cve": "CVE-2022-49918", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49918" }, { "cve": "CVE-2022-49919", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49919" }, { "cve": "CVE-2022-49920", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49920" }, { "cve": "CVE-2022-49921", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49921" }, { "cve": "CVE-2022-49922", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49922" }, { "cve": "CVE-2022-49923", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49923" }, { "cve": "CVE-2022-49924", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49924" }, { "cve": "CVE-2022-49925", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49925" }, { "cve": "CVE-2022-49926", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49926" }, { "cve": "CVE-2022-49927", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49927" }, { "cve": "CVE-2022-49928", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49928" }, { "cve": "CVE-2022-49929", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49929" }, { "cve": "CVE-2022-49930", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49930" }, { "cve": "CVE-2022-49931", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2022-49931" }, { "cve": "CVE-2025-23139", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23139" }, { "cve": "CVE-2025-23140", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23140" }, { "cve": "CVE-2025-23142", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23142" }, { "cve": "CVE-2025-23144", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23144" }, { "cve": "CVE-2025-23145", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23145" }, { "cve": "CVE-2025-23146", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23146" }, { "cve": "CVE-2025-23147", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23147" }, { "cve": "CVE-2025-23148", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23148" }, { "cve": "CVE-2025-23149", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23149" }, { "cve": "CVE-2025-23150", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23150" }, { "cve": "CVE-2025-23151", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23151" }, { "cve": "CVE-2025-23154", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23154" }, { "cve": "CVE-2025-23155", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23155" }, { "cve": "CVE-2025-23156", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23156" }, { "cve": "CVE-2025-23157", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23157" }, { "cve": "CVE-2025-23158", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23158" }, { "cve": "CVE-2025-23159", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23159" }, { "cve": "CVE-2025-23160", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23160" }, { "cve": "CVE-2025-23161", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-23161" }, { "cve": "CVE-2025-37738", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37738" }, { "cve": "CVE-2025-37739", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37739" }, { "cve": "CVE-2025-37740", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37740" }, { "cve": "CVE-2025-37741", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37741" }, { "cve": "CVE-2025-37742", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37742" }, { "cve": "CVE-2025-37743", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37743" }, { "cve": "CVE-2025-37744", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37744" }, { "cve": "CVE-2025-37745", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37745" }, { "cve": "CVE-2025-37746", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37746" }, { "cve": "CVE-2025-37747", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37747" }, { "cve": "CVE-2025-37748", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37748" }, { "cve": "CVE-2025-37749", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37749" }, { "cve": "CVE-2025-37750", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37750" }, { "cve": "CVE-2025-37751", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37751" }, { "cve": "CVE-2025-37752", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37752" }, { "cve": "CVE-2025-37753", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37753" }, { "cve": "CVE-2025-37754", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37754" }, { "cve": "CVE-2025-37755", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37755" }, { "cve": "CVE-2025-37756", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37756" }, { "cve": "CVE-2025-37757", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37757" }, { "cve": "CVE-2025-37758", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37758" }, { "cve": "CVE-2025-37759", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37759" }, { "cve": "CVE-2025-37760", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37760" }, { "cve": "CVE-2025-37763", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37763" }, { "cve": "CVE-2025-37768", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37768" }, { "cve": "CVE-2025-37769", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37769" }, { "cve": "CVE-2025-37772", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37772" }, { "cve": "CVE-2025-37773", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37773" }, { "cve": "CVE-2025-37774", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37774" }, { "cve": "CVE-2025-37775", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37775" }, { "cve": "CVE-2025-37776", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37776" }, { "cve": "CVE-2025-37777", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37777" }, { "cve": "CVE-2025-37778", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37778" }, { "cve": "CVE-2025-37779", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37779" }, { "cve": "CVE-2025-37780", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37780" }, { "cve": "CVE-2025-37781", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37781" }, { "cve": "CVE-2025-37782", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37782" }, { "cve": "CVE-2025-37783", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37783" }, { "cve": "CVE-2025-37784", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37784" }, { "cve": "CVE-2025-37786", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37786" }, { "cve": "CVE-2025-37787", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37787" }, { "cve": "CVE-2025-37788", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37788" }, { "cve": "CVE-2025-37789", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37789" }, { "cve": "CVE-2025-37790", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37790" }, { "cve": "CVE-2025-37791", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37791" }, { "cve": "CVE-2025-37792", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37792" }, { "cve": "CVE-2025-37793", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37793" }, { "cve": "CVE-2025-37794", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37794" }, { "cve": "CVE-2025-37795", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37795" }, { "cve": "CVE-2025-37796", "product_status": { "known_affected": [ "67646", "T004914", "T043256", "T043257", "T043259", "2951", "T002207", "T000126", "T043260", "398363", "T043261", "T043262", "1607324", "T043254", "T043255" ] }, "release_date": "2025-05-01T22:00:00.000+00:00", "title": "CVE-2025-37796" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.