Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-38394 (GCVE-0-2025-38394)
Vulnerability from cvelistv5
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/hid/hid-appletb-kbd.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "6ad40b07e15c29712d9a4b8096914ccd82e3fc17",
"status": "affected",
"version": "7d62ba8deacf94f546a0b9dd9bc86617343187a3",
"versionType": "git"
},
{
"lessThan": "c80f2b047d5cc42fbd2dff9d1942d4ba7545100f",
"status": "affected",
"version": "7d62ba8deacf94f546a0b9dd9bc86617343187a3",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/hid/hid-appletb-kbd.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.15"
},
{
"lessThan": "6.15",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.15.*",
"status": "unaffected",
"version": "6.15.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.16",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.15.6",
"versionStartIncluding": "6.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.16",
"versionStartIncluding": "6.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: appletb-kbd: fix memory corruption of input_handler_list\n\nIn appletb_kbd_probe an input handler is initialised and then registered\nwith input core through input_register_handler(). When this happens input\ncore will add the input handler (specifically its node) to the global\ninput_handler_list. The input_handler_list is central to the functionality\nof input core and is traversed in various places in input core. An example\nof this is when a new input device is plugged in and gets registered with\ninput core.\n\nThe input_handler in probe is allocated as device managed memory. If a\nprobe failure occurs after input_register_handler() the input_handler\nmemory is freed, yet it will remain in the input_handler_list. This\neffectively means the input_handler_list contains a dangling pointer\nto data belonging to a freed input handler.\n\nThis causes an issue when any other input device is plugged in - in my\ncase I had an old PixArt HP USB optical mouse and I decided to\nplug it in after a failure occurred after input_register_handler().\nThis lead to the registration of this input device via\ninput_register_device which involves traversing over every handler\nin the corrupted input_handler_list and calling input_attach_handler(),\ngiving each handler a chance to bind to newly registered device.\n\nThe core of this bug is a UAF which causes memory corruption of\ninput_handler_list and to fix it we must ensure the input handler is\nunregistered from input core, this is done through\ninput_unregister_handler().\n\n[ 63.191597] ==================================================================\n[ 63.192094] BUG: KASAN: slab-use-after-free in input_attach_handler.isra.0+0x1a9/0x1e0\n[ 63.192094] Read of size 8 at addr ffff888105ea7c80 by task kworker/0:2/54\n[ 63.192094]\n[ 63.192094] CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.16.0-rc2-00321-g2aa6621d\n[ 63.192094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.164\n[ 63.192094] Workqueue: usb_hub_wq hub_event\n[ 63.192094] Call Trace:\n[ 63.192094] \u003cTASK\u003e\n[ 63.192094] dump_stack_lvl+0x53/0x70\n[ 63.192094] print_report+0xce/0x670\n[ 63.192094] kasan_report+0xce/0x100\n[ 63.192094] input_attach_handler.isra.0+0x1a9/0x1e0\n[ 63.192094] input_register_device+0x76c/0xd00\n[ 63.192094] hidinput_connect+0x686d/0xad60\n[ 63.192094] hid_connect+0xf20/0x1b10\n[ 63.192094] hid_hw_start+0x83/0x100\n[ 63.192094] hid_device_probe+0x2d1/0x680\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] hid_add_device+0x30b/0x910\n[ 63.192094] usbhid_probe+0x920/0xe00\n[ 63.192094] usb_probe_interface+0x363/0x9a0\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] usb_set_configuration+0xd14/0x1880\n[ 63.192094] usb_generic_driver_probe+0x78/0xb0\n[ 63.192094] usb_probe_device+0xaa/0x2e0\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] usb_new_device+0x7b4/0x1000\n[ 63.192094] hub_event+0x234d/0x3\n---truncated---"
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T04:20:59.258Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/6ad40b07e15c29712d9a4b8096914ccd82e3fc17"
},
{
"url": "https://git.kernel.org/stable/c/c80f2b047d5cc42fbd2dff9d1942d4ba7545100f"
}
],
"title": "HID: appletb-kbd: fix memory corruption of input_handler_list",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-38394",
"datePublished": "2025-07-25T12:53:39.017Z",
"dateReserved": "2025-04-16T04:51:24.011Z",
"dateUpdated": "2025-07-28T04:20:59.258Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-38394\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-07-25T13:15:28.843\",\"lastModified\":\"2025-11-19T19:12:57.840\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nHID: appletb-kbd: fix memory corruption of input_handler_list\\n\\nIn appletb_kbd_probe an input handler is initialised and then registered\\nwith input core through input_register_handler(). When this happens input\\ncore will add the input handler (specifically its node) to the global\\ninput_handler_list. The input_handler_list is central to the functionality\\nof input core and is traversed in various places in input core. An example\\nof this is when a new input device is plugged in and gets registered with\\ninput core.\\n\\nThe input_handler in probe is allocated as device managed memory. If a\\nprobe failure occurs after input_register_handler() the input_handler\\nmemory is freed, yet it will remain in the input_handler_list. This\\neffectively means the input_handler_list contains a dangling pointer\\nto data belonging to a freed input handler.\\n\\nThis causes an issue when any other input device is plugged in - in my\\ncase I had an old PixArt HP USB optical mouse and I decided to\\nplug it in after a failure occurred after input_register_handler().\\nThis lead to the registration of this input device via\\ninput_register_device which involves traversing over every handler\\nin the corrupted input_handler_list and calling input_attach_handler(),\\ngiving each handler a chance to bind to newly registered device.\\n\\nThe core of this bug is a UAF which causes memory corruption of\\ninput_handler_list and to fix it we must ensure the input handler is\\nunregistered from input core, this is done through\\ninput_unregister_handler().\\n\\n[ 63.191597] ==================================================================\\n[ 63.192094] BUG: KASAN: slab-use-after-free in input_attach_handler.isra.0+0x1a9/0x1e0\\n[ 63.192094] Read of size 8 at addr ffff888105ea7c80 by task kworker/0:2/54\\n[ 63.192094]\\n[ 63.192094] CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.16.0-rc2-00321-g2aa6621d\\n[ 63.192094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.164\\n[ 63.192094] Workqueue: usb_hub_wq hub_event\\n[ 63.192094] Call Trace:\\n[ 63.192094] \u003cTASK\u003e\\n[ 63.192094] dump_stack_lvl+0x53/0x70\\n[ 63.192094] print_report+0xce/0x670\\n[ 63.192094] kasan_report+0xce/0x100\\n[ 63.192094] input_attach_handler.isra.0+0x1a9/0x1e0\\n[ 63.192094] input_register_device+0x76c/0xd00\\n[ 63.192094] hidinput_connect+0x686d/0xad60\\n[ 63.192094] hid_connect+0xf20/0x1b10\\n[ 63.192094] hid_hw_start+0x83/0x100\\n[ 63.192094] hid_device_probe+0x2d1/0x680\\n[ 63.192094] really_probe+0x1c3/0x690\\n[ 63.192094] __driver_probe_device+0x247/0x300\\n[ 63.192094] driver_probe_device+0x49/0x210\\n[ 63.192094] __device_attach_driver+0x160/0x320\\n[ 63.192094] bus_for_each_drv+0x10f/0x190\\n[ 63.192094] __device_attach+0x18e/0x370\\n[ 63.192094] bus_probe_device+0x123/0x170\\n[ 63.192094] device_add+0xd4d/0x1460\\n[ 63.192094] hid_add_device+0x30b/0x910\\n[ 63.192094] usbhid_probe+0x920/0xe00\\n[ 63.192094] usb_probe_interface+0x363/0x9a0\\n[ 63.192094] really_probe+0x1c3/0x690\\n[ 63.192094] __driver_probe_device+0x247/0x300\\n[ 63.192094] driver_probe_device+0x49/0x210\\n[ 63.192094] __device_attach_driver+0x160/0x320\\n[ 63.192094] bus_for_each_drv+0x10f/0x190\\n[ 63.192094] __device_attach+0x18e/0x370\\n[ 63.192094] bus_probe_device+0x123/0x170\\n[ 63.192094] device_add+0xd4d/0x1460\\n[ 63.192094] usb_set_configuration+0xd14/0x1880\\n[ 63.192094] usb_generic_driver_probe+0x78/0xb0\\n[ 63.192094] usb_probe_device+0xaa/0x2e0\\n[ 63.192094] really_probe+0x1c3/0x690\\n[ 63.192094] __driver_probe_device+0x247/0x300\\n[ 63.192094] driver_probe_device+0x49/0x210\\n[ 63.192094] __device_attach_driver+0x160/0x320\\n[ 63.192094] bus_for_each_drv+0x10f/0x190\\n[ 63.192094] __device_attach+0x18e/0x370\\n[ 63.192094] bus_probe_device+0x123/0x170\\n[ 63.192094] device_add+0xd4d/0x1460\\n[ 63.192094] usb_new_device+0x7b4/0x1000\\n[ 63.192094] hub_event+0x234d/0x3\\n---truncated---\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: appletb-kbd: corrige la corrupci\u00f3n de memoria de input_handler_list En appletb_kbd_probe se inicializa un manejador de entrada y luego se registra con el n\u00facleo de entrada a trav\u00e9s de input_register_handler(). Cuando esto sucede, el n\u00facleo de entrada agregar\u00e1 el manejador de entrada (espec\u00edficamente su nodo) a la input_handler_list global. La input_handler_list es central para la funcionalidad del n\u00facleo de entrada y se recorre en varios lugares del n\u00facleo de entrada. Un ejemplo de esto es cuando se conecta un nuevo dispositivo de entrada y se registra con el n\u00facleo de entrada. El input_handler en la sonda se asigna como memoria administrada por el dispositivo. Si ocurre un fallo de la sonda despu\u00e9s de input_register_handler(), la memoria del input_handler se libera, pero permanecer\u00e1 en la input_handler_list. Esto significa efectivamente que la input_handler_list contiene un puntero colgante a los datos que pertenecen a un manejador de entrada liberado. Esto causa un problema al conectar cualquier otro dispositivo de entrada. En mi caso, ten\u00eda un rat\u00f3n \u00f3ptico USB PixArt HP antiguo y decid\u00ed conectarlo tras un fallo despu\u00e9s de la funci\u00f3n input_register_handler(). Esto provoc\u00f3 el registro de este dispositivo de entrada mediante input_register_device, lo que implica recorrer cada controlador de la lista de controladores de entrada corrupta y llamar a input_attach_handler(), lo que permite a cada controlador vincularse al nuevo dispositivo registrado. El problema principal es un UAF que causa corrupci\u00f3n de memoria en la lista de controladores de entrada. Para solucionarlo, debemos asegurarnos de que el controlador de entrada no est\u00e9 registrado en el n\u00facleo de entrada. Esto se realiza mediante input_unregister_handler(). [ 63.191597] ================================================================== [ 63.192094] BUG: KASAN: slab-use-after-free in input_attach_handler.isra.0+0x1a9/0x1e0 [ 63.192094] Read of size 8 at addr ffff888105ea7c80 by task kworker/0:2/54 [ 63.192094] [ 63.192094] CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.16.0-rc2-00321-g2aa6621d [ 63.192094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.164 [ 63.192094] Workqueue: usb_hub_wq hub_event [ 63.192094] Call Trace: [ 63.192094] [ 63.192094] dump_stack_lvl+0x53/0x70 [ 63.192094] print_report+0xce/0x670 [ 63.192094] kasan_report+0xce/0x100 [ 63.192094] input_attach_handler.isra.0+0x1a9/0x1e0 [ 63.192094] input_register_device+0x76c/0xd00 [ 63.192094] hidinput_connect+0x686d/0xad60 [ 63.192094] hid_connect+0xf20/0x1b10 [ 63.192094] hid_hw_start+0x83/0x100 [ 63.192094] hid_device_probe+0x2d1/0x680 [ 63.192094] really_probe+0x1c3/0x690 [ 63.192094] __driver_probe_device+0x247/0x300 [ 63.192094] driver_probe_device+0x49/0x210 [ 63.192094] __device_attach_driver+0x160/0x320 [ 63.192094] bus_for_each_drv+0x10f/0x190 [ 63.192094] __device_attach+0x18e/0x370 [ 63.192094] bus_probe_device+0x123/0x170 [ 63.192094] device_add+0xd4d/0x1460 [ 63.192094] hid_add_device+0x30b/0x910 [ 63.192094] usbhid_probe+0x920/0xe00 [ 63.192094] usb_probe_interface+0x363/0x9a0 [ 63.192094] really_probe+0x1c3/0x690 [ 63.192094] __driver_probe_device+0x247/0x300 [ 63.192094] driver_probe_device+0x49/0x210 [ 63.192094] __device_attach_driver+0x160/0x320 [ 63.192094] bus_for_each_drv+0x10f/0x190 [ 63.192094] __device_attach+0x18e/0x370 [ 63.192094] bus_probe_device+0x123/0x170 [ 63.192094] device_add+0xd4d/0x1460 [ 63.192094] usb_set_configuration+0xd14/0x1880 [ 63.192094] usb_generic_driver_probe+0x78/0xb0 [ 63.192094] usb_probe_device+0xaa/0x2e0 [ 63.192094] really_probe+0x1c3/0x690 [ 63.192094] __driver_probe_device+0x247/0x300 [ 63.192094] driver_probe_device+0x49/0x210 ---truncado---\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.15\",\"versionEndExcluding\":\"6.15.6\",\"matchCriteriaId\":\"575B7891-8019-4D0D-B284-1B8DA410C942\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D4894DB-CCFE-4602-B1BF-3960B2E19A01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"09709862-E348-4378-8632-5A7813EDDC86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"415BF58A-8197-43F5-B3D7-D1D63057A26E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0517869-312D-4429-80C2-561086E1421C\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/6ad40b07e15c29712d9a4b8096914ccd82e3fc17\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c80f2b047d5cc42fbd2dff9d1942d4ba7545100f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
ghsa-6r64-vv6h-j895
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
HID: appletb-kbd: fix memory corruption of input_handler_list
In appletb_kbd_probe an input handler is initialised and then registered with input core through input_register_handler(). When this happens input core will add the input handler (specifically its node) to the global input_handler_list. The input_handler_list is central to the functionality of input core and is traversed in various places in input core. An example of this is when a new input device is plugged in and gets registered with input core.
The input_handler in probe is allocated as device managed memory. If a probe failure occurs after input_register_handler() the input_handler memory is freed, yet it will remain in the input_handler_list. This effectively means the input_handler_list contains a dangling pointer to data belonging to a freed input handler.
This causes an issue when any other input device is plugged in - in my case I had an old PixArt HP USB optical mouse and I decided to plug it in after a failure occurred after input_register_handler(). This lead to the registration of this input device via input_register_device which involves traversing over every handler in the corrupted input_handler_list and calling input_attach_handler(), giving each handler a chance to bind to newly registered device.
The core of this bug is a UAF which causes memory corruption of input_handler_list and to fix it we must ensure the input handler is unregistered from input core, this is done through input_unregister_handler().
[ 63.191597] ================================================================== [ 63.192094] BUG: KASAN: slab-use-after-free in input_attach_handler.isra.0+0x1a9/0x1e0 [ 63.192094] Read of size 8 at addr ffff888105ea7c80 by task kworker/0:2/54 [ 63.192094] [ 63.192094] CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.16.0-rc2-00321-g2aa6621d [ 63.192094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.164 [ 63.192094] Workqueue: usb_hub_wq hub_event [ 63.192094] Call Trace: [ 63.192094] [ 63.192094] dump_stack_lvl+0x53/0x70 [ 63.192094] print_report+0xce/0x670 [ 63.192094] kasan_report+0xce/0x100 [ 63.192094] input_attach_handler.isra.0+0x1a9/0x1e0 [ 63.192094] input_register_device+0x76c/0xd00 [ 63.192094] hidinput_connect+0x686d/0xad60 [ 63.192094] hid_connect+0xf20/0x1b10 [ 63.192094] hid_hw_start+0x83/0x100 [ 63.192094] hid_device_probe+0x2d1/0x680 [ 63.192094] really_probe+0x1c3/0x690 [ 63.192094] __driver_probe_device+0x247/0x300 [ 63.192094] driver_probe_device+0x49/0x210 [ 63.192094] __device_attach_driver+0x160/0x320 [ 63.192094] bus_for_each_drv+0x10f/0x190 [ 63.192094] __device_attach+0x18e/0x370 [ 63.192094] bus_probe_device+0x123/0x170 [ 63.192094] device_add+0xd4d/0x1460 [ 63.192094] hid_add_device+0x30b/0x910 [ 63.192094] usbhid_probe+0x920/0xe00 [ 63.192094] usb_probe_interface+0x363/0x9a0 [ 63.192094] really_probe+0x1c3/0x690 [ 63.192094] __driver_probe_device+0x247/0x300 [ 63.192094] driver_probe_device+0x49/0x210 [ 63.192094] __device_attach_driver+0x160/0x320 [ 63.192094] bus_for_each_drv+0x10f/0x190 [ 63.192094] __device_attach+0x18e/0x370 [ 63.192094] bus_probe_device+0x123/0x170 [ 63.192094] device_add+0xd4d/0x1460 [ 63.192094] usb_set_configuration+0xd14/0x1880 [ 63.192094] usb_generic_driver_probe+0x78/0xb0 [ 63.192094] usb_probe_device+0xaa/0x2e0 [ 63.192094] really_probe+0x1c3/0x690 [ 63.192094] __driver_probe_device+0x247/0x300 [ 63.192094] driver_probe_device+0x49/0x210 [ 63.192094] __device_attach_driver+0x160/0x320 [ 63.192094] bus_for_each_drv+0x10f/0x190 [ 63.192094] __device_attach+0x18e/0x370 [ 63.192094] bus_probe_device+0x123/0x170 [ 63.192094] device_add+0xd4d/0x1460 [ 63.192094] usb_new_device+0x7b4/0x1000 [ 63.192094] hub_event+0x234d/0x3 ---truncated---
{
"affected": [],
"aliases": [
"CVE-2025-38394"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-25T13:15:28Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: appletb-kbd: fix memory corruption of input_handler_list\n\nIn appletb_kbd_probe an input handler is initialised and then registered\nwith input core through input_register_handler(). When this happens input\ncore will add the input handler (specifically its node) to the global\ninput_handler_list. The input_handler_list is central to the functionality\nof input core and is traversed in various places in input core. An example\nof this is when a new input device is plugged in and gets registered with\ninput core.\n\nThe input_handler in probe is allocated as device managed memory. If a\nprobe failure occurs after input_register_handler() the input_handler\nmemory is freed, yet it will remain in the input_handler_list. This\neffectively means the input_handler_list contains a dangling pointer\nto data belonging to a freed input handler.\n\nThis causes an issue when any other input device is plugged in - in my\ncase I had an old PixArt HP USB optical mouse and I decided to\nplug it in after a failure occurred after input_register_handler().\nThis lead to the registration of this input device via\ninput_register_device which involves traversing over every handler\nin the corrupted input_handler_list and calling input_attach_handler(),\ngiving each handler a chance to bind to newly registered device.\n\nThe core of this bug is a UAF which causes memory corruption of\ninput_handler_list and to fix it we must ensure the input handler is\nunregistered from input core, this is done through\ninput_unregister_handler().\n\n[ 63.191597] ==================================================================\n[ 63.192094] BUG: KASAN: slab-use-after-free in input_attach_handler.isra.0+0x1a9/0x1e0\n[ 63.192094] Read of size 8 at addr ffff888105ea7c80 by task kworker/0:2/54\n[ 63.192094]\n[ 63.192094] CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.16.0-rc2-00321-g2aa6621d\n[ 63.192094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.164\n[ 63.192094] Workqueue: usb_hub_wq hub_event\n[ 63.192094] Call Trace:\n[ 63.192094] \u003cTASK\u003e\n[ 63.192094] dump_stack_lvl+0x53/0x70\n[ 63.192094] print_report+0xce/0x670\n[ 63.192094] kasan_report+0xce/0x100\n[ 63.192094] input_attach_handler.isra.0+0x1a9/0x1e0\n[ 63.192094] input_register_device+0x76c/0xd00\n[ 63.192094] hidinput_connect+0x686d/0xad60\n[ 63.192094] hid_connect+0xf20/0x1b10\n[ 63.192094] hid_hw_start+0x83/0x100\n[ 63.192094] hid_device_probe+0x2d1/0x680\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] hid_add_device+0x30b/0x910\n[ 63.192094] usbhid_probe+0x920/0xe00\n[ 63.192094] usb_probe_interface+0x363/0x9a0\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] usb_set_configuration+0xd14/0x1880\n[ 63.192094] usb_generic_driver_probe+0x78/0xb0\n[ 63.192094] usb_probe_device+0xaa/0x2e0\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] usb_new_device+0x7b4/0x1000\n[ 63.192094] hub_event+0x234d/0x3\n---truncated---",
"id": "GHSA-6r64-vv6h-j895",
"modified": "2025-11-19T21:31:16Z",
"published": "2025-07-25T15:30:52Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38394"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/6ad40b07e15c29712d9a4b8096914ccd82e3fc17"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/c80f2b047d5cc42fbd2dff9d1942d4ba7545100f"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
fkie_cve-2025-38394
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.16 | |
| linux | linux_kernel | 6.16 | |
| linux | linux_kernel | 6.16 | |
| linux | linux_kernel | 6.16 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "575B7891-8019-4D0D-B284-1B8DA410C942",
"versionEndExcluding": "6.15.6",
"versionStartIncluding": "6.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6D4894DB-CCFE-4602-B1BF-3960B2E19A01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "09709862-E348-4378-8632-5A7813EDDC86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*",
"matchCriteriaId": "415BF58A-8197-43F5-B3D7-D1D63057A26E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A0517869-312D-4429-80C2-561086E1421C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: appletb-kbd: fix memory corruption of input_handler_list\n\nIn appletb_kbd_probe an input handler is initialised and then registered\nwith input core through input_register_handler(). When this happens input\ncore will add the input handler (specifically its node) to the global\ninput_handler_list. The input_handler_list is central to the functionality\nof input core and is traversed in various places in input core. An example\nof this is when a new input device is plugged in and gets registered with\ninput core.\n\nThe input_handler in probe is allocated as device managed memory. If a\nprobe failure occurs after input_register_handler() the input_handler\nmemory is freed, yet it will remain in the input_handler_list. This\neffectively means the input_handler_list contains a dangling pointer\nto data belonging to a freed input handler.\n\nThis causes an issue when any other input device is plugged in - in my\ncase I had an old PixArt HP USB optical mouse and I decided to\nplug it in after a failure occurred after input_register_handler().\nThis lead to the registration of this input device via\ninput_register_device which involves traversing over every handler\nin the corrupted input_handler_list and calling input_attach_handler(),\ngiving each handler a chance to bind to newly registered device.\n\nThe core of this bug is a UAF which causes memory corruption of\ninput_handler_list and to fix it we must ensure the input handler is\nunregistered from input core, this is done through\ninput_unregister_handler().\n\n[ 63.191597] ==================================================================\n[ 63.192094] BUG: KASAN: slab-use-after-free in input_attach_handler.isra.0+0x1a9/0x1e0\n[ 63.192094] Read of size 8 at addr ffff888105ea7c80 by task kworker/0:2/54\n[ 63.192094]\n[ 63.192094] CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.16.0-rc2-00321-g2aa6621d\n[ 63.192094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.164\n[ 63.192094] Workqueue: usb_hub_wq hub_event\n[ 63.192094] Call Trace:\n[ 63.192094] \u003cTASK\u003e\n[ 63.192094] dump_stack_lvl+0x53/0x70\n[ 63.192094] print_report+0xce/0x670\n[ 63.192094] kasan_report+0xce/0x100\n[ 63.192094] input_attach_handler.isra.0+0x1a9/0x1e0\n[ 63.192094] input_register_device+0x76c/0xd00\n[ 63.192094] hidinput_connect+0x686d/0xad60\n[ 63.192094] hid_connect+0xf20/0x1b10\n[ 63.192094] hid_hw_start+0x83/0x100\n[ 63.192094] hid_device_probe+0x2d1/0x680\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] hid_add_device+0x30b/0x910\n[ 63.192094] usbhid_probe+0x920/0xe00\n[ 63.192094] usb_probe_interface+0x363/0x9a0\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] usb_set_configuration+0xd14/0x1880\n[ 63.192094] usb_generic_driver_probe+0x78/0xb0\n[ 63.192094] usb_probe_device+0xaa/0x2e0\n[ 63.192094] really_probe+0x1c3/0x690\n[ 63.192094] __driver_probe_device+0x247/0x300\n[ 63.192094] driver_probe_device+0x49/0x210\n[ 63.192094] __device_attach_driver+0x160/0x320\n[ 63.192094] bus_for_each_drv+0x10f/0x190\n[ 63.192094] __device_attach+0x18e/0x370\n[ 63.192094] bus_probe_device+0x123/0x170\n[ 63.192094] device_add+0xd4d/0x1460\n[ 63.192094] usb_new_device+0x7b4/0x1000\n[ 63.192094] hub_event+0x234d/0x3\n---truncated---"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: appletb-kbd: corrige la corrupci\u00f3n de memoria de input_handler_list En appletb_kbd_probe se inicializa un manejador de entrada y luego se registra con el n\u00facleo de entrada a trav\u00e9s de input_register_handler(). Cuando esto sucede, el n\u00facleo de entrada agregar\u00e1 el manejador de entrada (espec\u00edficamente su nodo) a la input_handler_list global. La input_handler_list es central para la funcionalidad del n\u00facleo de entrada y se recorre en varios lugares del n\u00facleo de entrada. Un ejemplo de esto es cuando se conecta un nuevo dispositivo de entrada y se registra con el n\u00facleo de entrada. El input_handler en la sonda se asigna como memoria administrada por el dispositivo. Si ocurre un fallo de la sonda despu\u00e9s de input_register_handler(), la memoria del input_handler se libera, pero permanecer\u00e1 en la input_handler_list. Esto significa efectivamente que la input_handler_list contiene un puntero colgante a los datos que pertenecen a un manejador de entrada liberado. Esto causa un problema al conectar cualquier otro dispositivo de entrada. En mi caso, ten\u00eda un rat\u00f3n \u00f3ptico USB PixArt HP antiguo y decid\u00ed conectarlo tras un fallo despu\u00e9s de la funci\u00f3n input_register_handler(). Esto provoc\u00f3 el registro de este dispositivo de entrada mediante input_register_device, lo que implica recorrer cada controlador de la lista de controladores de entrada corrupta y llamar a input_attach_handler(), lo que permite a cada controlador vincularse al nuevo dispositivo registrado. El problema principal es un UAF que causa corrupci\u00f3n de memoria en la lista de controladores de entrada. Para solucionarlo, debemos asegurarnos de que el controlador de entrada no est\u00e9 registrado en el n\u00facleo de entrada. Esto se realiza mediante input_unregister_handler(). [ 63.191597] ================================================================== [ 63.192094] BUG: KASAN: slab-use-after-free in input_attach_handler.isra.0+0x1a9/0x1e0 [ 63.192094] Read of size 8 at addr ffff888105ea7c80 by task kworker/0:2/54 [ 63.192094] [ 63.192094] CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.16.0-rc2-00321-g2aa6621d [ 63.192094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.164 [ 63.192094] Workqueue: usb_hub_wq hub_event [ 63.192094] Call Trace: [ 63.192094] [ 63.192094] dump_stack_lvl+0x53/0x70 [ 63.192094] print_report+0xce/0x670 [ 63.192094] kasan_report+0xce/0x100 [ 63.192094] input_attach_handler.isra.0+0x1a9/0x1e0 [ 63.192094] input_register_device+0x76c/0xd00 [ 63.192094] hidinput_connect+0x686d/0xad60 [ 63.192094] hid_connect+0xf20/0x1b10 [ 63.192094] hid_hw_start+0x83/0x100 [ 63.192094] hid_device_probe+0x2d1/0x680 [ 63.192094] really_probe+0x1c3/0x690 [ 63.192094] __driver_probe_device+0x247/0x300 [ 63.192094] driver_probe_device+0x49/0x210 [ 63.192094] __device_attach_driver+0x160/0x320 [ 63.192094] bus_for_each_drv+0x10f/0x190 [ 63.192094] __device_attach+0x18e/0x370 [ 63.192094] bus_probe_device+0x123/0x170 [ 63.192094] device_add+0xd4d/0x1460 [ 63.192094] hid_add_device+0x30b/0x910 [ 63.192094] usbhid_probe+0x920/0xe00 [ 63.192094] usb_probe_interface+0x363/0x9a0 [ 63.192094] really_probe+0x1c3/0x690 [ 63.192094] __driver_probe_device+0x247/0x300 [ 63.192094] driver_probe_device+0x49/0x210 [ 63.192094] __device_attach_driver+0x160/0x320 [ 63.192094] bus_for_each_drv+0x10f/0x190 [ 63.192094] __device_attach+0x18e/0x370 [ 63.192094] bus_probe_device+0x123/0x170 [ 63.192094] device_add+0xd4d/0x1460 [ 63.192094] usb_set_configuration+0xd14/0x1880 [ 63.192094] usb_generic_driver_probe+0x78/0xb0 [ 63.192094] usb_probe_device+0xaa/0x2e0 [ 63.192094] really_probe+0x1c3/0x690 [ 63.192094] __driver_probe_device+0x247/0x300 [ 63.192094] driver_probe_device+0x49/0x210 ---truncado---"
}
],
"id": "CVE-2025-38394",
"lastModified": "2025-11-19T19:12:57.840",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-07-25T13:15:28.843",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/6ad40b07e15c29712d9a4b8096914ccd82e3fc17"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/c80f2b047d5cc42fbd2dff9d1942d4ba7545100f"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
wid-sec-w-2025-1653
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder andere nicht spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1653 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1653.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1653 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1653"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38353",
"url": "https://lore.kernel.org/linux-cve-announce/2025072553-CVE-2025-38353-a9eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38354",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38354-bdcd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38355",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38355-2855@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38356",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38356-286a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38357",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38357-8b0a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38358",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38358-8d7f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38359",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38359-8cda@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38360",
"url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38360-1f17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38361",
"url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38361-3f11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38362",
"url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38362-8922@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38363",
"url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38363-122c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38364",
"url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38364-74db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38365",
"url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38365-0519@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38366",
"url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38366-26b8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38367",
"url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38367-df91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38368",
"url": "https://lore.kernel.org/linux-cve-announce/2025072559-CVE-2025-38368-e561@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38369",
"url": "https://lore.kernel.org/linux-cve-announce/2025072559-CVE-2025-38369-6ddf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38370",
"url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38370-857d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38371",
"url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38371-ff41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38372",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38372-6659@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38373",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38373-b6fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38374",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38374-52a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38375",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38375-3faa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38376",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38376-e290@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38377",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38377-a0c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38378",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38378-4e10@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38379",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38379-97db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38380",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38380-d1a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38381",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38381-b27a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38382",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38382-c4f2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38383",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38383-c967@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38384",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38384-391e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38385",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38385-936c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38386",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38386-0a8a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38387",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38387-f9d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38388",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38388-402a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38389",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38389-b1f4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38390",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38390-7d67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38391",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38391-0064@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38392",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38392-17a6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38393",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38393-f2e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38394",
"url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38394-f005@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38395",
"url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38395-3a19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38396",
"url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38396-92a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38397",
"url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38397-d375@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38398",
"url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38398-1271@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38399",
"url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38399-00ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38400",
"url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38400-a0d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38401",
"url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38401-789b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38402",
"url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38402-e08c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38403",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38403-0da0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38404",
"url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38404-f719@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38405",
"url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38405-014e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38406",
"url": "https://lore.kernel.org/linux-cve-announce/2025072533-CVE-2025-38406-5f5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38407",
"url": "https://lore.kernel.org/linux-cve-announce/2025072520-CVE-2025-38407-98b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38408",
"url": "https://lore.kernel.org/linux-cve-announce/2025072520-CVE-2025-38408-29e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38409",
"url": "https://lore.kernel.org/linux-cve-announce/2025072520-CVE-2025-38409-cee4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38410",
"url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38410-e0e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38411",
"url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38411-0ca7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38412",
"url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38412-2ccc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38413",
"url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38413-d64f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38414",
"url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38414-8302@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38415",
"url": "https://lore.kernel.org/linux-cve-announce/2025072513-CVE-2025-38415-c634@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38416",
"url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38416-e4bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38417",
"url": "https://lore.kernel.org/linux-cve-announce/2025072546-CVE-2025-38417-12d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38418",
"url": "https://lore.kernel.org/linux-cve-announce/2025072546-CVE-2025-38418-7af0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38419",
"url": "https://lore.kernel.org/linux-cve-announce/2025072546-CVE-2025-38419-c07e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38420",
"url": "https://lore.kernel.org/linux-cve-announce/2025072552-CVE-2025-38420-13a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38421",
"url": "https://lore.kernel.org/linux-cve-announce/2025072554-CVE-2025-38421-8601@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38422",
"url": "https://lore.kernel.org/linux-cve-announce/2025072554-CVE-2025-38422-5d9b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38423",
"url": "https://lore.kernel.org/linux-cve-announce/2025072554-CVE-2025-38423-171a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38424",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38424-500e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38425",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38425-d34f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38426",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38426-718c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38427",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38427-6e37@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38428",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38428-8b33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38429",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38429-f662@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38430",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38430-dafd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38431",
"url": "https://lore.kernel.org/linux-cve-announce/2025072537-CVE-2025-38431-9bb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38432",
"url": "https://lore.kernel.org/linux-cve-announce/2025072516-CVE-2025-38432-ce36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38433",
"url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38433-6d14@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38434",
"url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38434-ecdf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38435",
"url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38435-ffc0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38436",
"url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38436-8cb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38437",
"url": "https://lore.kernel.org/linux-cve-announce/2025072559-CVE-2025-38437-9752@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38438",
"url": "https://lore.kernel.org/linux-cve-announce/2025072501-CVE-2025-38438-f653@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38439",
"url": "https://lore.kernel.org/linux-cve-announce/2025072501-CVE-2025-38439-3f3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38440",
"url": "https://lore.kernel.org/linux-cve-announce/2025072501-CVE-2025-38440-cb71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38441",
"url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38441-bb71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38442",
"url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38442-2844@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38443",
"url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38443-419c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38444",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38444-4b60@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38445",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38445-7295@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38446",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38446-492b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38447",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38447-5233@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38448",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38448-f242@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38449",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38449-cbf0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38450",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38450-a59f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38451",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38451-ee66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38452",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38452-d9d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38453",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38453-69b1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38454",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38454-8908@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38455",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38455-9331@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38456",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38456-3c0a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38457",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38457-d302@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38458",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38458-d999@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38459",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38459-e941@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38460",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38460-40fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38461",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38461-33b1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38462",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38462-3e15@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38463",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38463-f4a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38464",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38464-44a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38465",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38465-28ad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38466",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38466-11e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38467",
"url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38467-eb0c@gregkh/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13776 vom 2025-08-13",
"url": "https://access.redhat.com/errata/RHSA-2025:13776"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5973 vom 2025-08-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00137.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5975 vom 2025-08-13",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00139.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13960 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:13960"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13962 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:13962"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13960 vom 2025-08-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-13960.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14054 vom 2025-08-19",
"url": "https://access.redhat.com/errata/RHSA-2025:14054"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14005 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:14005"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14009 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:14009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14003 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:14003"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14082 vom 2025-08-19",
"url": "https://access.redhat.com/errata/RHSA-2025:14082"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13962 vom 2025-08-20",
"url": "https://linux.oracle.com/errata/ELSA-2025-13962.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14009 vom 2025-08-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-14009.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14420 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14420"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14418 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14418"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14510 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14510"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14420 vom 2025-08-26",
"url": "https://linux.oracle.com/errata/ELSA-2025-14420.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14510 vom 2025-08-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-14510.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2025:15009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14985 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:14985"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15011 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:15011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15008 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:15008"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15005 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:15005"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15227 vom 2025-09-04",
"url": "https://access.redhat.com/errata/RHSA-2025:15227"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15008 vom 2025-09-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-15008.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15224 vom 2025-09-04",
"url": "https://access.redhat.com/errata/RHSA-2025:15224"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15011 vom 2025-09-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-15011.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15005 vom 2025-09-05",
"url": "http://linux.oracle.com/errata/ELSA-2025-15005.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15429 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15429"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15447 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15447"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20552 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20552.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:15009 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:15009"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15429 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-15429.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15668 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15668"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15661 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15661"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15660 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15660"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15658 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15658"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15656 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15656"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20653-1 vom 2025-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022432.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15647 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15647"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20669-1 vom 2025-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15670 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15670"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15447 vom 2025-09-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-15447.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15661 vom 2025-09-13",
"url": "http://linux.oracle.com/errata/ELSA-2025-15661.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03204-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022522.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15782 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15782"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15786 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15786"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15785 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15785"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15785 vom 2025-09-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-15785.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-260 vom 2025-09-17",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-260.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-104 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-104.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-109 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-109.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-261 vom 2025-09-17",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-261.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-262 vom 2025-09-17",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-262.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-263 vom 2025-09-17",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-263.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15782 vom 2025-09-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-15782.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03272-1 vom 2025-09-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022589.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03283-1 vom 2025-09-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022596.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6008 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03290-1 vom 2025-09-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022602.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16373 vom 2025-09-22",
"url": "https://access.redhat.com/errata/RHSA-2025:16373"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16372 vom 2025-09-22",
"url": "https://access.redhat.com/errata/RHSA-2025:16372"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03314-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022615.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03310-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022610.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16372 vom 2025-09-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-16372.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16541 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16541"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03301-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022605.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16540 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16540"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16538 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16538"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16539 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16539"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16580 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16580"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16583 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16583"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7770-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7770-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7769-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7769-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16582 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16582"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7769-2 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7769-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7771-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7771-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16669 vom 2025-09-25",
"url": "https://access.redhat.com/errata/RHSA-2025:16669"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-2 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-3 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7776-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7776-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7775-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-2 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7775-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7769-3 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7769-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20756-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022703.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03383-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03382-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022721.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03384-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022723.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20739-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022711.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3013 vom 2025-09-29",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3013.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17122 vom 2025-10-01",
"url": "https://access.redhat.com/errata/RHSA-2025:17122"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17123 vom 2025-10-01",
"url": "https://access.redhat.com/errata/RHSA-2025:17123"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-3 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7775-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7789-1 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7789-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17159 vom 2025-10-01",
"url": "https://access.redhat.com/errata/RHSA-2025:17159"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16904 vom 2025-10-02",
"url": "https://linux.oracle.com/errata/ELSA-2025-16904.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17192 vom 2025-10-01",
"url": "https://access.redhat.com/errata/RHSA-2025:17192"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-4 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7774-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17241 vom 2025-10-02",
"url": "https://access.redhat.com/errata/RHSA-2025:17241"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-5 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7774-5"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16904 vom 2025-10-07",
"url": "https://errata.build.resf.org/RLSA-2025:16904"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7789-2 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7789-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17570 vom 2025-10-08",
"url": "https://access.redhat.com/errata/RHSA-2025:17570"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:15011 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:15011"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:15661 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:15661"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4328 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20663.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17958 vom 2025-10-14",
"url": "https://access.redhat.com/errata/RHSA-2025:17958"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18043 vom 2025-10-15",
"url": "https://access.redhat.com/errata/RHSA-2025:18043"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20716 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20716.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03602-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022908.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03646-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022939.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03650-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022941.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03638-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03636-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7834-1 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7834-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18932 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18932"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7833-1 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7833-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7WMM33D7UTTQM25T2XCVZHFJKIMM3TO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022975.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3762-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5PU3QBFUI54V4YM7FX4AIWKDVDLIFMV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3748-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYXC2NBEEGHSFXWCA3DVT5LVZMZ5RRNP/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3755-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFR7CE7W5U4CT7EDERPCHLWSGEIHWJLA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3764-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SP6KY7ONJTFGDWCHVV7CO7D4KUEJ27DA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3765-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022991.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3772-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022994.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3771-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022995.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3768-1 vom 2025-10-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JX5Y5NWCULMT7SH5C6ZUDMMTVZPLLOJC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7833-3 vom 2025-10-24",
"url": "https://ubuntu.com/security/notices/USN-7833-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20891-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20878-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20883-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20874-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20886-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20873-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20877-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20881-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20876-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20882-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20875-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20887-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20885-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20879-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20884-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20888-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7249276 vom 2025-10-27",
"url": "https://www.ibm.com/support/pages/node/7249276"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20890-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20907-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20902-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20905-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20903-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20918-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20904-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3886-1 vom 2025-10-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20909-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20917-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20916-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20913-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20915-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20914-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20906-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20912-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20920-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-404 vom 2025-10-31",
"url": "https://www.dell.com/support/kbdoc/000385435"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7833-4 vom 2025-10-31",
"url": "https://ubuntu.com/security/notices/USN-7833-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7856-1 vom 2025-11-04",
"url": "https://ubuntu.com/security/notices/USN-7856-1"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7864-1 vom 2025-11-07",
"url": "https://ubuntu.com/security/notices/USN-7864-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3995-1 vom 2025-11-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4056-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20095 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20095"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20518 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20518"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-25757.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7250971 vom 2025-11-12",
"url": "https://www.ibm.com/support/pages/node/7250971"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21667 vom 2025-11-18",
"url": "https://access.redhat.com/errata/RHSA-2025:21667"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-1 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:20518 vom 2025-11-21",
"url": "https://errata.build.resf.org/RLSA-2025:20518"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20518 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-20518-0.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-24T23:00:00.000+00:00",
"generator": {
"date": "2025-11-25T09:14:31.147+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1653",
"initial_release_date": "2025-07-27T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat und Debian aufgenommen"
},
{
"date": "2025-08-13T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux, SUSE und Red Hat aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-21T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-25T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-01T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-09-04T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-10T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-09-11T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux und Amazon aufgenommen"
},
{
"date": "2025-09-18T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-09-21T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Debian, SUSE und Red Hat aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE, Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-09-24T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-09-25T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-08T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-14T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von SUSE und IBM aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von SUSE und Dell aufgenommen"
},
{
"date": "2025-11-02T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Ubuntu und Dell aufgenommen"
},
{
"date": "2025-11-06T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-09T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE und IBM aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "60"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Virtual Edition",
"product": {
"name": "Dell NetWorker Virtual Edition",
"product_id": "T048226",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual_edition"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF01",
"product_id": "T048556"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF01",
"product_id": "T048556-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T046484",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "T044137",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-38353",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38353"
},
{
"cve": "CVE-2025-38354",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38354"
},
{
"cve": "CVE-2025-38355",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38355"
},
{
"cve": "CVE-2025-38356",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38356"
},
{
"cve": "CVE-2025-38357",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38357"
},
{
"cve": "CVE-2025-38358",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38358"
},
{
"cve": "CVE-2025-38359",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38360",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38360"
},
{
"cve": "CVE-2025-38361",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-38362",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38362"
},
{
"cve": "CVE-2025-38363",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38363"
},
{
"cve": "CVE-2025-38364",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38364"
},
{
"cve": "CVE-2025-38365",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38365"
},
{
"cve": "CVE-2025-38366",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38366"
},
{
"cve": "CVE-2025-38367",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38367"
},
{
"cve": "CVE-2025-38368",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38368"
},
{
"cve": "CVE-2025-38369",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38369"
},
{
"cve": "CVE-2025-38370",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38370"
},
{
"cve": "CVE-2025-38371",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38371"
},
{
"cve": "CVE-2025-38372",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38372"
},
{
"cve": "CVE-2025-38373",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38373"
},
{
"cve": "CVE-2025-38374",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38374"
},
{
"cve": "CVE-2025-38375",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38375"
},
{
"cve": "CVE-2025-38376",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38376"
},
{
"cve": "CVE-2025-38377",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38377"
},
{
"cve": "CVE-2025-38378",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38378"
},
{
"cve": "CVE-2025-38379",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38379"
},
{
"cve": "CVE-2025-38380",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38380"
},
{
"cve": "CVE-2025-38381",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38381"
},
{
"cve": "CVE-2025-38382",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38382"
},
{
"cve": "CVE-2025-38383",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38383"
},
{
"cve": "CVE-2025-38384",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38384"
},
{
"cve": "CVE-2025-38385",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38385"
},
{
"cve": "CVE-2025-38386",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38386"
},
{
"cve": "CVE-2025-38387",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38387"
},
{
"cve": "CVE-2025-38388",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38388"
},
{
"cve": "CVE-2025-38389",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38389"
},
{
"cve": "CVE-2025-38390",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38390"
},
{
"cve": "CVE-2025-38391",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38391"
},
{
"cve": "CVE-2025-38392",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38392"
},
{
"cve": "CVE-2025-38393",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38393"
},
{
"cve": "CVE-2025-38394",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38394"
},
{
"cve": "CVE-2025-38395",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38395"
},
{
"cve": "CVE-2025-38396",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38396"
},
{
"cve": "CVE-2025-38397",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38397"
},
{
"cve": "CVE-2025-38398",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38398"
},
{
"cve": "CVE-2025-38399",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38399"
},
{
"cve": "CVE-2025-38400",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38400"
},
{
"cve": "CVE-2025-38401",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38401"
},
{
"cve": "CVE-2025-38402",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38402"
},
{
"cve": "CVE-2025-38403",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38403"
},
{
"cve": "CVE-2025-38404",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38404"
},
{
"cve": "CVE-2025-38405",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38405"
},
{
"cve": "CVE-2025-38406",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38406"
},
{
"cve": "CVE-2025-38407",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38407"
},
{
"cve": "CVE-2025-38408",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38408"
},
{
"cve": "CVE-2025-38409",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38409"
},
{
"cve": "CVE-2025-38410",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38410"
},
{
"cve": "CVE-2025-38411",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38411"
},
{
"cve": "CVE-2025-38412",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38412"
},
{
"cve": "CVE-2025-38413",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38413"
},
{
"cve": "CVE-2025-38414",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38414"
},
{
"cve": "CVE-2025-38415",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38415"
},
{
"cve": "CVE-2025-38416",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38416"
},
{
"cve": "CVE-2025-38417",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38417"
},
{
"cve": "CVE-2025-38418",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38418"
},
{
"cve": "CVE-2025-38419",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38419"
},
{
"cve": "CVE-2025-38420",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38420"
},
{
"cve": "CVE-2025-38421",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38421"
},
{
"cve": "CVE-2025-38422",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38422"
},
{
"cve": "CVE-2025-38423",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38423"
},
{
"cve": "CVE-2025-38424",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38424"
},
{
"cve": "CVE-2025-38425",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38425"
},
{
"cve": "CVE-2025-38426",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38426"
},
{
"cve": "CVE-2025-38427",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38427"
},
{
"cve": "CVE-2025-38428",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38428"
},
{
"cve": "CVE-2025-38429",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38429"
},
{
"cve": "CVE-2025-38430",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38430"
},
{
"cve": "CVE-2025-38431",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38431"
},
{
"cve": "CVE-2025-38432",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38432"
},
{
"cve": "CVE-2025-38433",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38433"
},
{
"cve": "CVE-2025-38434",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38434"
},
{
"cve": "CVE-2025-38435",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38435"
},
{
"cve": "CVE-2025-38436",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38436"
},
{
"cve": "CVE-2025-38437",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38437"
},
{
"cve": "CVE-2025-38438",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38438"
},
{
"cve": "CVE-2025-38439",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38439"
},
{
"cve": "CVE-2025-38440",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38440"
},
{
"cve": "CVE-2025-38441",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38441"
},
{
"cve": "CVE-2025-38442",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38442"
},
{
"cve": "CVE-2025-38443",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38443"
},
{
"cve": "CVE-2025-38444",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38444"
},
{
"cve": "CVE-2025-38445",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38445"
},
{
"cve": "CVE-2025-38446",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38446"
},
{
"cve": "CVE-2025-38447",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38447"
},
{
"cve": "CVE-2025-38448",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38448"
},
{
"cve": "CVE-2025-38449",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38449"
},
{
"cve": "CVE-2025-38450",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38450"
},
{
"cve": "CVE-2025-38451",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38451"
},
{
"cve": "CVE-2025-38452",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38452"
},
{
"cve": "CVE-2025-38453",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38453"
},
{
"cve": "CVE-2025-38454",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38454"
},
{
"cve": "CVE-2025-38455",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38455"
},
{
"cve": "CVE-2025-38456",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38456"
},
{
"cve": "CVE-2025-38457",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38457"
},
{
"cve": "CVE-2025-38458",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38458"
},
{
"cve": "CVE-2025-38459",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38459"
},
{
"cve": "CVE-2025-38460",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38460"
},
{
"cve": "CVE-2025-38461",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38461"
},
{
"cve": "CVE-2025-38462",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38462"
},
{
"cve": "CVE-2025-38463",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38463"
},
{
"cve": "CVE-2025-38464",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38464"
},
{
"cve": "CVE-2025-38465",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38465"
},
{
"cve": "CVE-2025-38466",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38466"
},
{
"cve": "CVE-2025-38467",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38467"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.