Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-38398 (GCVE-0-2025-38398)
Vulnerability from cvelistv5
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/spi/spi-qpic-snand.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "86fb36de1132b560f9305f0c78fa69f459fa0980", "status": "affected", "version": "7304d1909080ef0c9da703500a97f46c98393fcd", "versionType": "git" }, { "lessThan": "d85d0380292a7e618915069c3579ae23c7c80339", "status": "affected", "version": "7304d1909080ef0c9da703500a97f46c98393fcd", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/spi/spi-qpic-snand.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.15" }, { "lessThan": "6.15", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.15.*", "status": "unaffected", "version": "6.15.6", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.16", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.15.6", "versionStartIncluding": "6.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.16", "versionStartIncluding": "6.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-qpic-snand: reallocate BAM transactions\n\nUsing the mtd_nandbiterrs module for testing the driver occasionally\nresults in weird things like below.\n\n1. swiotlb mapping fails with the following message:\n\n [ 85.926216] qcom_snand 79b0000.spi: swiotlb buffer is full (sz: 4294967294 bytes), total 512 (slots), used 0 (slots)\n [ 85.932937] qcom_snand 79b0000.spi: failure in mapping desc\n [ 87.999314] qcom_snand 79b0000.spi: failure to write raw page\n [ 87.999352] mtd_nandbiterrs: error: write_oob failed (-110)\n\n Rebooting the board after this causes a panic due to a NULL pointer\n dereference.\n\n2. If the swiotlb mapping does not fail, rebooting the board may result\n in a different panic due to a bad spinlock magic:\n\n [ 256.104459] BUG: spinlock bad magic on CPU#3, procd/2241\n [ 256.104488] Unable to handle kernel paging request at virtual address ffffffff0000049b\n ...\n\nInvestigating the issue revealed that these symptoms are results of\nmemory corruption which is caused by out of bounds access within the\ndriver.\n\nThe driver uses a dynamically allocated structure for BAM transactions,\nwhich structure must have enough space for all possible variations of\ndifferent flash operations initiated by the driver. The required space\nheavily depends on the actual number of \u0027codewords\u0027 which is calculated\nfrom the pagesize of the actual NAND chip.\n\nAlthough the qcom_nandc_alloc() function allocates memory for the BAM\ntransactions during probe, but since the actual number of \u0027codewords\u0027\nis not yet know the allocation is done for one \u0027codeword\u0027 only.\n\nBecause of this, whenever the driver does a flash operation, and the\nnumber of the required transactions exceeds the size of the allocated\narrays the driver accesses memory out of the allocated range.\n\nTo avoid this, change the code to free the initially allocated BAM\ntransactions memory, and allocate a new one once the actual number of\n\u0027codewords\u0027 required for a given NAND chip is known." } ], "providerMetadata": { "dateUpdated": "2025-07-28T04:21:04.890Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/86fb36de1132b560f9305f0c78fa69f459fa0980" }, { "url": "https://git.kernel.org/stable/c/d85d0380292a7e618915069c3579ae23c7c80339" } ], "title": "spi: spi-qpic-snand: reallocate BAM transactions", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2025-38398", "datePublished": "2025-07-25T12:53:42.398Z", "dateReserved": "2025-04-16T04:51:24.012Z", "dateUpdated": "2025-07-28T04:21:04.890Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-38398\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-07-25T13:15:29.303\",\"lastModified\":\"2025-07-25T15:29:19.837\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nspi: spi-qpic-snand: reallocate BAM transactions\\n\\nUsing the mtd_nandbiterrs module for testing the driver occasionally\\nresults in weird things like below.\\n\\n1. swiotlb mapping fails with the following message:\\n\\n [ 85.926216] qcom_snand 79b0000.spi: swiotlb buffer is full (sz: 4294967294 bytes), total 512 (slots), used 0 (slots)\\n [ 85.932937] qcom_snand 79b0000.spi: failure in mapping desc\\n [ 87.999314] qcom_snand 79b0000.spi: failure to write raw page\\n [ 87.999352] mtd_nandbiterrs: error: write_oob failed (-110)\\n\\n Rebooting the board after this causes a panic due to a NULL pointer\\n dereference.\\n\\n2. If the swiotlb mapping does not fail, rebooting the board may result\\n in a different panic due to a bad spinlock magic:\\n\\n [ 256.104459] BUG: spinlock bad magic on CPU#3, procd/2241\\n [ 256.104488] Unable to handle kernel paging request at virtual address ffffffff0000049b\\n ...\\n\\nInvestigating the issue revealed that these symptoms are results of\\nmemory corruption which is caused by out of bounds access within the\\ndriver.\\n\\nThe driver uses a dynamically allocated structure for BAM transactions,\\nwhich structure must have enough space for all possible variations of\\ndifferent flash operations initiated by the driver. The required space\\nheavily depends on the actual number of \u0027codewords\u0027 which is calculated\\nfrom the pagesize of the actual NAND chip.\\n\\nAlthough the qcom_nandc_alloc() function allocates memory for the BAM\\ntransactions during probe, but since the actual number of \u0027codewords\u0027\\nis not yet know the allocation is done for one \u0027codeword\u0027 only.\\n\\nBecause of this, whenever the driver does a flash operation, and the\\nnumber of the required transactions exceeds the size of the allocated\\narrays the driver accesses memory out of the allocated range.\\n\\nTo avoid this, change the code to free the initially allocated BAM\\ntransactions memory, and allocate a new one once the actual number of\\n\u0027codewords\u0027 required for a given NAND chip is known.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: spi-qpic-snand: reasignar transacciones BAM El uso del m\u00f3dulo mtd_nandbiterrs para probar el controlador ocasionalmente da como resultado cosas extra\u00f1as como la siguiente. 1. La asignaci\u00f3n de swiotlb falla con el siguiente mensaje: [85.926216] qcom_snand 79b0000.spi: el b\u00fafer de swiotlb est\u00e1 lleno (sz: 4294967294 bytes), total 512 (ranuras), usado 0 (ranuras) [85.932937] qcom_snand 79b0000.spi: error en la asignaci\u00f3n desc [87.999314] qcom_snand 79b0000.spi: error al escribir la p\u00e1gina sin formato [87.999352] mtd_nandbiterrs: error: write_oob fall\u00f3 (-110) Reiniciar la placa despu\u00e9s de esto provoca un p\u00e1nico debido a una desreferencia de puntero NULL. 2. Si el mapeo swiotlb no falla, reiniciar la placa puede resultar en un p\u00e1nico diferente debido a un spinlock magic defectuoso: [ 256.104459] BUG: spinlock bad magic on CPU#3, procd/2241 [ 256.104488] Unable to handle kernel paging request at virtual address ffffffff0000049b ... La investigaci\u00f3n del problema revel\u00f3 que estos s\u00edntomas son resultados de la corrupci\u00f3n de memoria que es causada por el acceso fuera de los l\u00edmites dentro del controlador. El controlador utiliza una estructura asignada din\u00e1micamente para las transacciones BAM, dicha estructura debe tener suficiente espacio para todas las posibles variaciones de diferentes operaciones flash iniciadas por el controlador. El espacio requerido depende en gran medida del n\u00famero real de \u0027palabras de c\u00f3digo\u0027 que se calcula a partir del tama\u00f1o de p\u00e1gina del chip NAND real. Aunque la funci\u00f3n qcom_nandc_alloc() asigna memoria para las transacciones BAM durante el sondeo, pero como el n\u00famero real de \u0027palabras de c\u00f3digo\u0027 a\u00fan no se conoce, la asignaci\u00f3n se realiza solo para una \u0027palabra de c\u00f3digo\u0027. Por ello, siempre que el controlador realiza una operaci\u00f3n de flash y el n\u00famero de transacciones requeridas excede el tama\u00f1o de las matrices asignadas, accede a memoria fuera del rango asignado. Para evitarlo, modifique el c\u00f3digo para liberar la memoria de transacciones BAM inicialmente asignada y asigne una nueva una vez que se conozca el n\u00famero real de palabras de c\u00f3digo requeridas para un chip NAND determinado.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/86fb36de1132b560f9305f0c78fa69f459fa0980\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d85d0380292a7e618915069c3579ae23c7c80339\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
ghsa-pqf9-m843-ppvg
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
spi: spi-qpic-snand: reallocate BAM transactions
Using the mtd_nandbiterrs module for testing the driver occasionally results in weird things like below.
- swiotlb mapping fails with the following message:
[ 85.926216] qcom_snand 79b0000.spi: swiotlb buffer is full (sz: 4294967294 bytes), total 512 (slots), used 0 (slots) [ 85.932937] qcom_snand 79b0000.spi: failure in mapping desc [ 87.999314] qcom_snand 79b0000.spi: failure to write raw page [ 87.999352] mtd_nandbiterrs: error: write_oob failed (-110)
Rebooting the board after this causes a panic due to a NULL pointer dereference.
- If the swiotlb mapping does not fail, rebooting the board may result in a different panic due to a bad spinlock magic:
[ 256.104459] BUG: spinlock bad magic on CPU#3, procd/2241 [ 256.104488] Unable to handle kernel paging request at virtual address ffffffff0000049b ...
Investigating the issue revealed that these symptoms are results of memory corruption which is caused by out of bounds access within the driver.
The driver uses a dynamically allocated structure for BAM transactions, which structure must have enough space for all possible variations of different flash operations initiated by the driver. The required space heavily depends on the actual number of 'codewords' which is calculated from the pagesize of the actual NAND chip.
Although the qcom_nandc_alloc() function allocates memory for the BAM transactions during probe, but since the actual number of 'codewords' is not yet know the allocation is done for one 'codeword' only.
Because of this, whenever the driver does a flash operation, and the number of the required transactions exceeds the size of the allocated arrays the driver accesses memory out of the allocated range.
To avoid this, change the code to free the initially allocated BAM transactions memory, and allocate a new one once the actual number of 'codewords' required for a given NAND chip is known.
{ "affected": [], "aliases": [ "CVE-2025-38398" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-25T13:15:29Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-qpic-snand: reallocate BAM transactions\n\nUsing the mtd_nandbiterrs module for testing the driver occasionally\nresults in weird things like below.\n\n1. swiotlb mapping fails with the following message:\n\n [ 85.926216] qcom_snand 79b0000.spi: swiotlb buffer is full (sz: 4294967294 bytes), total 512 (slots), used 0 (slots)\n [ 85.932937] qcom_snand 79b0000.spi: failure in mapping desc\n [ 87.999314] qcom_snand 79b0000.spi: failure to write raw page\n [ 87.999352] mtd_nandbiterrs: error: write_oob failed (-110)\n\n Rebooting the board after this causes a panic due to a NULL pointer\n dereference.\n\n2. If the swiotlb mapping does not fail, rebooting the board may result\n in a different panic due to a bad spinlock magic:\n\n [ 256.104459] BUG: spinlock bad magic on CPU#3, procd/2241\n [ 256.104488] Unable to handle kernel paging request at virtual address ffffffff0000049b\n ...\n\nInvestigating the issue revealed that these symptoms are results of\nmemory corruption which is caused by out of bounds access within the\ndriver.\n\nThe driver uses a dynamically allocated structure for BAM transactions,\nwhich structure must have enough space for all possible variations of\ndifferent flash operations initiated by the driver. The required space\nheavily depends on the actual number of \u0027codewords\u0027 which is calculated\nfrom the pagesize of the actual NAND chip.\n\nAlthough the qcom_nandc_alloc() function allocates memory for the BAM\ntransactions during probe, but since the actual number of \u0027codewords\u0027\nis not yet know the allocation is done for one \u0027codeword\u0027 only.\n\nBecause of this, whenever the driver does a flash operation, and the\nnumber of the required transactions exceeds the size of the allocated\narrays the driver accesses memory out of the allocated range.\n\nTo avoid this, change the code to free the initially allocated BAM\ntransactions memory, and allocate a new one once the actual number of\n\u0027codewords\u0027 required for a given NAND chip is known.", "id": "GHSA-pqf9-m843-ppvg", "modified": "2025-07-25T15:30:52Z", "published": "2025-07-25T15:30:52Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38398" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/86fb36de1132b560f9305f0c78fa69f459fa0980" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/d85d0380292a7e618915069c3579ae23c7c80339" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2025-38398
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-qpic-snand: reallocate BAM transactions\n\nUsing the mtd_nandbiterrs module for testing the driver occasionally\nresults in weird things like below.\n\n1. swiotlb mapping fails with the following message:\n\n [ 85.926216] qcom_snand 79b0000.spi: swiotlb buffer is full (sz: 4294967294 bytes), total 512 (slots), used 0 (slots)\n [ 85.932937] qcom_snand 79b0000.spi: failure in mapping desc\n [ 87.999314] qcom_snand 79b0000.spi: failure to write raw page\n [ 87.999352] mtd_nandbiterrs: error: write_oob failed (-110)\n\n Rebooting the board after this causes a panic due to a NULL pointer\n dereference.\n\n2. If the swiotlb mapping does not fail, rebooting the board may result\n in a different panic due to a bad spinlock magic:\n\n [ 256.104459] BUG: spinlock bad magic on CPU#3, procd/2241\n [ 256.104488] Unable to handle kernel paging request at virtual address ffffffff0000049b\n ...\n\nInvestigating the issue revealed that these symptoms are results of\nmemory corruption which is caused by out of bounds access within the\ndriver.\n\nThe driver uses a dynamically allocated structure for BAM transactions,\nwhich structure must have enough space for all possible variations of\ndifferent flash operations initiated by the driver. The required space\nheavily depends on the actual number of \u0027codewords\u0027 which is calculated\nfrom the pagesize of the actual NAND chip.\n\nAlthough the qcom_nandc_alloc() function allocates memory for the BAM\ntransactions during probe, but since the actual number of \u0027codewords\u0027\nis not yet know the allocation is done for one \u0027codeword\u0027 only.\n\nBecause of this, whenever the driver does a flash operation, and the\nnumber of the required transactions exceeds the size of the allocated\narrays the driver accesses memory out of the allocated range.\n\nTo avoid this, change the code to free the initially allocated BAM\ntransactions memory, and allocate a new one once the actual number of\n\u0027codewords\u0027 required for a given NAND chip is known." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: spi-qpic-snand: reasignar transacciones BAM El uso del m\u00f3dulo mtd_nandbiterrs para probar el controlador ocasionalmente da como resultado cosas extra\u00f1as como la siguiente. 1. La asignaci\u00f3n de swiotlb falla con el siguiente mensaje: [85.926216] qcom_snand 79b0000.spi: el b\u00fafer de swiotlb est\u00e1 lleno (sz: 4294967294 bytes), total 512 (ranuras), usado 0 (ranuras) [85.932937] qcom_snand 79b0000.spi: error en la asignaci\u00f3n desc [87.999314] qcom_snand 79b0000.spi: error al escribir la p\u00e1gina sin formato [87.999352] mtd_nandbiterrs: error: write_oob fall\u00f3 (-110) Reiniciar la placa despu\u00e9s de esto provoca un p\u00e1nico debido a una desreferencia de puntero NULL. 2. Si el mapeo swiotlb no falla, reiniciar la placa puede resultar en un p\u00e1nico diferente debido a un spinlock magic defectuoso: [ 256.104459] BUG: spinlock bad magic on CPU#3, procd/2241 [ 256.104488] Unable to handle kernel paging request at virtual address ffffffff0000049b ... La investigaci\u00f3n del problema revel\u00f3 que estos s\u00edntomas son resultados de la corrupci\u00f3n de memoria que es causada por el acceso fuera de los l\u00edmites dentro del controlador. El controlador utiliza una estructura asignada din\u00e1micamente para las transacciones BAM, dicha estructura debe tener suficiente espacio para todas las posibles variaciones de diferentes operaciones flash iniciadas por el controlador. El espacio requerido depende en gran medida del n\u00famero real de \u0027palabras de c\u00f3digo\u0027 que se calcula a partir del tama\u00f1o de p\u00e1gina del chip NAND real. Aunque la funci\u00f3n qcom_nandc_alloc() asigna memoria para las transacciones BAM durante el sondeo, pero como el n\u00famero real de \u0027palabras de c\u00f3digo\u0027 a\u00fan no se conoce, la asignaci\u00f3n se realiza solo para una \u0027palabra de c\u00f3digo\u0027. Por ello, siempre que el controlador realiza una operaci\u00f3n de flash y el n\u00famero de transacciones requeridas excede el tama\u00f1o de las matrices asignadas, accede a memoria fuera del rango asignado. Para evitarlo, modifique el c\u00f3digo para liberar la memoria de transacciones BAM inicialmente asignada y asigne una nueva una vez que se conozca el n\u00famero real de palabras de c\u00f3digo requeridas para un chip NAND determinado." } ], "id": "CVE-2025-38398", "lastModified": "2025-07-25T15:29:19.837", "metrics": {}, "published": "2025-07-25T13:15:29.303", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/86fb36de1132b560f9305f0c78fa69f459fa0980" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/d85d0380292a7e618915069c3579ae23c7c80339" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
wid-sec-w-2025-1653
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder andere nicht spezifizierte Angriffe durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1653 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1653.json" }, { "category": "self", "summary": "WID-SEC-2025-1653 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1653" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38353", "url": "https://lore.kernel.org/linux-cve-announce/2025072553-CVE-2025-38353-a9eb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38354", "url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38354-bdcd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38355", "url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38355-2855@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38356", "url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38356-286a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38357", "url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38357-8b0a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38358", "url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38358-8d7f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38359", "url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38359-8cda@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38360", "url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38360-1f17@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38361", "url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38361-3f11@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38362", "url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38362-8922@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38363", "url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38363-122c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38364", "url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38364-74db@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38365", "url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38365-0519@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38366", "url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38366-26b8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38367", "url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38367-df91@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38368", "url": "https://lore.kernel.org/linux-cve-announce/2025072559-CVE-2025-38368-e561@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38369", "url": "https://lore.kernel.org/linux-cve-announce/2025072559-CVE-2025-38369-6ddf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38370", "url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38370-857d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38371", "url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38371-ff41@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38372", "url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38372-6659@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38373", "url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38373-b6fa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38374", "url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38374-52a8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38375", "url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38375-3faa@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38376", "url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38376-e290@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38377", "url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38377-a0c0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38378", "url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38378-4e10@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38379", "url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38379-97db@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38380", "url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38380-d1a9@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38381", "url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38381-b27a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38382", "url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38382-c4f2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38383", "url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38383-c967@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38384", "url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38384-391e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38385", "url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38385-936c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38386", "url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38386-0a8a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38387", "url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38387-f9d4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38388", "url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38388-402a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38389", "url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38389-b1f4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38390", "url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38390-7d67@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38391", "url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38391-0064@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38392", "url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38392-17a6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38393", "url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38393-f2e8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38394", "url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38394-f005@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38395", "url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38395-3a19@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38396", "url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38396-92a5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38397", "url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38397-d375@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38398", "url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38398-1271@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38399", "url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38399-00ec@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38400", "url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38400-a0d2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38401", "url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38401-789b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38402", "url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38402-e08c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38403", "url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38403-0da0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38404", "url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38404-f719@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38405", "url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38405-014e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38406", "url": "https://lore.kernel.org/linux-cve-announce/2025072533-CVE-2025-38406-5f5c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38407", "url": "https://lore.kernel.org/linux-cve-announce/2025072520-CVE-2025-38407-98b5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38408", "url": "https://lore.kernel.org/linux-cve-announce/2025072520-CVE-2025-38408-29e7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38409", "url": "https://lore.kernel.org/linux-cve-announce/2025072520-CVE-2025-38409-cee4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38410", "url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38410-e0e7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38411", "url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38411-0ca7@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38412", "url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38412-2ccc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38413", "url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38413-d64f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38414", "url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38414-8302@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38415", "url": "https://lore.kernel.org/linux-cve-announce/2025072513-CVE-2025-38415-c634@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38416", "url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38416-e4bb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38417", "url": "https://lore.kernel.org/linux-cve-announce/2025072546-CVE-2025-38417-12d4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38418", "url": "https://lore.kernel.org/linux-cve-announce/2025072546-CVE-2025-38418-7af0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38419", "url": "https://lore.kernel.org/linux-cve-announce/2025072546-CVE-2025-38419-c07e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38420", "url": "https://lore.kernel.org/linux-cve-announce/2025072552-CVE-2025-38420-13a5@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38421", "url": "https://lore.kernel.org/linux-cve-announce/2025072554-CVE-2025-38421-8601@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38422", "url": "https://lore.kernel.org/linux-cve-announce/2025072554-CVE-2025-38422-5d9b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38423", "url": "https://lore.kernel.org/linux-cve-announce/2025072554-CVE-2025-38423-171a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38424", "url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38424-500e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38425", "url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38425-d34f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38426", "url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38426-718c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38427", "url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38427-6e37@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38428", "url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38428-8b33@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38429", "url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38429-f662@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38430", "url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38430-dafd@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38431", "url": "https://lore.kernel.org/linux-cve-announce/2025072537-CVE-2025-38431-9bb6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38432", "url": "https://lore.kernel.org/linux-cve-announce/2025072516-CVE-2025-38432-ce36@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38433", "url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38433-6d14@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38434", "url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38434-ecdf@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38435", "url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38435-ffc0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38436", "url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38436-8cb6@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38437", "url": "https://lore.kernel.org/linux-cve-announce/2025072559-CVE-2025-38437-9752@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38438", "url": "https://lore.kernel.org/linux-cve-announce/2025072501-CVE-2025-38438-f653@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38439", "url": "https://lore.kernel.org/linux-cve-announce/2025072501-CVE-2025-38439-3f3b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38440", "url": "https://lore.kernel.org/linux-cve-announce/2025072501-CVE-2025-38440-cb71@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38441", "url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38441-bb71@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38442", "url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38442-2844@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38443", "url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38443-419c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38444", "url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38444-4b60@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38445", "url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38445-7295@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38446", "url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38446-492b@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38447", "url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38447-5233@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38448", "url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38448-f242@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38449", "url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38449-cbf0@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38450", "url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38450-a59f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38451", "url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38451-ee66@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38452", "url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38452-d9d1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38453", "url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38453-69b1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38454", "url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38454-8908@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38455", "url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38455-9331@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38456", "url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38456-3c0a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38457", "url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38457-d302@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38458", "url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38458-d999@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38459", "url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38459-e941@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38460", "url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38460-40fb@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38461", "url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38461-33b1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38462", "url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38462-3e15@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38463", "url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38463-f4a1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38464", "url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38464-44a1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38465", "url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38465-28ad@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38466", "url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38466-11e8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38467", "url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38467-eb0c@gregkh/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13776 vom 2025-08-13", "url": "https://access.redhat.com/errata/RHSA-2025:13776" }, { "category": "external", "summary": "Debian Security Advisory DSA-5973 vom 2025-08-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00137.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5975 vom 2025-08-13", "url": "https://lists.debian.org/debian-security-announce/2025/msg00139.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13960 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:13960" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13962 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:13962" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-13960 vom 2025-08-19", "url": "https://linux.oracle.com/errata/ELSA-2025-13960.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14054 vom 2025-08-19", "url": "https://access.redhat.com/errata/RHSA-2025:14054" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14005 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:14005" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14009 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:14009" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14003 vom 2025-08-18", "url": "https://access.redhat.com/errata/RHSA-2025:14003" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14082 vom 2025-08-19", "url": "https://access.redhat.com/errata/RHSA-2025:14082" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-13962 vom 2025-08-20", "url": "https://linux.oracle.com/errata/ELSA-2025-13962.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-14009 vom 2025-08-22", "url": "https://linux.oracle.com/errata/ELSA-2025-14009.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14420 vom 2025-08-25", "url": "https://access.redhat.com/errata/RHSA-2025:14420" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14418 vom 2025-08-25", "url": "https://access.redhat.com/errata/RHSA-2025:14418" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14510 vom 2025-08-25", "url": "https://access.redhat.com/errata/RHSA-2025:14510" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-14420 vom 2025-08-26", "url": "https://linux.oracle.com/errata/ELSA-2025-14420.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-14510 vom 2025-08-27", "url": "https://linux.oracle.com/errata/ELSA-2025-14510.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html" }, { "category": "external", "summary": "Red Hat Security Advisory", "url": "https://access.redhat.com/errata/RHSA-2025:15009" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14985 vom 2025-09-02", "url": "https://access.redhat.com/errata/RHSA-2025:14985" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15011 vom 2025-09-02", "url": "https://access.redhat.com/errata/RHSA-2025:15011" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15008 vom 2025-09-02", "url": "https://access.redhat.com/errata/RHSA-2025:15008" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15005 vom 2025-09-02", "url": "https://access.redhat.com/errata/RHSA-2025:15005" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15227 vom 2025-09-04", "url": "https://access.redhat.com/errata/RHSA-2025:15227" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15008 vom 2025-09-04", "url": "https://linux.oracle.com/errata/ELSA-2025-15008.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15224 vom 2025-09-04", "url": "https://access.redhat.com/errata/RHSA-2025:15224" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15011 vom 2025-09-03", "url": "https://linux.oracle.com/errata/ELSA-2025-15011.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15005 vom 2025-09-05", "url": "http://linux.oracle.com/errata/ELSA-2025-15005.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15429 vom 2025-09-08", "url": "https://access.redhat.com/errata/RHSA-2025:15429" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15447 vom 2025-09-08", "url": "https://access.redhat.com/errata/RHSA-2025:15447" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09", "url": "https://linux.oracle.com/errata/ELSA-2025-20551.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20552 vom 2025-09-09", "url": "https://linux.oracle.com/errata/ELSA-2025-20552.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2025:15009 vom 2025-09-08", "url": "https://errata.build.resf.org/RLSA-2025:15009" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10", "url": "https://linux.oracle.com/errata/ELSA-2025-20553.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15429 vom 2025-09-10", "url": "https://linux.oracle.com/errata/ELSA-2025-15429.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15668 vom 2025-09-11", "url": "https://access.redhat.com/errata/RHSA-2025:15668" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15661 vom 2025-09-11", "url": "https://access.redhat.com/errata/RHSA-2025:15661" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15660 vom 2025-09-11", "url": "https://access.redhat.com/errata/RHSA-2025:15660" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15658 vom 2025-09-10", "url": "https://access.redhat.com/errata/RHSA-2025:15658" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15656 vom 2025-09-10", "url": "https://access.redhat.com/errata/RHSA-2025:15656" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20653-1 vom 2025-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022432.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15647 vom 2025-09-10", "url": "https://access.redhat.com/errata/RHSA-2025:15647" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20669-1 vom 2025-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15670 vom 2025-09-11", "url": "https://access.redhat.com/errata/RHSA-2025:15670" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15447 vom 2025-09-12", "url": "https://linux.oracle.com/errata/ELSA-2025-15447.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15661 vom 2025-09-13", "url": "http://linux.oracle.com/errata/ELSA-2025-15661.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03204-1 vom 2025-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022522.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15782 vom 2025-09-15", "url": "https://access.redhat.com/errata/RHSA-2025:15782" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15786 vom 2025-09-15", "url": "https://access.redhat.com/errata/RHSA-2025:15786" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15785 vom 2025-09-15", "url": "https://access.redhat.com/errata/RHSA-2025:15785" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15785 vom 2025-09-16", "url": "https://linux.oracle.com/errata/ELSA-2025-15785.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-260 vom 2025-09-17", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-260.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-104 vom 2025-09-16", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-104.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-109 vom 2025-09-16", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-109.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-261 vom 2025-09-17", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-261.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-262 vom 2025-09-17", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-262.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-263 vom 2025-09-17", "url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-263.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15782 vom 2025-09-19", "url": "https://linux.oracle.com/errata/ELSA-2025-15782.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03272-1 vom 2025-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022589.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03283-1 vom 2025-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022596.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-6008 vom 2025-09-23", "url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03290-1 vom 2025-09-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022602.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16373 vom 2025-09-22", "url": "https://access.redhat.com/errata/RHSA-2025:16373" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16372 vom 2025-09-22", "url": "https://access.redhat.com/errata/RHSA-2025:16372" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03314-1 vom 2025-09-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022615.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03310-1 vom 2025-09-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022610.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-16372 vom 2025-09-23", "url": "https://linux.oracle.com/errata/ELSA-2025-16372.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16541 vom 2025-09-24", "url": "https://access.redhat.com/errata/RHSA-2025:16541" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03301-1 vom 2025-09-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022605.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16540 vom 2025-09-24", "url": "https://access.redhat.com/errata/RHSA-2025:16540" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16538 vom 2025-09-24", "url": "https://access.redhat.com/errata/RHSA-2025:16538" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16539 vom 2025-09-24", "url": "https://access.redhat.com/errata/RHSA-2025:16539" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16580 vom 2025-09-24", "url": "https://access.redhat.com/errata/RHSA-2025:16580" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16583 vom 2025-09-24", "url": "https://access.redhat.com/errata/RHSA-2025:16583" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7770-1 vom 2025-09-24", "url": "https://ubuntu.com/security/notices/USN-7770-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7769-1 vom 2025-09-24", "url": "https://ubuntu.com/security/notices/USN-7769-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16582 vom 2025-09-24", "url": "https://access.redhat.com/errata/RHSA-2025:16582" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7769-2 vom 2025-09-24", "url": "https://ubuntu.com/security/notices/USN-7769-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7771-1 vom 2025-09-24", "url": "https://ubuntu.com/security/notices/USN-7771-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16669 vom 2025-09-25", "url": "https://access.redhat.com/errata/RHSA-2025:16669" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7774-1 vom 2025-09-25", "url": "https://ubuntu.com/security/notices/USN-7774-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7774-2 vom 2025-09-25", "url": "https://ubuntu.com/security/notices/USN-7774-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7774-3 vom 2025-09-25", "url": "https://ubuntu.com/security/notices/USN-7774-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7776-1 vom 2025-09-25", "url": "https://ubuntu.com/security/notices/USN-7776-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7775-1 vom 2025-09-25", "url": "https://ubuntu.com/security/notices/USN-7775-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7775-2 vom 2025-09-26", "url": "https://ubuntu.com/security/notices/USN-7775-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7769-3 vom 2025-09-26", "url": "https://ubuntu.com/security/notices/USN-7769-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20756-1 vom 2025-09-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022703.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03383-1 vom 2025-09-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03382-1 vom 2025-09-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022721.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03384-1 vom 2025-09-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022723.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20739-1 vom 2025-09-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022711.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-3013 vom 2025-09-29", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3013.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:17122 vom 2025-10-01", "url": "https://access.redhat.com/errata/RHSA-2025:17122" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:17123 vom 2025-10-01", "url": "https://access.redhat.com/errata/RHSA-2025:17123" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7775-3 vom 2025-10-01", "url": "https://ubuntu.com/security/notices/USN-7775-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7789-1 vom 2025-10-01", "url": "https://ubuntu.com/security/notices/USN-7789-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:17159 vom 2025-10-01", "url": "https://access.redhat.com/errata/RHSA-2025:17159" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-16904 vom 2025-10-02", "url": "https://linux.oracle.com/errata/ELSA-2025-16904.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:17192 vom 2025-10-01", "url": "https://access.redhat.com/errata/RHSA-2025:17192" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7774-4 vom 2025-10-01", "url": "https://ubuntu.com/security/notices/USN-7774-4" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-10-01T22:00:00.000+00:00", "generator": { "date": "2025-10-02T08:24:10.787+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1653", "initial_release_date": "2025-07-27T22:00:00.000+00:00", "revision_history": [ { "date": "2025-07-27T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat und Debian aufgenommen" }, { "date": "2025-08-13T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-08-17T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-18T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux, SUSE und Red Hat aufgenommen" }, { "date": "2025-08-19T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-21T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-25T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-27T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-08-28T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-31T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-01T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-09-03T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2025-09-04T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-09-07T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-09-08T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2025-09-09T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-09-10T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen" }, { "date": "2025-09-11T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-09-14T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2025-09-15T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-09-16T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux und Amazon aufgenommen" }, { "date": "2025-09-18T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2025-09-21T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-22T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Debian, SUSE und Red Hat aufgenommen" }, { "date": "2025-09-23T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE, Oracle Linux und Red Hat aufgenommen" }, { "date": "2025-09-24T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2025-09-25T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-28T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-29T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-09-30T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-10-01T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu, Red Hat und Oracle Linux aufgenommen" } ], "status": "final", "version": "33" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T046484", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "T044137", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-38353", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38353" }, { "cve": "CVE-2025-38354", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38354" }, { "cve": "CVE-2025-38355", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38355" }, { "cve": "CVE-2025-38356", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38356" }, { "cve": "CVE-2025-38357", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38357" }, { "cve": "CVE-2025-38358", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38358" }, { "cve": "CVE-2025-38359", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38359" }, { "cve": "CVE-2025-38360", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38360" }, { "cve": "CVE-2025-38361", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38361" }, { "cve": "CVE-2025-38362", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38362" }, { "cve": "CVE-2025-38363", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38363" }, { "cve": "CVE-2025-38364", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38364" }, { "cve": "CVE-2025-38365", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38365" }, { "cve": "CVE-2025-38366", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38366" }, { "cve": "CVE-2025-38367", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38367" }, { "cve": "CVE-2025-38368", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38368" }, { "cve": "CVE-2025-38369", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38369" }, { "cve": "CVE-2025-38370", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38370" }, { "cve": "CVE-2025-38371", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38371" }, { "cve": "CVE-2025-38372", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38372" }, { "cve": "CVE-2025-38373", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38373" }, { "cve": "CVE-2025-38374", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38374" }, { "cve": "CVE-2025-38375", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38375" }, { "cve": "CVE-2025-38376", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38376" }, { "cve": "CVE-2025-38377", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38377" }, { "cve": "CVE-2025-38378", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38378" }, { "cve": "CVE-2025-38379", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38379" }, { "cve": "CVE-2025-38380", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38380" }, { "cve": "CVE-2025-38381", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38381" }, { "cve": "CVE-2025-38382", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38382" }, { "cve": "CVE-2025-38383", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38383" }, { "cve": "CVE-2025-38384", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38384" }, { "cve": "CVE-2025-38385", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38385" }, { "cve": "CVE-2025-38386", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38386" }, { "cve": "CVE-2025-38387", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38387" }, { "cve": "CVE-2025-38388", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38388" }, { "cve": "CVE-2025-38389", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38389" }, { "cve": "CVE-2025-38390", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38390" }, { "cve": "CVE-2025-38391", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38391" }, { "cve": "CVE-2025-38392", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38392" }, { "cve": "CVE-2025-38393", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38393" }, { "cve": "CVE-2025-38394", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38394" }, { "cve": "CVE-2025-38395", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38395" }, { "cve": "CVE-2025-38396", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38396" }, { "cve": "CVE-2025-38397", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38397" }, { "cve": "CVE-2025-38398", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38398" }, { "cve": "CVE-2025-38399", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38399" }, { "cve": "CVE-2025-38400", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38400" }, { "cve": "CVE-2025-38401", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38401" }, { "cve": "CVE-2025-38402", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38402" }, { "cve": "CVE-2025-38403", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38403" }, { "cve": "CVE-2025-38404", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38404" }, { "cve": "CVE-2025-38405", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38405" }, { "cve": "CVE-2025-38406", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38406" }, { "cve": "CVE-2025-38407", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38407" }, { "cve": "CVE-2025-38408", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38408" }, { "cve": "CVE-2025-38409", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38409" }, { "cve": "CVE-2025-38410", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38410" }, { "cve": "CVE-2025-38411", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38411" }, { "cve": "CVE-2025-38412", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38412" }, { "cve": "CVE-2025-38413", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38413" }, { "cve": "CVE-2025-38414", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38414" }, { "cve": "CVE-2025-38415", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38415" }, { "cve": "CVE-2025-38416", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38416" }, { "cve": "CVE-2025-38417", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38417" }, { "cve": "CVE-2025-38418", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38418" }, { "cve": "CVE-2025-38419", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38419" }, { "cve": "CVE-2025-38420", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38420" }, { "cve": "CVE-2025-38421", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38421" }, { "cve": "CVE-2025-38422", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38422" }, { "cve": "CVE-2025-38423", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38423" }, { "cve": "CVE-2025-38424", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38424" }, { "cve": "CVE-2025-38425", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38425" }, { "cve": "CVE-2025-38426", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38426" }, { "cve": "CVE-2025-38427", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38427" }, { "cve": "CVE-2025-38428", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38428" }, { "cve": "CVE-2025-38429", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38429" }, { "cve": "CVE-2025-38430", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38430" }, { "cve": "CVE-2025-38431", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38431" }, { "cve": "CVE-2025-38432", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38432" }, { "cve": "CVE-2025-38433", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38433" }, { "cve": "CVE-2025-38434", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38434" }, { "cve": "CVE-2025-38435", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38435" }, { "cve": "CVE-2025-38436", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38436" }, { "cve": "CVE-2025-38437", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38437" }, { "cve": "CVE-2025-38438", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38438" }, { "cve": "CVE-2025-38439", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38439" }, { "cve": "CVE-2025-38440", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38440" }, { "cve": "CVE-2025-38441", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38441" }, { "cve": "CVE-2025-38442", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38442" }, { "cve": "CVE-2025-38443", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38443" }, { "cve": "CVE-2025-38444", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38444" }, { "cve": "CVE-2025-38445", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38445" }, { "cve": "CVE-2025-38446", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38446" }, { "cve": "CVE-2025-38447", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38447" }, { "cve": "CVE-2025-38448", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38448" }, { "cve": "CVE-2025-38449", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38449" }, { "cve": "CVE-2025-38450", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38450" }, { "cve": "CVE-2025-38451", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38451" }, { "cve": "CVE-2025-38452", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38452" }, { "cve": "CVE-2025-38453", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38453" }, { "cve": "CVE-2025-38454", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38454" }, { "cve": "CVE-2025-38455", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38455" }, { "cve": "CVE-2025-38456", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38456" }, { "cve": "CVE-2025-38457", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38457" }, { "cve": "CVE-2025-38458", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38458" }, { "cve": "CVE-2025-38459", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38459" }, { "cve": "CVE-2025-38460", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38460" }, { "cve": "CVE-2025-38461", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38461" }, { "cve": "CVE-2025-38462", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38462" }, { "cve": "CVE-2025-38463", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38463" }, { "cve": "CVE-2025-38464", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38464" }, { "cve": "CVE-2025-38465", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38465" }, { "cve": "CVE-2025-38466", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38466" }, { "cve": "CVE-2025-38467", "product_status": { "known_affected": [ "T044137", "2951", "T002207", "67646", "T000126", "T046484", "398363", "T004914", "T032255" ] }, "release_date": "2025-07-27T22:00:00.000+00:00", "title": "CVE-2025-38467" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.