Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-38479 (GCVE-0-2025-38479)
Vulnerability from cvelistv5
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/dma/fsl-edma-main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "55e2dbe2ba787d4fc2306f6bb2f43fb32176e184", "status": "affected", "version": "44eb827264de4f14d8317692441e13f5e2aadbf2", "versionType": "git" }, { "lessThan": "38ff8769074db27387cb2323aaa751e59d168e6a", "status": "affected", "version": "44eb827264de4f14d8317692441e13f5e2aadbf2", "versionType": "git" }, { "lessThan": "f3834d2d68749e4760c27325149765930ad876fd", "status": "affected", "version": "44eb827264de4f14d8317692441e13f5e2aadbf2", "versionType": "git" }, { "lessThan": "fa70c4c3c580c239a0f9e83a14770ab026e8d820", "status": "affected", "version": "44eb827264de4f14d8317692441e13f5e2aadbf2", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/dma/fsl-edma-main.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.11" }, { "lessThan": "6.11", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.12.*", "status": "unaffected", "version": "6.12.23", "versionType": "semver" }, { "lessThanOrEqual": "6.13.*", "status": "unaffected", "version": "6.13.11", "versionType": "semver" }, { "lessThanOrEqual": "6.14.*", "status": "unaffected", "version": "6.14.2", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.15", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.23", "versionStartIncluding": "6.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.13.11", "versionStartIncluding": "6.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.14.2", "versionStartIncluding": "6.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.15", "versionStartIncluding": "6.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fsl-edma: free irq correctly in remove path\n\nAdd fsl_edma-\u003etxirq/errirq check to avoid below warning because no\nerrirq at i.MX9 platform. Otherwise there will be kernel dump:\nWARNING: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devm_free_irq+0x74/0x80\nModules linked in:\nCPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18\nHardware name: NXP i.MX93 11X11 EVK board (DT)\nWorkqueue: events_unbound deferred_probe_work_func\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : devm_free_irq+0x74/0x80\nlr : devm_free_irq+0x48/0x80\nCall trace:\n devm_free_irq+0x74/0x80 (P)\n devm_free_irq+0x48/0x80 (L)\n fsl_edma_remove+0xc4/0xc8\n platform_remove+0x28/0x44\n device_remove+0x4c/0x80" } ], "providerMetadata": { "dateUpdated": "2025-05-26T05:25:22.283Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/55e2dbe2ba787d4fc2306f6bb2f43fb32176e184" }, { "url": "https://git.kernel.org/stable/c/38ff8769074db27387cb2323aaa751e59d168e6a" }, { "url": "https://git.kernel.org/stable/c/f3834d2d68749e4760c27325149765930ad876fd" }, { "url": "https://git.kernel.org/stable/c/fa70c4c3c580c239a0f9e83a14770ab026e8d820" } ], "title": "dmaengine: fsl-edma: free irq correctly in remove path", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2025-38479", "datePublished": "2025-04-18T07:01:33.022Z", "dateReserved": "2025-04-16T04:51:24.021Z", "dateUpdated": "2025-05-26T05:25:22.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-38479\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-04-18T07:15:43.613\",\"lastModified\":\"2025-04-21T14:23:45.950\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndmaengine: fsl-edma: free irq correctly in remove path\\n\\nAdd fsl_edma-\u003etxirq/errirq check to avoid below warning because no\\nerrirq at i.MX9 platform. Otherwise there will be kernel dump:\\nWARNING: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devm_free_irq+0x74/0x80\\nModules linked in:\\nCPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18\\nHardware name: NXP i.MX93 11X11 EVK board (DT)\\nWorkqueue: events_unbound deferred_probe_work_func\\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\npc : devm_free_irq+0x74/0x80\\nlr : devm_free_irq+0x48/0x80\\nCall trace:\\n devm_free_irq+0x74/0x80 (P)\\n devm_free_irq+0x48/0x80 (L)\\n fsl_edma_remove+0xc4/0xc8\\n platform_remove+0x28/0x44\\n device_remove+0x4c/0x80\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: fsl-edma: libera irq correctamente en la ruta de eliminaci\u00f3n. Agrega la verificaci\u00f3n fsl_edma-\u0026gt;txirq/errirq para evitar la siguiente advertencia porque no hay errirq en la plataforma i.MX9. De lo contrario, habr\u00e1 un volcado de kernel: ADVERTENCIA: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devm_free_irq+0x74/0x80 Modules linked in: CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18 Hardware name: NXP i.MX93 11X11 EVK board (DT) Workqueue: events_unbound deferred_probe_work_func pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : devm_free_irq+0x74/0x80 lr : devm_free_irq+0x48/0x80 Call trace: devm_free_irq+0x74/0x80 (P) devm_free_irq+0x48/0x80 (L) fsl_edma_remove+0xc4/0xc8 platform_remove+0x28/0x44 device_remove+0x4c/0x80 \"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/38ff8769074db27387cb2323aaa751e59d168e6a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/55e2dbe2ba787d4fc2306f6bb2f43fb32176e184\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f3834d2d68749e4760c27325149765930ad876fd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fa70c4c3c580c239a0f9e83a14770ab026e8d820\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
wid-sec-w-2025-0861
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Zustand oder nicht n\u00e4her spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0861 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0861.json" }, { "category": "self", "summary": "WID-SEC-2025-0861 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0861" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2020-36789", "url": "https://lore.kernel.org/linux-cve-announce/2025041732-CVE-2020-36789-bb60@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2021-47668", "url": "https://lore.kernel.org/linux-cve-announce/2025041734-CVE-2021-47668-c0de@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2021-47669", "url": "https://lore.kernel.org/linux-cve-announce/2025041734-CVE-2021-47669-f268@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2021-47670", "url": "https://lore.kernel.org/linux-cve-announce/2025041734-CVE-2021-47670-2b77@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2021-47671", "url": "https://lore.kernel.org/linux-cve-announce/2025041735-CVE-2021-47671-9b1a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37785", "url": "https://lore.kernel.org/linux-cve-announce/2025041813-CVE-2025-37785-e13d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37838", "url": "https://lore.kernel.org/linux-cve-announce/2025041858-CVE-2025-37838-2253@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37860", "url": "https://lore.kernel.org/linux-cve-announce/2025041816-CVE-2025-37860-9af2@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37893", "url": "https://lore.kernel.org/linux-cve-announce/2025041816-CVE-2025-37893-57b4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-37925", "url": "https://lore.kernel.org/linux-cve-announce/2025041816-CVE-2025-37925-9765@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38049", "url": "https://lore.kernel.org/linux-cve-announce/2025041817-CVE-2025-38049-7570@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38104", "url": "https://lore.kernel.org/linux-cve-announce/2025041817-CVE-2025-38104-ef68@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38152", "url": "https://lore.kernel.org/linux-cve-announce/2025041817-CVE-2025-38152-c8b3@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38240", "url": "https://lore.kernel.org/linux-cve-announce/2025041818-CVE-2025-38240-4787@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38479", "url": "https://lore.kernel.org/linux-cve-announce/2025041818-CVE-2025-38479-4b98@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38575", "url": "https://lore.kernel.org/linux-cve-announce/2025041818-CVE-2025-38575-2d0f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-38637", "url": "https://lore.kernel.org/linux-cve-announce/2025041819-CVE-2025-38637-8e27@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39688", "url": "https://lore.kernel.org/linux-cve-announce/2025041819-CVE-2025-39688-80f1@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39728", "url": "https://lore.kernel.org/linux-cve-announce/2025041820-CVE-2025-39728-8713@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39735", "url": "https://lore.kernel.org/linux-cve-announce/2025041820-CVE-2025-39735-41c8@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39755", "url": "https://lore.kernel.org/linux-cve-announce/2025041820-CVE-2025-39755-f737@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39778", "url": "https://lore.kernel.org/linux-cve-announce/2025041821-CVE-2025-39778-70fe@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39930", "url": "https://lore.kernel.org/linux-cve-announce/2025041821-CVE-2025-39930-6fed@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-39989", "url": "https://lore.kernel.org/linux-cve-announce/2025041821-CVE-2025-39989-5804@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-40014", "url": "https://lore.kernel.org/linux-cve-announce/2025041822-CVE-2025-40014-384f@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-40114", "url": "https://lore.kernel.org/linux-cve-announce/2025041822-CVE-2025-40114-000e@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-40325", "url": "https://lore.kernel.org/linux-cve-announce/2025041822-CVE-2025-40325-3cc4@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2025-40364", "url": "https://lore.kernel.org/linux-cve-announce/2025041827-CVE-2025-40364-d93c@gregkh/" }, { "category": "external", "summary": "Google Cloud Platform Security Bulletin GCP-2025-018 vom 2025-04-24", "url": "https://cloud.google.com/support/bulletins#gcp-2025-018" }, { "category": "external", "summary": "Debian Security Advisory DSA-5907 vom 2025-04-27", "url": "https://lists.debian.org/debian-security-announce/2025/msg00069.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1574-1 vom 2025-05-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1573-1 vom 2025-05-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01600-1 vom 2025-05-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020854.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01633-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020864.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01627-1 vom 2025-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020866.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4193 vom 2025-05-30", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20344-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020964.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20343-1 vom 2025-05-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020965.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8374 vom 2025-06-02", "url": "https://access.redhat.com/errata/RHSA-2025:8374" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20354-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021016.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20355-1 vom 2025-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021015.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8643 vom 2025-06-09", "url": "https://access.redhat.com/errata/RHSA-2025:8643" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-8643 vom 2025-06-10", "url": "https://linux.oracle.com/errata/ELSA-2025-8643.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20372 vom 2025-06-12", "url": "https://linux.oracle.com/errata/ELSA-2025-20372.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01918-1 vom 2025-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01965-1 vom 2025-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01982-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021539.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20408-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021550.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20413-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021547.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01972-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021537.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01983-1 vom 2025-06-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021538.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-1 vom 2025-06-19", "url": "https://ubuntu.com/security/notices/USN-7585-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02000-1 vom 2025-06-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021568.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-2 vom 2025-06-19", "url": "https://ubuntu.com/security/notices/USN-7585-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20421-1 vom 2025-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021590.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20419-1 vom 2025-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021591.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-2 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-3 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7592-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7592-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7593-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-4 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7591-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7594-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7594-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7598-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7598-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7597-2 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7597-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7597-1 vom 2025-06-24", "url": "https://ubuntu.com/security/notices/USN-7597-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-3 vom 2025-06-25", "url": "https://ubuntu.com/security/notices/USN-7585-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-4 vom 2025-06-25", "url": "https://ubuntu.com/security/notices/USN-7585-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7594-2 vom 2025-06-26", "url": "https://ubuntu.com/security/notices/USN-7594-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26", "url": "https://ubuntu.com/security/notices/USN-7602-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02173-1 vom 2025-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021714.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7606-1 vom 2025-06-30", "url": "https://ubuntu.com/security/notices/USN-7606-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-102 vom 2025-06-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-102.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7605-1 vom 2025-06-30", "url": "https://ubuntu.com/security/notices/USN-7605-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-5 vom 2025-06-30", "url": "https://ubuntu.com/security/notices/USN-7585-5" }, { "category": "external", "summary": "SEM 2025.2.1 release notes vom 2025-07-02", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-6 vom 2025-07-03", "url": "https://ubuntu.com/security/notices/USN-7585-6" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-8374 vom 2025-07-04", "url": "https://linux.oracle.com/errata/ELSA-2025-8374.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7605-2 vom 2025-07-04", "url": "https://ubuntu.com/security/notices/USN-7605-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-5 vom 2025-07-04", "url": "https://ubuntu.com/security/notices/USN-7591-5" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08", "url": "https://linux.oracle.com/errata/ELSA-2025-20406.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7628-1 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7628-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7594-3 vom 2025-07-09", "url": "https://ubuntu.com/security/notices/USN-7594-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02262-1 vom 2025-07-10", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B53IHD74IRNJDAOHBW4L7JGWNOM26XE7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20471 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20471.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16", "url": "https://ubuntu.com/security/notices/USN-7640-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7585-7 vom 2025-07-16", "url": "https://ubuntu.com/security/notices/USN-7585-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7591-6 vom 2025-07-17", "url": "https://ubuntu.com/security/notices/USN-7591-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7654-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18", "url": "https://ubuntu.com/security/notices/USN-7655-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22", "url": "https://ubuntu.com/security/notices/USN-7654-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7654-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05", "url": "https://ubuntu.com/security/notices/USN-7686-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13589 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13589" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13590 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13590" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-13589 vom 2025-08-12", "url": "https://linux.oracle.com/errata/ELSA-2025-13589.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5975 vom 2025-08-13", "url": "https://lists.debian.org/debian-security-announce/2025/msg00139.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14136 vom 2025-08-20", "url": "https://access.redhat.com/errata/RHSA-2025:14136" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7712-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22", "url": "https://ubuntu.com/security/notices/USN-7711-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14511 vom 2025-08-25", "url": "https://access.redhat.com/errata/RHSA-2025:14511" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:14692 vom 2025-08-27", "url": "https://access.redhat.com/errata/RHSA-2025:14692" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15035 vom 2025-09-02", "url": "https://access.redhat.com/errata/RHSA-2025:15035" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02", "url": "https://ubuntu.com/security/notices/USN-7712-2" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2025:13590 vom 2025-09-08", "url": "https://errata.build.resf.org/RLSA-2025:13590" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-08T22:00:00.000+00:00", "generator": { "date": "2025-09-09T07:47:26.888+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0861", "initial_release_date": "2025-04-21T22:00:00.000+00:00", "revision_history": [ { "date": "2025-04-21T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Google aufgenommen" }, { "date": "2025-04-27T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Debian und SUSE aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Debian und SUSE aufgenommen" }, { "date": "2025-06-01T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-06-10T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-06-15T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-19T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-24T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-25T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-26T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE, Ubuntu und Amazon aufgenommen" }, { "date": "2025-07-01T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates aufgenommen" }, { "date": "2025-07-03T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-06T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Oracle Linux, Ubuntu und SUSE aufgenommen" }, { "date": "2025-07-09T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-14T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "34", "summary": "Referenz(en) aufgenommen:" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-10T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-11T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-13T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-08-19T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-24T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-25T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-26T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-09-01T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-09-08T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" } ], "status": "final", "version": "45" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Google Cloud Platform", "product": { "name": "Google Cloud Platform", "product_id": "393401", "product_identification_helper": { "cpe": "cpe:/a:google:cloud_platform:-" } } } ], "category": "vendor", "name": "Google" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c4.4.244", "product": { "name": "Open Source Linux Kernel \u003c4.4.244", "product_id": "T043041" } }, { "category": "product_version", "name": "4.4.244", "product": { "name": "Open Source Linux Kernel 4.4.244", "product_id": "T043041-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:4.4.244" } } }, { "category": "product_version_range", "name": "\u003c4.9.244", "product": { "name": "Open Source Linux Kernel \u003c4.9.244", "product_id": "T043042" } }, { "category": "product_version", "name": "4.9.244", "product": { "name": "Open Source Linux Kernel 4.9.244", "product_id": "T043042-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:4.9.244" } } }, { "category": "product_version_range", "name": "\u003c4.14.207", "product": { "name": "Open Source Linux Kernel \u003c4.14.207", "product_id": "T043043" } }, { "category": "product_version", "name": "4.14.207", "product": { "name": "Open Source Linux Kernel 4.14.207", "product_id": "T043043-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:4.14.207" } } }, { "category": "product_version_range", "name": "\u003c4.19.158", "product": { "name": "Open Source Linux Kernel \u003c4.19.158", "product_id": "T043044" } }, { "category": "product_version", "name": "4.19.158", "product": { "name": "Open Source Linux Kernel 4.19.158", "product_id": "T043044-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:4.19.158" } } }, { "category": "product_version_range", "name": "\u003c5.4.78", "product": { "name": "Open Source Linux Kernel \u003c5.4.78", "product_id": "T043045" } }, { "category": "product_version", "name": "5.4.78", "product": { "name": "Open Source Linux Kernel 5.4.78", "product_id": "T043045-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.4.78" } } }, { "category": "product_version_range", "name": "\u003c5.9.9", "product": { "name": "Open Source Linux Kernel \u003c5.9.9", "product_id": "T043046" } }, { "category": "product_version", "name": "5.9.9", "product": { "name": "Open Source Linux Kernel 5.9.9", "product_id": "T043046-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.9.9" } } }, { "category": "product_version_range", "name": "\u003c5.10", "product": { "name": "Open Source Linux Kernel \u003c5.10", "product_id": "T043048" } }, { "category": "product_version", "name": "5.1", "product": { "name": "Open Source Linux Kernel 5.10", "product_id": "T043048-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.10" } } }, { "category": "product_version_range", "name": "\u003c4.4.254", "product": { "name": "Open Source Linux Kernel \u003c4.4.254", "product_id": "T043051" } }, { "category": "product_version", "name": "4.4.254", "product": { "name": "Open Source Linux Kernel 4.4.254", "product_id": "T043051-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:4.4.254" } } }, { "category": "product_version_range", "name": "\u003c4.9.254", "product": { "name": "Open Source Linux Kernel \u003c4.9.254", "product_id": "T043052" } }, { "category": "product_version", "name": "4.9.254", "product": { "name": "Open Source Linux Kernel 4.9.254", "product_id": "T043052-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:4.9.254" } } }, { "category": "product_version_range", "name": "\u003c4.14.218", "product": { "name": "Open Source Linux Kernel \u003c4.14.218", "product_id": "T043053" } }, { "category": "product_version", "name": "4.14.218", "product": { "name": "Open Source Linux Kernel 4.14.218", "product_id": "T043053-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:4.14.218" } } }, { "category": "product_version_range", "name": "\u003c4.19.171", "product": { "name": "Open Source Linux Kernel \u003c4.19.171", "product_id": "T043054" } }, { "category": "product_version", "name": "4.19.171", "product": { "name": "Open Source Linux Kernel 4.19.171", "product_id": "T043054-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:4.19.171" } } }, { "category": "product_version_range", "name": "\u003c5.4.93", "product": { "name": "Open Source Linux Kernel \u003c5.4.93", "product_id": "T043055" } }, { "category": "product_version", "name": "5.4.93", "product": { "name": "Open Source Linux Kernel 5.4.93", "product_id": "T043055-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.4.93" } } }, { "category": "product_version_range", "name": "\u003c5.10.11", "product": { "name": "Open Source Linux Kernel \u003c5.10.11", "product_id": "T043056" } }, { "category": "product_version", "name": "5.10.11", "product": { "name": "Open Source Linux Kernel 5.10.11", "product_id": "T043056-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.10.11" } } }, { "category": "product_version_range", "name": "\u003c5.11", "product": { "name": "Open Source Linux Kernel \u003c5.11", "product_id": "T043057" } }, { "category": "product_version", "name": "5.11", "product": { "name": "Open Source Linux Kernel 5.11", "product_id": "T043057-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.11" } } }, { "category": "product_version_range", "name": "\u003c5.14.19", "product": { "name": "Open Source Linux Kernel \u003c5.14.19", "product_id": "T043058" } }, { "category": "product_version", "name": "5.14.19", "product": { "name": "Open Source Linux Kernel 5.14.19", "product_id": "T043058-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.14.19" } } }, { "category": "product_version_range", "name": "\u003c5.15.3", "product": { "name": "Open Source Linux Kernel \u003c5.15.3", "product_id": "T043059" } }, { "category": "product_version", "name": "5.15.3", "product": { "name": "Open Source Linux Kernel 5.15.3", "product_id": "T043059-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.15.3" } } }, { "category": "product_version_range", "name": "\u003c5.16", "product": { "name": "Open Source Linux Kernel \u003c5.16", "product_id": "T043060" } }, { "category": "product_version", "name": "5.16", "product": { "name": "Open Source Linux Kernel 5.16", "product_id": "T043060-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.16" } } }, { "category": "product_version_range", "name": "\u003c5.10.236", "product": { "name": "Open Source Linux Kernel \u003c5.10.236", "product_id": "T043061" } }, { "category": "product_version", "name": "5.10.236", "product": { "name": "Open Source Linux Kernel 5.10.236", "product_id": "T043061-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.10.236" } } }, { "category": "product_version_range", "name": "\u003c5.15.180", "product": { "name": "Open Source Linux Kernel \u003c5.15.180", "product_id": "T043062" } }, { "category": "product_version", "name": "5.15.180", "product": { "name": "Open Source Linux Kernel 5.15.180", "product_id": "T043062-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.15.180" } } }, { "category": "product_version_range", "name": "\u003c6.1.134", "product": { "name": "Open Source Linux Kernel \u003c6.1.134", "product_id": "T043063" } }, { "category": "product_version", "name": "6.1.134", "product": { "name": "Open Source Linux Kernel 6.1.134", "product_id": "T043063-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.1.134" } } }, { "category": "product_version_range", "name": "\u003c6.6.87", "product": { "name": "Open Source Linux Kernel \u003c6.6.87", "product_id": "T043064" } }, { "category": "product_version", "name": "6.6.87", "product": { "name": "Open Source Linux Kernel 6.6.87", "product_id": "T043064-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.6.87" } } }, { "category": "product_version_range", "name": "\u003c6.12.23", "product": { "name": "Open Source Linux Kernel \u003c6.12.23", "product_id": "T043065" } }, { "category": "product_version", "name": "6.12.23", "product": { "name": "Open Source Linux Kernel 6.12.23", "product_id": "T043065-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.12.23" } } }, { "category": "product_version_range", "name": "\u003c6.13.11", "product": { "name": "Open Source Linux Kernel \u003c6.13.11", "product_id": "T043066" } }, { "category": "product_version", "name": "6.13.11", "product": { "name": "Open Source Linux Kernel 6.13.11", "product_id": "T043066-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.13.11" } } }, { "category": "product_version_range", "name": "\u003c6.14.2", "product": { "name": "Open Source Linux Kernel \u003c6.14.2", "product_id": "T043067" } }, { "category": "product_version", "name": "6.14.2", "product": { "name": "Open Source Linux Kernel 6.14.2", "product_id": "T043067-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.14.2" } } }, { "category": "product_version_range", "name": "\u003c6.15-rc1", "product": { "name": "Open Source Linux Kernel \u003c6.15-rc1", "product_id": "T043072" } }, { "category": "product_version", "name": "6.15-rc1", "product": { "name": "Open Source Linux Kernel 6.15-rc1", "product_id": "T043072-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.15-rc1" } } }, { "category": "product_version_range", "name": "\u003c5.4.292", "product": { "name": "Open Source Linux Kernel \u003c5.4.292", "product_id": "T043073" } }, { "category": "product_version", "name": "5.4.292", "product": { "name": "Open Source Linux Kernel 5.4.292", "product_id": "T043073-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.4.292" } } }, { "category": "product_version_range", "name": "\u003c6.1.129", "product": { "name": "Open Source Linux Kernel \u003c6.1.129", "product_id": "T043075" } }, { "category": "product_version", "name": "6.1.129", "product": { "name": "Open Source Linux Kernel 6.1.129", "product_id": "T043075-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.1.129" } } }, { "category": "product_version_range", "name": "\u003c6.6.78", "product": { "name": "Open Source Linux Kernel \u003c6.6.78", "product_id": "T043076" } }, { "category": "product_version", "name": "6.6.78", "product": { "name": "Open Source Linux Kernel 6.6.78", "product_id": "T043076-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.6.78" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2025.2.1", "product": { "name": "SolarWinds Security Event Manager \u003c2025.2.1", "product_id": "T044986" } }, { "category": "product_version", "name": "2025.2.1", "product": { "name": "SolarWinds Security Event Manager 2025.2.1", "product_id": "T044986-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1" } } } ], "category": "product_name", "name": "Security Event Manager" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-36789", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2020-36789" }, { "cve": "CVE-2021-47668", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2021-47668" }, { "cve": "CVE-2021-47669", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2021-47669" }, { "cve": "CVE-2021-47670", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2021-47670" }, { "cve": "CVE-2021-47671", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2021-47671" }, { "cve": "CVE-2025-37785", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-37785" }, { "cve": "CVE-2025-37838", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-37838" }, { "cve": "CVE-2025-37860", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-37860" }, { "cve": "CVE-2025-37893", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-37893" }, { "cve": "CVE-2025-37925", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-37925" }, { "cve": "CVE-2025-38049", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-38049" }, { "cve": "CVE-2025-38104", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-38104" }, { "cve": "CVE-2025-38152", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-38152" }, { "cve": "CVE-2025-38240", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-38240" }, { "cve": "CVE-2025-38479", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-38479" }, { "cve": "CVE-2025-38575", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-38575" }, { "cve": "CVE-2025-38637", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-38637" }, { "cve": "CVE-2025-39688", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-39688" }, { "cve": "CVE-2025-39728", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-39728" }, { "cve": "CVE-2025-39735", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-39735" }, { "cve": "CVE-2025-39755", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-39755" }, { "cve": "CVE-2025-39778", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-39778" }, { "cve": "CVE-2025-39930", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-39930" }, { "cve": "CVE-2025-39989", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-39989" }, { "cve": "CVE-2025-40014", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-40014" }, { "cve": "CVE-2025-40114", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-40114" }, { "cve": "CVE-2025-40325", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-40325" }, { "cve": "CVE-2025-40364", "product_status": { "known_affected": [ "67646", "T043060", "393401", "T004914", "T043048", "T043061", "T043062", "398363", "T043041", "T043063", "T043042", "T043064", "T043043", "T043065", "T043044", "T043066", "T043045", "T043067", "T043046", "T032255", "T043058", "T043059", "T044986", "2951", "T002207", "T000126", "T043072", "T043051", "T043073", "T043052", "T043053", "T043075", "T043054", "T043076", "T043055", "T043056", "T043057" ] }, "release_date": "2025-04-21T22:00:00.000+00:00", "title": "CVE-2025-40364" } ] }
fkie_cve-2025-38479
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fsl-edma: free irq correctly in remove path\n\nAdd fsl_edma-\u003etxirq/errirq check to avoid below warning because no\nerrirq at i.MX9 platform. Otherwise there will be kernel dump:\nWARNING: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devm_free_irq+0x74/0x80\nModules linked in:\nCPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18\nHardware name: NXP i.MX93 11X11 EVK board (DT)\nWorkqueue: events_unbound deferred_probe_work_func\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : devm_free_irq+0x74/0x80\nlr : devm_free_irq+0x48/0x80\nCall trace:\n devm_free_irq+0x74/0x80 (P)\n devm_free_irq+0x48/0x80 (L)\n fsl_edma_remove+0xc4/0xc8\n platform_remove+0x28/0x44\n device_remove+0x4c/0x80" }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: fsl-edma: libera irq correctamente en la ruta de eliminaci\u00f3n. Agrega la verificaci\u00f3n fsl_edma-\u0026gt;txirq/errirq para evitar la siguiente advertencia porque no hay errirq en la plataforma i.MX9. De lo contrario, habr\u00e1 un volcado de kernel: ADVERTENCIA: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devm_free_irq+0x74/0x80 Modules linked in: CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18 Hardware name: NXP i.MX93 11X11 EVK board (DT) Workqueue: events_unbound deferred_probe_work_func pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : devm_free_irq+0x74/0x80 lr : devm_free_irq+0x48/0x80 Call trace: devm_free_irq+0x74/0x80 (P) devm_free_irq+0x48/0x80 (L) fsl_edma_remove+0xc4/0xc8 platform_remove+0x28/0x44 device_remove+0x4c/0x80 " } ], "id": "CVE-2025-38479", "lastModified": "2025-04-21T14:23:45.950", "metrics": {}, "published": "2025-04-18T07:15:43.613", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/38ff8769074db27387cb2323aaa751e59d168e6a" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/55e2dbe2ba787d4fc2306f6bb2f43fb32176e184" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/f3834d2d68749e4760c27325149765930ad876fd" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/fa70c4c3c580c239a0f9e83a14770ab026e8d820" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" }
ghsa-4g98-mx94-f4wj
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: fsl-edma: free irq correctly in remove path
Add fsl_edma->txirq/errirq check to avoid below warning because no errirq at i.MX9 platform. Otherwise there will be kernel dump: WARNING: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devm_free_irq+0x74/0x80 Modules linked in: CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18 Hardware name: NXP i.MX93 11X11 EVK board (DT) Workqueue: events_unbound deferred_probe_work_func pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : devm_free_irq+0x74/0x80 lr : devm_free_irq+0x48/0x80 Call trace: devm_free_irq+0x74/0x80 (P) devm_free_irq+0x48/0x80 (L) fsl_edma_remove+0xc4/0xc8 platform_remove+0x28/0x44 device_remove+0x4c/0x80
{ "affected": [], "aliases": [ "CVE-2025-38479" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-04-18T07:15:43Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fsl-edma: free irq correctly in remove path\n\nAdd fsl_edma-\u003etxirq/errirq check to avoid below warning because no\nerrirq at i.MX9 platform. Otherwise there will be kernel dump:\nWARNING: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devm_free_irq+0x74/0x80\nModules linked in:\nCPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18\nHardware name: NXP i.MX93 11X11 EVK board (DT)\nWorkqueue: events_unbound deferred_probe_work_func\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : devm_free_irq+0x74/0x80\nlr : devm_free_irq+0x48/0x80\nCall trace:\n devm_free_irq+0x74/0x80 (P)\n devm_free_irq+0x48/0x80 (L)\n fsl_edma_remove+0xc4/0xc8\n platform_remove+0x28/0x44\n device_remove+0x4c/0x80", "id": "GHSA-4g98-mx94-f4wj", "modified": "2025-04-18T15:31:38Z", "published": "2025-04-18T15:31:38Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38479" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/38ff8769074db27387cb2323aaa751e59d168e6a" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/55e2dbe2ba787d4fc2306f6bb2f43fb32176e184" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f3834d2d68749e4760c27325149765930ad876fd" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/fa70c4c3c580c239a0f9e83a14770ab026e8d820" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.