Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-38682 (GCVE-0-2025-38682)
Vulnerability from cvelistv5 – Published: 2025-09-04 15:32 – Updated: 2025-09-29 05:55{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/i2c/i2c-core-base.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "ffe02f7c4e36090154646612e67d331832f92037",
"status": "affected",
"version": "df6d7277e5525d6cce63127dd93ebec4c6354fa0",
"versionType": "git"
},
{
"lessThan": "1c24e5fc0c7096e00c202a6a3e0c342c1afb47c2",
"status": "affected",
"version": "df6d7277e5525d6cce63127dd93ebec4c6354fa0",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/i2c/i2c-core-base.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.16"
},
{
"lessThan": "6.16",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.16.*",
"status": "unaffected",
"version": "6.16.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.17",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.16.2",
"versionStartIncluding": "6.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.17",
"versionStartIncluding": "6.16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: core: Fix double-free of fwnode in i2c_unregister_device()\n\nBefore commit df6d7277e552 (\"i2c: core: Do not dereference fwnode in struct\ndevice\"), i2c_unregister_device() only called fwnode_handle_put() on\nof_node-s in the form of calling of_node_put(client-\u003edev.of_node).\n\nBut after this commit the i2c_client\u0027s fwnode now unconditionally gets\nfwnode_handle_put() on it.\n\nWhen the i2c_client has no primary (ACPI / OF) fwnode but it does have\na software fwnode, the software-node will be the primary node and\nfwnode_handle_put() will put() it.\n\nBut for the software fwnode device_remove_software_node() will also put()\nit leading to a double free:\n\n[ 82.665598] ------------[ cut here ]------------\n[ 82.665609] refcount_t: underflow; use-after-free.\n[ 82.665808] WARNING: CPU: 3 PID: 1502 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x11\n...\n[ 82.666830] RIP: 0010:refcount_warn_saturate+0xba/0x110\n...\n[ 82.666962] \u003cTASK\u003e\n[ 82.666971] i2c_unregister_device+0x60/0x90\n\nFix this by not calling fwnode_handle_put() when the primary fwnode is\na software-node."
}
],
"providerMetadata": {
"dateUpdated": "2025-09-29T05:55:53.675Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/ffe02f7c4e36090154646612e67d331832f92037"
},
{
"url": "https://git.kernel.org/stable/c/1c24e5fc0c7096e00c202a6a3e0c342c1afb47c2"
}
],
"title": "i2c: core: Fix double-free of fwnode in i2c_unregister_device()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-38682",
"datePublished": "2025-09-04T15:32:37.403Z",
"dateReserved": "2025-04-16T04:51:24.031Z",
"dateUpdated": "2025-09-29T05:55:53.675Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-38682\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-04T16:15:35.910\",\"lastModified\":\"2025-11-25T22:06:13.123\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ni2c: core: Fix double-free of fwnode in i2c_unregister_device()\\n\\nBefore commit df6d7277e552 (\\\"i2c: core: Do not dereference fwnode in struct\\ndevice\\\"), i2c_unregister_device() only called fwnode_handle_put() on\\nof_node-s in the form of calling of_node_put(client-\u003edev.of_node).\\n\\nBut after this commit the i2c_client\u0027s fwnode now unconditionally gets\\nfwnode_handle_put() on it.\\n\\nWhen the i2c_client has no primary (ACPI / OF) fwnode but it does have\\na software fwnode, the software-node will be the primary node and\\nfwnode_handle_put() will put() it.\\n\\nBut for the software fwnode device_remove_software_node() will also put()\\nit leading to a double free:\\n\\n[ 82.665598] ------------[ cut here ]------------\\n[ 82.665609] refcount_t: underflow; use-after-free.\\n[ 82.665808] WARNING: CPU: 3 PID: 1502 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x11\\n...\\n[ 82.666830] RIP: 0010:refcount_warn_saturate+0xba/0x110\\n...\\n[ 82.666962] \u003cTASK\u003e\\n[ 82.666971] i2c_unregister_device+0x60/0x90\\n\\nFix this by not calling fwnode_handle_put() when the primary fwnode is\\na software-node.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-415\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.16\",\"versionEndExcluding\":\"6.16.2\",\"matchCriteriaId\":\"BD7C087D-2415-4521-B624-30003352F899\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1c24e5fc0c7096e00c202a6a3e0c342c1afb47c2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ffe02f7c4e36090154646612e67d331832f92037\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
FKIE_CVE-2025-38682
Vulnerability from fkie_nvd - Published: 2025-09-04 16:15 - Updated: 2025-11-25 22:06| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BD7C087D-2415-4521-B624-30003352F899",
"versionEndExcluding": "6.16.2",
"versionStartIncluding": "6.16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: core: Fix double-free of fwnode in i2c_unregister_device()\n\nBefore commit df6d7277e552 (\"i2c: core: Do not dereference fwnode in struct\ndevice\"), i2c_unregister_device() only called fwnode_handle_put() on\nof_node-s in the form of calling of_node_put(client-\u003edev.of_node).\n\nBut after this commit the i2c_client\u0027s fwnode now unconditionally gets\nfwnode_handle_put() on it.\n\nWhen the i2c_client has no primary (ACPI / OF) fwnode but it does have\na software fwnode, the software-node will be the primary node and\nfwnode_handle_put() will put() it.\n\nBut for the software fwnode device_remove_software_node() will also put()\nit leading to a double free:\n\n[ 82.665598] ------------[ cut here ]------------\n[ 82.665609] refcount_t: underflow; use-after-free.\n[ 82.665808] WARNING: CPU: 3 PID: 1502 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x11\n...\n[ 82.666830] RIP: 0010:refcount_warn_saturate+0xba/0x110\n...\n[ 82.666962] \u003cTASK\u003e\n[ 82.666971] i2c_unregister_device+0x60/0x90\n\nFix this by not calling fwnode_handle_put() when the primary fwnode is\na software-node."
}
],
"id": "CVE-2025-38682",
"lastModified": "2025-11-25T22:06:13.123",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-09-04T16:15:35.910",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/1c24e5fc0c7096e00c202a6a3e0c342c1afb47c2"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/ffe02f7c4e36090154646612e67d331832f92037"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2025-1976
Vulnerability from csaf_certbund - Published: 2025-09-04 22:00 - Updated: 2026-02-04 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder andere nicht spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1976 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1976.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1976 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1976"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38679",
"url": "https://lore.kernel.org/linux-cve-announce/2025090443-CVE-2025-38679-be66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38680",
"url": "https://lore.kernel.org/linux-cve-announce/2025090445-CVE-2025-38680-cce6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38681",
"url": "https://lore.kernel.org/linux-cve-announce/2025090446-CVE-2025-38681-db66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38682",
"url": "https://lore.kernel.org/linux-cve-announce/2025090446-CVE-2025-38682-a90a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38683",
"url": "https://lore.kernel.org/linux-cve-announce/2025090446-CVE-2025-38683-573c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38684",
"url": "https://lore.kernel.org/linux-cve-announce/2025090447-CVE-2025-38684-db4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38685",
"url": "https://lore.kernel.org/linux-cve-announce/2025090447-CVE-2025-38685-d633@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38686",
"url": "https://lore.kernel.org/linux-cve-announce/2025090447-CVE-2025-38686-281b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38687",
"url": "https://lore.kernel.org/linux-cve-announce/2025090448-CVE-2025-38687-564a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38688",
"url": "https://lore.kernel.org/linux-cve-announce/2025090448-CVE-2025-38688-6e94@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38689",
"url": "https://lore.kernel.org/linux-cve-announce/2025090448-CVE-2025-38689-ac95@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38690",
"url": "https://lore.kernel.org/linux-cve-announce/2025090449-CVE-2025-38690-ea6c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38691",
"url": "https://lore.kernel.org/linux-cve-announce/2025090449-CVE-2025-38691-8a2e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38692",
"url": "https://lore.kernel.org/linux-cve-announce/2025090450-CVE-2025-38692-90f5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38693",
"url": "https://lore.kernel.org/linux-cve-announce/2025090450-CVE-2025-38693-aeb5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38694",
"url": "https://lore.kernel.org/linux-cve-announce/2025090450-CVE-2025-38694-056d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38695",
"url": "https://lore.kernel.org/linux-cve-announce/2025090451-CVE-2025-38695-f491@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38696",
"url": "https://lore.kernel.org/linux-cve-announce/2025090451-CVE-2025-38696-4ec2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38697",
"url": "https://lore.kernel.org/linux-cve-announce/2025090451-CVE-2025-38697-b37e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38698",
"url": "https://lore.kernel.org/linux-cve-announce/2025090452-CVE-2025-38698-e0e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38699",
"url": "https://lore.kernel.org/linux-cve-announce/2025090452-CVE-2025-38699-9ca5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38700",
"url": "https://lore.kernel.org/linux-cve-announce/2025090452-CVE-2025-38700-0c1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38701",
"url": "https://lore.kernel.org/linux-cve-announce/2025090453-CVE-2025-38701-691e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38702",
"url": "https://lore.kernel.org/linux-cve-announce/2025090453-CVE-2025-38702-0b09@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38703",
"url": "https://lore.kernel.org/linux-cve-announce/2025090453-CVE-2025-38703-2f5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38704",
"url": "https://lore.kernel.org/linux-cve-announce/2025090454-CVE-2025-38704-4353@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38705",
"url": "https://lore.kernel.org/linux-cve-announce/2025090454-CVE-2025-38705-7cd6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38706",
"url": "https://lore.kernel.org/linux-cve-announce/2025090455-CVE-2025-38706-da55@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38707",
"url": "https://lore.kernel.org/linux-cve-announce/2025090455-CVE-2025-38707-5808@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38708",
"url": "https://lore.kernel.org/linux-cve-announce/2025090455-CVE-2025-38708-6792@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38709",
"url": "https://lore.kernel.org/linux-cve-announce/2025090456-CVE-2025-38709-f62c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38710",
"url": "https://lore.kernel.org/linux-cve-announce/2025090456-CVE-2025-38710-1b60@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38711",
"url": "https://lore.kernel.org/linux-cve-announce/2025090456-CVE-2025-38711-b653@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38712",
"url": "https://lore.kernel.org/linux-cve-announce/2025090457-CVE-2025-38712-6273@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38713",
"url": "https://lore.kernel.org/linux-cve-announce/2025090457-CVE-2025-38713-dc89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38714",
"url": "https://lore.kernel.org/linux-cve-announce/2025090457-CVE-2025-38714-36f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38715",
"url": "https://lore.kernel.org/linux-cve-announce/2025090458-CVE-2025-38715-8464@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38716",
"url": "https://lore.kernel.org/linux-cve-announce/2025090458-CVE-2025-38716-4971@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38717",
"url": "https://lore.kernel.org/linux-cve-announce/2025090459-CVE-2025-38717-fbf6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38718",
"url": "https://lore.kernel.org/linux-cve-announce/2025090459-CVE-2025-38718-5bb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38719",
"url": "https://lore.kernel.org/linux-cve-announce/2025090459-CVE-2025-38719-16b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38720",
"url": "https://lore.kernel.org/linux-cve-announce/2025090400-CVE-2025-38720-a45e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38721",
"url": "https://lore.kernel.org/linux-cve-announce/2025090400-CVE-2025-38721-e31a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38722",
"url": "https://lore.kernel.org/linux-cve-announce/2025090400-CVE-2025-38722-de5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38723",
"url": "https://lore.kernel.org/linux-cve-announce/2025090401-CVE-2025-38723-18f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38724",
"url": "https://lore.kernel.org/linux-cve-announce/2025090401-CVE-2025-38724-5309@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38725",
"url": "https://lore.kernel.org/linux-cve-announce/2025090401-CVE-2025-38725-eb3f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38726",
"url": "https://lore.kernel.org/linux-cve-announce/2025090402-CVE-2025-38726-e4a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38727",
"url": "https://lore.kernel.org/linux-cve-announce/2025090402-CVE-2025-38727-a22c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38728",
"url": "https://lore.kernel.org/linux-cve-announce/2025090402-CVE-2025-38728-191d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38729",
"url": "https://lore.kernel.org/linux-cve-announce/2025090403-CVE-2025-38729-ca88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38730",
"url": "https://lore.kernel.org/linux-cve-announce/2025090403-CVE-2025-38730-f2e6@gregkh/"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2025-09-09",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6009 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6008 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16880 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16880"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16920 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16920"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3013 vom 2025-09-29",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3013.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16880 vom 2025-09-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-16880.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16919 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16919"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-110 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-110.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16919 vom 2025-09-30",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-September/018697.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16919 vom 2025-09-30",
"url": "http://linux.oracle.com/errata/ELSA-2025-16919.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16919 vom 2025-09-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-16919.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20650 vom 2025-10-07",
"url": "https://linux.oracle.com/errata/ELSA-2025-20650.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16920 vom 2025-10-06",
"url": "https://errata.build.resf.org/RLSA-2025:16920"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17396 vom 2025-10-06",
"url": "https://access.redhat.com/errata/RHSA-2025:17396"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16919 vom 2025-10-06",
"url": "https://errata.build.resf.org/RLSA-2025:16919"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20649 vom 2025-10-07",
"url": "https://linux.oracle.com/errata/ELSA-2025-20649.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7809-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7809-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7808-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7808-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7810-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7810-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17396 vom 2025-10-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-17396.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16880 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:16880"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4328 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20663.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7808-2 vom 2025-10-14",
"url": "https://ubuntu.com/security/notices/USN-7808-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17760 vom 2025-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-17760.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7810-3 vom 2025-10-14",
"url": "https://ubuntu.com/security/notices/USN-7810-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7810-2 vom 2025-10-14",
"url": "https://ubuntu.com/security/notices/USN-7810-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20662 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20662.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20716 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20716.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03602-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022908.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-1 vom 2025-10-21",
"url": "https://ubuntu.com/security/notices/USN-7829-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-18297 vom 2025-10-20",
"url": "https://linux.oracle.com/errata/ELSA-2025-18297.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-2 vom 2025-10-21",
"url": "https://ubuntu.com/security/notices/USN-7829-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-3 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7829-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20721 vom 2025-10-28",
"url": "http://linux.oracle.com/errata/ELSA-2025-20721.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-4 vom 2025-10-27",
"url": "https://ubuntu.com/security/notices/USN-7829-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19224 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19224"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-5 vom 2025-10-28",
"url": "https://ubuntu.com/security/notices/USN-7829-5"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19223 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19223"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-6 vom 2025-11-04",
"url": "https://ubuntu.com/security/notices/USN-7829-6"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-25757.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21091 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21091"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7250971 vom 2025-11-12",
"url": "https://www.ibm.com/support/pages/node/7250971"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21136 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21136"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21760 vom 2025-11-19",
"url": "https://access.redhat.com/errata/RHSA-2025:21760"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20518 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-20518-0.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22006 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22006"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22066 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22066"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22072 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22072"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22124 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22124"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22087 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22087"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22095 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22095"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20091-1 vom 2025-11-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVNKE6YBHUN7AVUHO7UZCJJGK4HYS62H/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21064-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21056-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21052-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023389.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21040-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21074-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22388 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22388"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22387 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22387"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4301-1 vom 2025-11-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLIMXFMWOGTFRJZEC4XPGIMNBCRKQ7IF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21080-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22392 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22392"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22405 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22405"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22388 vom 2025-12-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-22388.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22395 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22395"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4315-1 vom 2025-12-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22571 vom 2025-12-02",
"url": "https://access.redhat.com/errata/RHSA-2025:22571"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22405 vom 2025-12-02",
"url": "https://linux.oracle.com/errata/ELSA-2025-22405.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21118 vom 2025-12-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-21118.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22405 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22405"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22387 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22387"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22388 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22388"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-2 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7910-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7910-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21463 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21463.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22395 vom 2025-12-05",
"url": "https://errata.build.resf.org/RLSA-2025:22395"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-4 vom 2025-12-05",
"url": "https://ubuntu.com/security/notices/USN-7909-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21931 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21931.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22395 vom 2025-12-06",
"url": "https://linux.oracle.com/errata/ELSA-2025-22395.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22910 vom 2025-12-09",
"url": "https://access.redhat.com/errata/RHSA-2025:22910"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22914 vom 2025-12-09",
"url": "https://access.redhat.com/errata/RHSA-2025:22914"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23000 vom 2025-12-10",
"url": "https://access.redhat.com/errata/RHSA-2025:23000"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21180-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21147-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-5 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7909-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7933-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7933-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7938-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7938-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7255154 vom 2025-12-17",
"url": "https://www.ibm.com/support/pages/node/7255154"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23463 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23463"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23947 vom 2025-12-22",
"url": "https://access.redhat.com/errata/RHSA-2025:23947"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23960 vom 2025-12-22",
"url": "https://access.redhat.com/errata/RHSA-2025:23960"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7256201 vom 2026-01-05",
"url": "https://www.ibm.com/support/pages/node/7256201"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20012-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20015-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20021-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0489 vom 2026-01-13",
"url": "https://access.redhat.com/errata/RHSA-2026:0489"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0534 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0534"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0537 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0537"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0535 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0535"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0532 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0532"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0576 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0576"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0793 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0793"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0793 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0793.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0793 vom 2026-01-24",
"url": "https://errata.build.resf.org/RLSA-2026:0793"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22910 vom 2026-01-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-22910.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-030 vom 2026-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23947 vom 2026-01-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-23947.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2026-02-04T23:00:00.000+00:00",
"generator": {
"date": "2026-02-05T10:00:57.510+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1976",
"initial_release_date": "2025-09-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-09-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "2",
"summary": "Produktzuordnung \u00fcberpr\u00fcft, CPE korrigiert"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Amazon, Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux, Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-14T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-20T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Oracle Linux, Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Dell und Ubuntu aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von IBM, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Oracle Linux, SUSE und Red Hat aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von openSUSE und Red Hat aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-12-02T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-09T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von IBM und Red Hat aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-04T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "61"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vProxy \u003c19.14",
"product": {
"name": "Dell NetWorker vProxy \u003c19.14",
"product_id": "T050451"
}
},
{
"category": "product_version",
"name": "vProxy 19.14",
"product": {
"name": "Dell NetWorker vProxy 19.14",
"product_id": "T050451-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.14"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF01",
"product_id": "T048556"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF01",
"product_id": "T048556-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF03",
"product_id": "T049499"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF03",
"product_id": "T049499-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if03"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.9.1",
"product": {
"name": "IBM Security Verify Access \u003c10.0.9.1",
"product_id": "T049459"
}
},
{
"category": "product_version",
"name": "10.0.9.1",
"product": {
"name": "IBM Security Verify Access 10.0.9.1",
"product_id": "T049459-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_verify_access:v10.0.9.1"
}
}
}
],
"category": "product_name",
"name": "Security Verify Access"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Linux Kernel \u003c6.6.96.2-1 on Linux 3.0",
"product": {
"name": "Microsoft Azure Linux Kernel \u003c6.6.96.2-1 on Linux 3.0",
"product_id": "T046805"
}
},
{
"category": "product_version",
"name": "Linux Kernel 6.6.96.2-1 on Linux 3.0",
"product": {
"name": "Microsoft Azure Linux Kernel 6.6.96.2-1 on Linux 3.0",
"product_id": "T046805-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:linux_kernel__6.6.96.2-1_on_linux_3.0"
}
}
}
],
"category": "product_name",
"name": "Azure"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "6368",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-38679",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38679"
},
{
"cve": "CVE-2025-38680",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38680"
},
{
"cve": "CVE-2025-38681",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38681"
},
{
"cve": "CVE-2025-38682",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38682"
},
{
"cve": "CVE-2025-38683",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38683"
},
{
"cve": "CVE-2025-38684",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38684"
},
{
"cve": "CVE-2025-38685",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38685"
},
{
"cve": "CVE-2025-38686",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38686"
},
{
"cve": "CVE-2025-38687",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38687"
},
{
"cve": "CVE-2025-38688",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38688"
},
{
"cve": "CVE-2025-38689",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38689"
},
{
"cve": "CVE-2025-38690",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38690"
},
{
"cve": "CVE-2025-38691",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38691"
},
{
"cve": "CVE-2025-38692",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38692"
},
{
"cve": "CVE-2025-38693",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38693"
},
{
"cve": "CVE-2025-38694",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38694"
},
{
"cve": "CVE-2025-38695",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38695"
},
{
"cve": "CVE-2025-38696",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38696"
},
{
"cve": "CVE-2025-38697",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38697"
},
{
"cve": "CVE-2025-38698",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38698"
},
{
"cve": "CVE-2025-38699",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38699"
},
{
"cve": "CVE-2025-38700",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38700"
},
{
"cve": "CVE-2025-38701",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38701"
},
{
"cve": "CVE-2025-38702",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38702"
},
{
"cve": "CVE-2025-38703",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38703"
},
{
"cve": "CVE-2025-38704",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38704"
},
{
"cve": "CVE-2025-38705",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38705"
},
{
"cve": "CVE-2025-38706",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38706"
},
{
"cve": "CVE-2025-38707",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38707"
},
{
"cve": "CVE-2025-38708",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38708"
},
{
"cve": "CVE-2025-38709",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38709"
},
{
"cve": "CVE-2025-38710",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38710"
},
{
"cve": "CVE-2025-38711",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38711"
},
{
"cve": "CVE-2025-38712",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38712"
},
{
"cve": "CVE-2025-38713",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38713"
},
{
"cve": "CVE-2025-38714",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38714"
},
{
"cve": "CVE-2025-38715",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38715"
},
{
"cve": "CVE-2025-38716",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38716"
},
{
"cve": "CVE-2025-38717",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38717"
},
{
"cve": "CVE-2025-38718",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38718"
},
{
"cve": "CVE-2025-38719",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38719"
},
{
"cve": "CVE-2025-38720",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38720"
},
{
"cve": "CVE-2025-38721",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38721"
},
{
"cve": "CVE-2025-38722",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38722"
},
{
"cve": "CVE-2025-38723",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38723"
},
{
"cve": "CVE-2025-38724",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38724"
},
{
"cve": "CVE-2025-38725",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38725"
},
{
"cve": "CVE-2025-38726",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38726"
},
{
"cve": "CVE-2025-38727",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38727"
},
{
"cve": "CVE-2025-38728",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-38729",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38729"
},
{
"cve": "CVE-2025-38730",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38730"
}
]
}
GHSA-W6PP-P9R9-CVM4
Vulnerability from github – Published: 2025-09-05 18:31 – Updated: 2025-11-26 00:30In the Linux kernel, the following vulnerability has been resolved:
i2c: core: Fix double-free of fwnode in i2c_unregister_device()
Before commit df6d7277e552 ("i2c: core: Do not dereference fwnode in struct device"), i2c_unregister_device() only called fwnode_handle_put() on of_node-s in the form of calling of_node_put(client->dev.of_node).
But after this commit the i2c_client's fwnode now unconditionally gets fwnode_handle_put() on it.
When the i2c_client has no primary (ACPI / OF) fwnode but it does have a software fwnode, the software-node will be the primary node and fwnode_handle_put() will put() it.
But for the software fwnode device_remove_software_node() will also put() it leading to a double free:
[ 82.665598] ------------[ cut here ]------------ [ 82.665609] refcount_t: underflow; use-after-free. [ 82.665808] WARNING: CPU: 3 PID: 1502 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x11 ... [ 82.666830] RIP: 0010:refcount_warn_saturate+0xba/0x110 ... [ 82.666962] [ 82.666971] i2c_unregister_device+0x60/0x90
Fix this by not calling fwnode_handle_put() when the primary fwnode is a software-node.
{
"affected": [],
"aliases": [
"CVE-2025-38682"
],
"database_specific": {
"cwe_ids": [
"CWE-415"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-04T16:15:35Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: core: Fix double-free of fwnode in i2c_unregister_device()\n\nBefore commit df6d7277e552 (\"i2c: core: Do not dereference fwnode in struct\ndevice\"), i2c_unregister_device() only called fwnode_handle_put() on\nof_node-s in the form of calling of_node_put(client-\u003edev.of_node).\n\nBut after this commit the i2c_client\u0027s fwnode now unconditionally gets\nfwnode_handle_put() on it.\n\nWhen the i2c_client has no primary (ACPI / OF) fwnode but it does have\na software fwnode, the software-node will be the primary node and\nfwnode_handle_put() will put() it.\n\nBut for the software fwnode device_remove_software_node() will also put()\nit leading to a double free:\n\n[ 82.665598] ------------[ cut here ]------------\n[ 82.665609] refcount_t: underflow; use-after-free.\n[ 82.665808] WARNING: CPU: 3 PID: 1502 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x11\n...\n[ 82.666830] RIP: 0010:refcount_warn_saturate+0xba/0x110\n...\n[ 82.666962] \u003cTASK\u003e\n[ 82.666971] i2c_unregister_device+0x60/0x90\n\nFix this by not calling fwnode_handle_put() when the primary fwnode is\na software-node.",
"id": "GHSA-w6pp-p9r9-cvm4",
"modified": "2025-11-26T00:30:16Z",
"published": "2025-09-05T18:31:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38682"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/1c24e5fc0c7096e00c202a6a3e0c342c1afb47c2"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ffe02f7c4e36090154646612e67d331832f92037"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.