Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-39674 (GCVE-0-2025-39674)
Vulnerability from cvelistv5
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/ufs/host/ufs-qcom.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "aaf17a35a59572c8b29372883619c3dbb0ebb50a",
"status": "affected",
"version": "e46a28cea29a0ca7d51c811acccf5d119b40c745",
"versionType": "git"
},
{
"lessThan": "6300d5c5438724c0876828da2f6e2c1a661871fc",
"status": "affected",
"version": "e46a28cea29a0ca7d51c811acccf5d119b40c745",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/ufs/host/ufs-qcom.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.16"
},
{
"lessThan": "6.16",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.16.*",
"status": "unaffected",
"version": "6.16.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.17",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.16.4",
"versionStartIncluding": "6.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.17",
"versionStartIncluding": "6.16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: ufs-qcom: Fix ESI null pointer dereference\n\nESI/MSI is a performance optimization feature that provides dedicated\ninterrupts per MCQ hardware queue. This is optional feature and UFS MCQ\nshould work with and without ESI feature.\n\nCommit e46a28cea29a (\"scsi: ufs: qcom: Remove the MSI descriptor abuse\")\nbrings a regression in ESI (Enhanced System Interrupt) configuration that\ncauses a null pointer dereference when Platform MSI allocation fails.\n\nThe issue occurs in when platform_device_msi_init_and_alloc_irqs() in\nufs_qcom_config_esi() fails (returns -EINVAL) but the current code uses\n__free() macro for automatic cleanup free MSI resources that were never\nsuccessfully allocated.\n\nUnable to handle kernel NULL pointer dereference at virtual\naddress 0000000000000008\n\n Call trace:\n mutex_lock+0xc/0x54 (P)\n platform_device_msi_free_irqs_all+0x1c/0x40\n ufs_qcom_config_esi+0x1d0/0x220 [ufs_qcom]\n ufshcd_config_mcq+0x28/0x104\n ufshcd_init+0xa3c/0xf40\n ufshcd_pltfrm_init+0x504/0x7d4\n ufs_qcom_probe+0x20/0x58 [ufs_qcom]\n\nFix by restructuring the ESI configuration to try MSI allocation first,\nbefore any other resource allocation and instead use explicit cleanup\ninstead of __free() macro to avoid cleanup of unallocated resources.\n\nTested on SM8750 platform with MCQ enabled, both with and without\nPlatform ESI support."
}
],
"providerMetadata": {
"dateUpdated": "2025-09-29T05:57:09.395Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/aaf17a35a59572c8b29372883619c3dbb0ebb50a"
},
{
"url": "https://git.kernel.org/stable/c/6300d5c5438724c0876828da2f6e2c1a661871fc"
}
],
"title": "scsi: ufs: ufs-qcom: Fix ESI null pointer dereference",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-39674",
"datePublished": "2025-09-05T17:20:39.859Z",
"dateReserved": "2025-04-16T07:20:57.112Z",
"dateUpdated": "2025-09-29T05:57:09.395Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-39674\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-05T18:15:43.387\",\"lastModified\":\"2025-11-25T21:28:05.853\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nscsi: ufs: ufs-qcom: Fix ESI null pointer dereference\\n\\nESI/MSI is a performance optimization feature that provides dedicated\\ninterrupts per MCQ hardware queue. This is optional feature and UFS MCQ\\nshould work with and without ESI feature.\\n\\nCommit e46a28cea29a (\\\"scsi: ufs: qcom: Remove the MSI descriptor abuse\\\")\\nbrings a regression in ESI (Enhanced System Interrupt) configuration that\\ncauses a null pointer dereference when Platform MSI allocation fails.\\n\\nThe issue occurs in when platform_device_msi_init_and_alloc_irqs() in\\nufs_qcom_config_esi() fails (returns -EINVAL) but the current code uses\\n__free() macro for automatic cleanup free MSI resources that were never\\nsuccessfully allocated.\\n\\nUnable to handle kernel NULL pointer dereference at virtual\\naddress 0000000000000008\\n\\n Call trace:\\n mutex_lock+0xc/0x54 (P)\\n platform_device_msi_free_irqs_all+0x1c/0x40\\n ufs_qcom_config_esi+0x1d0/0x220 [ufs_qcom]\\n ufshcd_config_mcq+0x28/0x104\\n ufshcd_init+0xa3c/0xf40\\n ufshcd_pltfrm_init+0x504/0x7d4\\n ufs_qcom_probe+0x20/0x58 [ufs_qcom]\\n\\nFix by restructuring the ESI configuration to try MSI allocation first,\\nbefore any other resource allocation and instead use explicit cleanup\\ninstead of __free() macro to avoid cleanup of unallocated resources.\\n\\nTested on SM8750 platform with MCQ enabled, both with and without\\nPlatform ESI support.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.16\",\"versionEndExcluding\":\"6.16.4\",\"matchCriteriaId\":\"26A22BE8-0D22-4155-AED4-BB823BB934AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"327D22EF-390B-454C-BD31-2ED23C998A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C730CD9A-D969-4A8E-9522-162AAF7C0EE9\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/6300d5c5438724c0876828da2f6e2c1a661871fc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/aaf17a35a59572c8b29372883619c3dbb0ebb50a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
ghsa-mg6h-9rrq-3f7m
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: ufs-qcom: Fix ESI null pointer dereference
ESI/MSI is a performance optimization feature that provides dedicated interrupts per MCQ hardware queue. This is optional feature and UFS MCQ should work with and without ESI feature.
Commit e46a28cea29a ("scsi: ufs: qcom: Remove the MSI descriptor abuse") brings a regression in ESI (Enhanced System Interrupt) configuration that causes a null pointer dereference when Platform MSI allocation fails.
The issue occurs in when platform_device_msi_init_and_alloc_irqs() in ufs_qcom_config_esi() fails (returns -EINVAL) but the current code uses __free() macro for automatic cleanup free MSI resources that were never successfully allocated.
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008
Call trace: mutex_lock+0xc/0x54 (P) platform_device_msi_free_irqs_all+0x1c/0x40 ufs_qcom_config_esi+0x1d0/0x220 [ufs_qcom] ufshcd_config_mcq+0x28/0x104 ufshcd_init+0xa3c/0xf40 ufshcd_pltfrm_init+0x504/0x7d4 ufs_qcom_probe+0x20/0x58 [ufs_qcom]
Fix by restructuring the ESI configuration to try MSI allocation first, before any other resource allocation and instead use explicit cleanup instead of __free() macro to avoid cleanup of unallocated resources.
Tested on SM8750 platform with MCQ enabled, both with and without Platform ESI support.
{
"affected": [],
"aliases": [
"CVE-2025-39674"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-05T18:15:43Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: ufs-qcom: Fix ESI null pointer dereference\n\nESI/MSI is a performance optimization feature that provides dedicated\ninterrupts per MCQ hardware queue. This is optional feature and UFS MCQ\nshould work with and without ESI feature.\n\nCommit e46a28cea29a (\"scsi: ufs: qcom: Remove the MSI descriptor abuse\")\nbrings a regression in ESI (Enhanced System Interrupt) configuration that\ncauses a null pointer dereference when Platform MSI allocation fails.\n\nThe issue occurs in when platform_device_msi_init_and_alloc_irqs() in\nufs_qcom_config_esi() fails (returns -EINVAL) but the current code uses\n__free() macro for automatic cleanup free MSI resources that were never\nsuccessfully allocated.\n\nUnable to handle kernel NULL pointer dereference at virtual\naddress 0000000000000008\n\n Call trace:\n mutex_lock+0xc/0x54 (P)\n platform_device_msi_free_irqs_all+0x1c/0x40\n ufs_qcom_config_esi+0x1d0/0x220 [ufs_qcom]\n ufshcd_config_mcq+0x28/0x104\n ufshcd_init+0xa3c/0xf40\n ufshcd_pltfrm_init+0x504/0x7d4\n ufs_qcom_probe+0x20/0x58 [ufs_qcom]\n\nFix by restructuring the ESI configuration to try MSI allocation first,\nbefore any other resource allocation and instead use explicit cleanup\ninstead of __free() macro to avoid cleanup of unallocated resources.\n\nTested on SM8750 platform with MCQ enabled, both with and without\nPlatform ESI support.",
"id": "GHSA-mg6h-9rrq-3f7m",
"modified": "2025-11-25T21:32:03Z",
"published": "2025-09-05T18:31:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-39674"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/6300d5c5438724c0876828da2f6e2c1a661871fc"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/aaf17a35a59572c8b29372883619c3dbb0ebb50a"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
wid-sec-w-2025-1988
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht n\u00e4her spezifizierte Auswirkungen zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1988 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1988.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1988 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1988"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38731",
"url": "https://lore.kernel.org/linux-cve-announce/2025090541-CVE-2025-38731-9537@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38732",
"url": "https://lore.kernel.org/linux-cve-announce/2025090543-CVE-2025-38732-f9e4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38733",
"url": "https://lore.kernel.org/linux-cve-announce/2025090543-CVE-2025-38733-65a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38734",
"url": "https://lore.kernel.org/linux-cve-announce/2025090543-CVE-2025-38734-a75f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38735",
"url": "https://lore.kernel.org/linux-cve-announce/2025090543-CVE-2025-38735-3fae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38736",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-38736-b74b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38737",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-38737-4cde@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39673",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-39673-61bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39674",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-39674-6377@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39675",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-39675-bd21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39676",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-39676-9725@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39677",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-39677-5733@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39678",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39678-d4ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39679",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39679-4b4a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39680",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39680-9d9a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39681",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39681-ac80@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39682",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39682-ddab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39683",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39683-fb08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39684",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39684-fcce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39685",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39685-ddff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39686",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39686-afb8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39687",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39687-538e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39689",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39689-f538@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39690",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39690-a303@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39691",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39691-c878@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39692",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39692-7452@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39693",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39693-dcbb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39694",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39694-de23@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39695",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39695-1126@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39696",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39696-ab35@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39697",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39697-5284@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39698",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39698-41e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39699",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39699-4d8c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39700",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39700-a0ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39701",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39701-ce5e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39702",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39702-cb30@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39703",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39703-b03b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39704",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39704-f9b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39705",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39705-6ac5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39706",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39706-087c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39707",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39707-c905@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39708",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39708-a174@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39709",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39709-67cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39710",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39710-198c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39711",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39711-5512@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39712",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39712-6910@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39713",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39713-ec93@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39714",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39714-1820@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39715",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39715-6248@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39716",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39716-7e3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39717",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39717-9e8a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39718",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39718-2e2c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39719",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39719-825e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39720",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39720-3cbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39721",
"url": "https://lore.kernel.org/linux-cve-announce/2025090552-CVE-2025-39721-0b5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39722",
"url": "https://lore.kernel.org/linux-cve-announce/2025090552-CVE-2025-39722-db08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39723",
"url": "https://lore.kernel.org/linux-cve-announce/2025090552-CVE-2025-39723-0daf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39724",
"url": "https://lore.kernel.org/linux-cve-announce/2025090552-CVE-2025-39724-7097@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39725",
"url": "https://lore.kernel.org/linux-cve-announce/2025090522-CVE-2025-39725-7881@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39726",
"url": "https://lore.kernel.org/linux-cve-announce/2025090522-CVE-2025-39726-8934@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39727",
"url": "https://lore.kernel.org/linux-cve-announce/2025090728-CVE-2025-39727-b07c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39729",
"url": "https://lore.kernel.org/linux-cve-announce/2025090730-CVE-2025-39729-14c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39730",
"url": "https://lore.kernel.org/linux-cve-announce/2025090730-CVE-2025-39730-72c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39731",
"url": "https://lore.kernel.org/linux-cve-announce/2025090730-CVE-2025-39731-34d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39732",
"url": "https://lore.kernel.org/linux-cve-announce/2025090730-CVE-2025-39732-4c7f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39733",
"url": "https://lore.kernel.org/linux-cve-announce/2025090730-CVE-2025-39733-0de4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39734",
"url": "https://lore.kernel.org/linux-cve-announce/2025090731-CVE-2025-39734-efa5@gregkh/"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2025-09-09",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6008 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16398 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16398"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6009 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20608 vom 2025-09-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-20608.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16398 vom 2025-09-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-16398.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16904 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16904"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16880 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16880"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-091 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-091.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-266 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-266.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-267 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-267.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-110 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-110.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-268 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-268.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3013 vom 2025-09-29",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3013.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-269 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-269.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-270 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-270.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-105 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-105.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16880 vom 2025-09-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-16880.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-265 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-265.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16904 vom 2025-10-02",
"url": "https://linux.oracle.com/errata/ELSA-2025-16904.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17398 vom 2025-10-06",
"url": "https://access.redhat.com/errata/RHSA-2025:17398"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17397 vom 2025-10-07",
"url": "https://access.redhat.com/errata/RHSA-2025:17397"
},
{
"category": "external",
"summary": "RedHat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2025:17398"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20649 vom 2025-10-07",
"url": "https://linux.oracle.com/errata/ELSA-2025-20649.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17397 vom 2025-10-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-17397.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16904 vom 2025-10-07",
"url": "https://errata.build.resf.org/RLSA-2025:16904"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16880 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:16880"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4328 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20663.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20662 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20662.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03602-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022908.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18932 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18932"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7834-1 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7834-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-1 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7835-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-3 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7835-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-2 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7835-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20719 vom 2025-10-24",
"url": "https://linux.oracle.com/errata/ELSA-2025-20719.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-282 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-282.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-279 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-279.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19105 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19105"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-281 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-281.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19106 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19106"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19104 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19104"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-280 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-280.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19106 vom 2025-10-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-19106.html"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2025-063 vom 2025-10-28",
"url": "https://cloud.google.com/support/bulletins#gcp-2025-063"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19105 vom 2025-10-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-19105.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19222 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19222"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19223 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19223"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19224 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19224"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7833-4 vom 2025-10-31",
"url": "https://ubuntu.com/security/notices/USN-7833-4"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19106 vom 2025-11-02",
"url": "https://errata.build.resf.org/RLSA-2025:19106"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19409 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19409"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-4 vom 2025-10-31",
"url": "https://ubuntu.com/security/notices/USN-7835-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19469 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19469"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19409 vom 2025-11-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-19409.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7856-1 vom 2025-11-04",
"url": "https://ubuntu.com/security/notices/USN-7856-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19469 vom 2025-11-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-19469.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19105 vom 2025-11-06",
"url": "https://errata.build.resf.org/RLSA-2025:19105"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19886 vom 2025-11-06",
"url": "https://access.redhat.com/errata/RHSA-2025:19886"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-5 vom 2025-11-06",
"url": "https://ubuntu.com/security/notices/USN-7835-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21051 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21051"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21091 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21091"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-25757.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21118 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21118"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21112 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21112"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21136 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21136"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-6 vom 2025-11-12",
"url": "https://ubuntu.com/security/notices/USN-7835-6"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21128 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21128"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7250971 vom 2025-11-12",
"url": "https://www.ibm.com/support/pages/node/7250971"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21398 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21398"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21397 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21397"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21469 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21469"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21667 vom 2025-11-18",
"url": "https://access.redhat.com/errata/RHSA-2025:21667"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21760 vom 2025-11-19",
"url": "https://access.redhat.com/errata/RHSA-2025:21760"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21398 vom 2025-11-19",
"url": "http://linux.oracle.com/errata/ELSA-2025-21398.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7880-1 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7880-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-2 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21917 vom 2025-11-24",
"url": "https://access.redhat.com/errata/RHSA-2025:21917"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-1 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21920 vom 2025-11-24",
"url": "https://access.redhat.com/errata/RHSA-2025:21920"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22006 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22006"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7887-1 vom 2025-11-24",
"url": "https://ubuntu.com/security/notices/USN-7887-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20518 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-20518-0.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21931 vom 2025-11-24",
"url": "https://access.redhat.com/errata/RHSA-2025:21931"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2025-11-24T23:00:00.000+00:00",
"generator": {
"date": "2025-11-25T09:14:45.613+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1988",
"initial_release_date": "2025-09-07T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian und Red Hat aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Amazon und Oracle Linux aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-14T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Amazon, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux, Google und Red Hat aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-02T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu, Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Dell, Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-11-05T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE, Red Hat, Ubuntu und IBM aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE, Red Hat, Ubuntu und Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "35"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Cloud Platform",
"product": {
"name": "Google Cloud Platform",
"product_id": "393401",
"product_identification_helper": {
"cpe": "cpe:/a:google:cloud_platform:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF01",
"product_id": "T048556"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF01",
"product_id": "T048556-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Linux Kernel \u003c6.6.96.2-1 on Linux 3.0",
"product": {
"name": "Microsoft Azure Linux Kernel \u003c6.6.96.2-1 on Linux 3.0",
"product_id": "T046805"
}
},
{
"category": "product_version",
"name": "Linux Kernel 6.6.96.2-1 on Linux 3.0",
"product": {
"name": "Microsoft Azure Linux Kernel 6.6.96.2-1 on Linux 3.0",
"product_id": "T046805-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:linux_kernel__6.6.96.2-1_on_linux_3.0"
}
}
}
],
"category": "product_name",
"name": "Azure"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T046484",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "T035008",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
},
{
"category": "product_version",
"name": "8",
"product": {
"name": "Red Hat Enterprise Linux 8",
"product_id": "T048848",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-38731",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38731"
},
{
"cve": "CVE-2025-38732",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38732"
},
{
"cve": "CVE-2025-38733",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38733"
},
{
"cve": "CVE-2025-38734",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38734"
},
{
"cve": "CVE-2025-38735",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38735"
},
{
"cve": "CVE-2025-38736",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38736"
},
{
"cve": "CVE-2025-38737",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38737"
},
{
"cve": "CVE-2025-39673",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39673"
},
{
"cve": "CVE-2025-39674",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39674"
},
{
"cve": "CVE-2025-39675",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39675"
},
{
"cve": "CVE-2025-39676",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39676"
},
{
"cve": "CVE-2025-39677",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39677"
},
{
"cve": "CVE-2025-39678",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39678"
},
{
"cve": "CVE-2025-39679",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39679"
},
{
"cve": "CVE-2025-39680",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39680"
},
{
"cve": "CVE-2025-39681",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39681"
},
{
"cve": "CVE-2025-39682",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39682"
},
{
"cve": "CVE-2025-39683",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39683"
},
{
"cve": "CVE-2025-39684",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39684"
},
{
"cve": "CVE-2025-39685",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39685"
},
{
"cve": "CVE-2025-39686",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39686"
},
{
"cve": "CVE-2025-39687",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39687"
},
{
"cve": "CVE-2025-39689",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39689"
},
{
"cve": "CVE-2025-39690",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39690"
},
{
"cve": "CVE-2025-39691",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39691"
},
{
"cve": "CVE-2025-39692",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39692"
},
{
"cve": "CVE-2025-39693",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39693"
},
{
"cve": "CVE-2025-39694",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39694"
},
{
"cve": "CVE-2025-39695",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39695"
},
{
"cve": "CVE-2025-39696",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39696"
},
{
"cve": "CVE-2025-39697",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39697"
},
{
"cve": "CVE-2025-39698",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39698"
},
{
"cve": "CVE-2025-39699",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39699"
},
{
"cve": "CVE-2025-39700",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39700"
},
{
"cve": "CVE-2025-39701",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39701"
},
{
"cve": "CVE-2025-39702",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39702"
},
{
"cve": "CVE-2025-39703",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39703"
},
{
"cve": "CVE-2025-39704",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39704"
},
{
"cve": "CVE-2025-39705",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39705"
},
{
"cve": "CVE-2025-39706",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39706"
},
{
"cve": "CVE-2025-39707",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39707"
},
{
"cve": "CVE-2025-39708",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39708"
},
{
"cve": "CVE-2025-39709",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39709"
},
{
"cve": "CVE-2025-39710",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39710"
},
{
"cve": "CVE-2025-39711",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39711"
},
{
"cve": "CVE-2025-39712",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39712"
},
{
"cve": "CVE-2025-39713",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39713"
},
{
"cve": "CVE-2025-39714",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39714"
},
{
"cve": "CVE-2025-39715",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39715"
},
{
"cve": "CVE-2025-39716",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39716"
},
{
"cve": "CVE-2025-39717",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39717"
},
{
"cve": "CVE-2025-39718",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39718"
},
{
"cve": "CVE-2025-39719",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39719"
},
{
"cve": "CVE-2025-39720",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39720"
},
{
"cve": "CVE-2025-39721",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39721"
},
{
"cve": "CVE-2025-39722",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39722"
},
{
"cve": "CVE-2025-39723",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39723"
},
{
"cve": "CVE-2025-39724",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39724"
},
{
"cve": "CVE-2025-39725",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39725"
},
{
"cve": "CVE-2025-39726",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39726"
},
{
"cve": "CVE-2025-39727",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39727"
},
{
"cve": "CVE-2025-39729",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39729"
},
{
"cve": "CVE-2025-39730",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39730"
},
{
"cve": "CVE-2025-39731",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39731"
},
{
"cve": "CVE-2025-39732",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39732"
},
{
"cve": "CVE-2025-39733",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39733"
},
{
"cve": "CVE-2025-39734",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39734"
}
]
}
fkie_cve-2025-39674
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.17 | |
| linux | linux_kernel | 6.17 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26A22BE8-0D22-4155-AED4-BB823BB934AB",
"versionEndExcluding": "6.16.4",
"versionStartIncluding": "6.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "327D22EF-390B-454C-BD31-2ED23C998A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C730CD9A-D969-4A8E-9522-162AAF7C0EE9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: ufs-qcom: Fix ESI null pointer dereference\n\nESI/MSI is a performance optimization feature that provides dedicated\ninterrupts per MCQ hardware queue. This is optional feature and UFS MCQ\nshould work with and without ESI feature.\n\nCommit e46a28cea29a (\"scsi: ufs: qcom: Remove the MSI descriptor abuse\")\nbrings a regression in ESI (Enhanced System Interrupt) configuration that\ncauses a null pointer dereference when Platform MSI allocation fails.\n\nThe issue occurs in when platform_device_msi_init_and_alloc_irqs() in\nufs_qcom_config_esi() fails (returns -EINVAL) but the current code uses\n__free() macro for automatic cleanup free MSI resources that were never\nsuccessfully allocated.\n\nUnable to handle kernel NULL pointer dereference at virtual\naddress 0000000000000008\n\n Call trace:\n mutex_lock+0xc/0x54 (P)\n platform_device_msi_free_irqs_all+0x1c/0x40\n ufs_qcom_config_esi+0x1d0/0x220 [ufs_qcom]\n ufshcd_config_mcq+0x28/0x104\n ufshcd_init+0xa3c/0xf40\n ufshcd_pltfrm_init+0x504/0x7d4\n ufs_qcom_probe+0x20/0x58 [ufs_qcom]\n\nFix by restructuring the ESI configuration to try MSI allocation first,\nbefore any other resource allocation and instead use explicit cleanup\ninstead of __free() macro to avoid cleanup of unallocated resources.\n\nTested on SM8750 platform with MCQ enabled, both with and without\nPlatform ESI support."
}
],
"id": "CVE-2025-39674",
"lastModified": "2025-11-25T21:28:05.853",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-09-05T18:15:43.387",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/6300d5c5438724c0876828da2f6e2c1a661871fc"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/aaf17a35a59572c8b29372883619c3dbb0ebb50a"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.