Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-39704 (GCVE-0-2025-39704)
Vulnerability from cvelistv5
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"arch/loongarch/kvm/intc/ipi.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "b5b49d341f90eed6de794b6ff34ad3dd66d34343",
"status": "affected",
"version": "daee2f9cae5510ba1bd9eed6b0cf0ca8dc276118",
"versionType": "git"
},
{
"lessThan": "5c68549c81bcca70fc464e305ffeefd9af968287",
"status": "affected",
"version": "daee2f9cae5510ba1bd9eed6b0cf0ca8dc276118",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"arch/loongarch/kvm/intc/ipi.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.13"
},
{
"lessThan": "6.13",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.16.*",
"status": "unaffected",
"version": "6.16.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.17",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.16.4",
"versionStartIncluding": "6.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.17",
"versionStartIncluding": "6.13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: KVM: Fix stack protector issue in send_ipi_data()\n\nFunction kvm_io_bus_read() is called in function send_ipi_data(), buffer\nsize of parameter *val should be at least 8 bytes. Since some emulation\nfunctions like loongarch_ipi_readl() and kvm_eiointc_read() will write\nthe buffer *val with 8 bytes signed extension regardless parameter len.\n\nOtherwise there will be buffer overflow issue when CONFIG_STACKPROTECTOR\nis enabled. The bug report is shown as follows:\n\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: send_ipi_data+0x194/0x1a0 [kvm]\nCPU: 11 UID: 107 PID: 2692 Comm: CPU 0/KVM Not tainted 6.17.0-rc1+ #102 PREEMPT(full)\nStack : 9000000005901568 0000000000000000 9000000003af371c 900000013c68c000\n 900000013c68f850 900000013c68f858 0000000000000000 900000013c68f998\n 900000013c68f990 900000013c68f990 900000013c68f6c0 fffffffffffdb058\n fffffffffffdb0e0 900000013c68f858 911e1d4d39cf0ec2 9000000105657a00\n 0000000000000001 fffffffffffffffe 0000000000000578 282049464555206e\n 6f73676e6f6f4c20 0000000000000001 00000000086b4000 0000000000000000\n 0000000000000000 0000000000000000 9000000005709968 90000000058f9000\n 900000013c68fa68 900000013c68fab4 90000000029279f0 900000010153f940\n 900000010001f360 0000000000000000 9000000003af3734 000000004390000c\n 00000000000000b0 0000000000000004 0000000000000000 0000000000071c1d\n ...\nCall Trace:\n[\u003c9000000003af3734\u003e] show_stack+0x5c/0x180\n[\u003c9000000003aed168\u003e] dump_stack_lvl+0x6c/0x9c\n[\u003c9000000003ad0ab0\u003e] vpanic+0x108/0x2c4\n[\u003c9000000003ad0ca8\u003e] panic+0x3c/0x40\n[\u003c9000000004eb0a1c\u003e] __stack_chk_fail+0x14/0x18\n[\u003cffff8000023473f8\u003e] send_ipi_data+0x190/0x1a0 [kvm]\n[\u003cffff8000023313e4\u003e] __kvm_io_bus_write+0xa4/0xe8 [kvm]\n[\u003cffff80000233147c\u003e] kvm_io_bus_write+0x54/0x90 [kvm]\n[\u003cffff80000233f9f8\u003e] kvm_emu_iocsr+0x180/0x310 [kvm]\n[\u003cffff80000233fe08\u003e] kvm_handle_gspr+0x280/0x478 [kvm]\n[\u003cffff8000023443e8\u003e] kvm_handle_exit+0xc0/0x130 [kvm]"
}
],
"providerMetadata": {
"dateUpdated": "2025-09-29T05:57:46.557Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/b5b49d341f90eed6de794b6ff34ad3dd66d34343"
},
{
"url": "https://git.kernel.org/stable/c/5c68549c81bcca70fc464e305ffeefd9af968287"
}
],
"title": "LoongArch: KVM: Fix stack protector issue in send_ipi_data()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-39704",
"datePublished": "2025-09-05T17:21:10.890Z",
"dateReserved": "2025-04-16T07:20:57.115Z",
"dateUpdated": "2025-09-29T05:57:46.557Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-39704\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-05T18:15:47.567\",\"lastModified\":\"2025-11-25T21:15:34.557\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nLoongArch: KVM: Fix stack protector issue in send_ipi_data()\\n\\nFunction kvm_io_bus_read() is called in function send_ipi_data(), buffer\\nsize of parameter *val should be at least 8 bytes. Since some emulation\\nfunctions like loongarch_ipi_readl() and kvm_eiointc_read() will write\\nthe buffer *val with 8 bytes signed extension regardless parameter len.\\n\\nOtherwise there will be buffer overflow issue when CONFIG_STACKPROTECTOR\\nis enabled. The bug report is shown as follows:\\n\\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: send_ipi_data+0x194/0x1a0 [kvm]\\nCPU: 11 UID: 107 PID: 2692 Comm: CPU 0/KVM Not tainted 6.17.0-rc1+ #102 PREEMPT(full)\\nStack : 9000000005901568 0000000000000000 9000000003af371c 900000013c68c000\\n 900000013c68f850 900000013c68f858 0000000000000000 900000013c68f998\\n 900000013c68f990 900000013c68f990 900000013c68f6c0 fffffffffffdb058\\n fffffffffffdb0e0 900000013c68f858 911e1d4d39cf0ec2 9000000105657a00\\n 0000000000000001 fffffffffffffffe 0000000000000578 282049464555206e\\n 6f73676e6f6f4c20 0000000000000001 00000000086b4000 0000000000000000\\n 0000000000000000 0000000000000000 9000000005709968 90000000058f9000\\n 900000013c68fa68 900000013c68fab4 90000000029279f0 900000010153f940\\n 900000010001f360 0000000000000000 9000000003af3734 000000004390000c\\n 00000000000000b0 0000000000000004 0000000000000000 0000000000071c1d\\n ...\\nCall Trace:\\n[\u003c9000000003af3734\u003e] show_stack+0x5c/0x180\\n[\u003c9000000003aed168\u003e] dump_stack_lvl+0x6c/0x9c\\n[\u003c9000000003ad0ab0\u003e] vpanic+0x108/0x2c4\\n[\u003c9000000003ad0ca8\u003e] panic+0x3c/0x40\\n[\u003c9000000004eb0a1c\u003e] __stack_chk_fail+0x14/0x18\\n[\u003cffff8000023473f8\u003e] send_ipi_data+0x190/0x1a0 [kvm]\\n[\u003cffff8000023313e4\u003e] __kvm_io_bus_write+0xa4/0xe8 [kvm]\\n[\u003cffff80000233147c\u003e] kvm_io_bus_write+0x54/0x90 [kvm]\\n[\u003cffff80000233f9f8\u003e] kvm_emu_iocsr+0x180/0x310 [kvm]\\n[\u003cffff80000233fe08\u003e] kvm_handle_gspr+0x280/0x478 [kvm]\\n[\u003cffff8000023443e8\u003e] kvm_handle_exit+0xc0/0x130 [kvm]\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-674\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.13\",\"versionEndExcluding\":\"6.16.4\",\"matchCriteriaId\":\"AFC28995-B8C3-4B68-8CB6-78E792B6629D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"327D22EF-390B-454C-BD31-2ED23C998A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C730CD9A-D969-4A8E-9522-162AAF7C0EE9\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/5c68549c81bcca70fc464e305ffeefd9af968287\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b5b49d341f90eed6de794b6ff34ad3dd66d34343\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
fkie_cve-2025-39704
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.17 | |
| linux | linux_kernel | 6.17 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFC28995-B8C3-4B68-8CB6-78E792B6629D",
"versionEndExcluding": "6.16.4",
"versionStartIncluding": "6.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "327D22EF-390B-454C-BD31-2ED23C998A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C730CD9A-D969-4A8E-9522-162AAF7C0EE9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: KVM: Fix stack protector issue in send_ipi_data()\n\nFunction kvm_io_bus_read() is called in function send_ipi_data(), buffer\nsize of parameter *val should be at least 8 bytes. Since some emulation\nfunctions like loongarch_ipi_readl() and kvm_eiointc_read() will write\nthe buffer *val with 8 bytes signed extension regardless parameter len.\n\nOtherwise there will be buffer overflow issue when CONFIG_STACKPROTECTOR\nis enabled. The bug report is shown as follows:\n\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: send_ipi_data+0x194/0x1a0 [kvm]\nCPU: 11 UID: 107 PID: 2692 Comm: CPU 0/KVM Not tainted 6.17.0-rc1+ #102 PREEMPT(full)\nStack : 9000000005901568 0000000000000000 9000000003af371c 900000013c68c000\n 900000013c68f850 900000013c68f858 0000000000000000 900000013c68f998\n 900000013c68f990 900000013c68f990 900000013c68f6c0 fffffffffffdb058\n fffffffffffdb0e0 900000013c68f858 911e1d4d39cf0ec2 9000000105657a00\n 0000000000000001 fffffffffffffffe 0000000000000578 282049464555206e\n 6f73676e6f6f4c20 0000000000000001 00000000086b4000 0000000000000000\n 0000000000000000 0000000000000000 9000000005709968 90000000058f9000\n 900000013c68fa68 900000013c68fab4 90000000029279f0 900000010153f940\n 900000010001f360 0000000000000000 9000000003af3734 000000004390000c\n 00000000000000b0 0000000000000004 0000000000000000 0000000000071c1d\n ...\nCall Trace:\n[\u003c9000000003af3734\u003e] show_stack+0x5c/0x180\n[\u003c9000000003aed168\u003e] dump_stack_lvl+0x6c/0x9c\n[\u003c9000000003ad0ab0\u003e] vpanic+0x108/0x2c4\n[\u003c9000000003ad0ca8\u003e] panic+0x3c/0x40\n[\u003c9000000004eb0a1c\u003e] __stack_chk_fail+0x14/0x18\n[\u003cffff8000023473f8\u003e] send_ipi_data+0x190/0x1a0 [kvm]\n[\u003cffff8000023313e4\u003e] __kvm_io_bus_write+0xa4/0xe8 [kvm]\n[\u003cffff80000233147c\u003e] kvm_io_bus_write+0x54/0x90 [kvm]\n[\u003cffff80000233f9f8\u003e] kvm_emu_iocsr+0x180/0x310 [kvm]\n[\u003cffff80000233fe08\u003e] kvm_handle_gspr+0x280/0x478 [kvm]\n[\u003cffff8000023443e8\u003e] kvm_handle_exit+0xc0/0x130 [kvm]"
}
],
"id": "CVE-2025-39704",
"lastModified": "2025-11-25T21:15:34.557",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-09-05T18:15:47.567",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/5c68549c81bcca70fc464e305ffeefd9af968287"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/b5b49d341f90eed6de794b6ff34ad3dd66d34343"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-674"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ghsa-g766-4vg6-3q5q
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: KVM: Fix stack protector issue in send_ipi_data()
Function kvm_io_bus_read() is called in function send_ipi_data(), buffer size of parameter val should be at least 8 bytes. Since some emulation functions like loongarch_ipi_readl() and kvm_eiointc_read() will write the buffer val with 8 bytes signed extension regardless parameter len.
Otherwise there will be buffer overflow issue when CONFIG_STACKPROTECTOR is enabled. The bug report is shown as follows:
Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: send_ipi_data+0x194/0x1a0 [kvm] CPU: 11 UID: 107 PID: 2692 Comm: CPU 0/KVM Not tainted 6.17.0-rc1+ #102 PREEMPT(full) Stack : 9000000005901568 0000000000000000 9000000003af371c 900000013c68c000 900000013c68f850 900000013c68f858 0000000000000000 900000013c68f998 900000013c68f990 900000013c68f990 900000013c68f6c0 fffffffffffdb058 fffffffffffdb0e0 900000013c68f858 911e1d4d39cf0ec2 9000000105657a00 0000000000000001 fffffffffffffffe 0000000000000578 282049464555206e 6f73676e6f6f4c20 0000000000000001 00000000086b4000 0000000000000000 0000000000000000 0000000000000000 9000000005709968 90000000058f9000 900000013c68fa68 900000013c68fab4 90000000029279f0 900000010153f940 900000010001f360 0000000000000000 9000000003af3734 000000004390000c 00000000000000b0 0000000000000004 0000000000000000 0000000000071c1d ... Call Trace: [<9000000003af3734>] show_stack+0x5c/0x180 [<9000000003aed168>] dump_stack_lvl+0x6c/0x9c [<9000000003ad0ab0>] vpanic+0x108/0x2c4 [<9000000003ad0ca8>] panic+0x3c/0x40 [<9000000004eb0a1c>] __stack_chk_fail+0x14/0x18 [] send_ipi_data+0x190/0x1a0 [kvm] [] __kvm_io_bus_write+0xa4/0xe8 [kvm] [] kvm_io_bus_write+0x54/0x90 [kvm] [] kvm_emu_iocsr+0x180/0x310 [kvm] [] kvm_handle_gspr+0x280/0x478 [kvm] [] kvm_handle_exit+0xc0/0x130 [kvm]
{
"affected": [],
"aliases": [
"CVE-2025-39704"
],
"database_specific": {
"cwe_ids": [
"CWE-674"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-05T18:15:47Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: KVM: Fix stack protector issue in send_ipi_data()\n\nFunction kvm_io_bus_read() is called in function send_ipi_data(), buffer\nsize of parameter *val should be at least 8 bytes. Since some emulation\nfunctions like loongarch_ipi_readl() and kvm_eiointc_read() will write\nthe buffer *val with 8 bytes signed extension regardless parameter len.\n\nOtherwise there will be buffer overflow issue when CONFIG_STACKPROTECTOR\nis enabled. The bug report is shown as follows:\n\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: send_ipi_data+0x194/0x1a0 [kvm]\nCPU: 11 UID: 107 PID: 2692 Comm: CPU 0/KVM Not tainted 6.17.0-rc1+ #102 PREEMPT(full)\nStack : 9000000005901568 0000000000000000 9000000003af371c 900000013c68c000\n 900000013c68f850 900000013c68f858 0000000000000000 900000013c68f998\n 900000013c68f990 900000013c68f990 900000013c68f6c0 fffffffffffdb058\n fffffffffffdb0e0 900000013c68f858 911e1d4d39cf0ec2 9000000105657a00\n 0000000000000001 fffffffffffffffe 0000000000000578 282049464555206e\n 6f73676e6f6f4c20 0000000000000001 00000000086b4000 0000000000000000\n 0000000000000000 0000000000000000 9000000005709968 90000000058f9000\n 900000013c68fa68 900000013c68fab4 90000000029279f0 900000010153f940\n 900000010001f360 0000000000000000 9000000003af3734 000000004390000c\n 00000000000000b0 0000000000000004 0000000000000000 0000000000071c1d\n ...\nCall Trace:\n[\u003c9000000003af3734\u003e] show_stack+0x5c/0x180\n[\u003c9000000003aed168\u003e] dump_stack_lvl+0x6c/0x9c\n[\u003c9000000003ad0ab0\u003e] vpanic+0x108/0x2c4\n[\u003c9000000003ad0ca8\u003e] panic+0x3c/0x40\n[\u003c9000000004eb0a1c\u003e] __stack_chk_fail+0x14/0x18\n[\u003cffff8000023473f8\u003e] send_ipi_data+0x190/0x1a0 [kvm]\n[\u003cffff8000023313e4\u003e] __kvm_io_bus_write+0xa4/0xe8 [kvm]\n[\u003cffff80000233147c\u003e] kvm_io_bus_write+0x54/0x90 [kvm]\n[\u003cffff80000233f9f8\u003e] kvm_emu_iocsr+0x180/0x310 [kvm]\n[\u003cffff80000233fe08\u003e] kvm_handle_gspr+0x280/0x478 [kvm]\n[\u003cffff8000023443e8\u003e] kvm_handle_exit+0xc0/0x130 [kvm]",
"id": "GHSA-g766-4vg6-3q5q",
"modified": "2025-11-25T21:32:04Z",
"published": "2025-09-05T18:31:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-39704"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/5c68549c81bcca70fc464e305ffeefd9af968287"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/b5b49d341f90eed6de794b6ff34ad3dd66d34343"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
wid-sec-w-2025-1988
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht n\u00e4her spezifizierte Auswirkungen zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1988 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1988.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1988 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1988"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38731",
"url": "https://lore.kernel.org/linux-cve-announce/2025090541-CVE-2025-38731-9537@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38732",
"url": "https://lore.kernel.org/linux-cve-announce/2025090543-CVE-2025-38732-f9e4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38733",
"url": "https://lore.kernel.org/linux-cve-announce/2025090543-CVE-2025-38733-65a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38734",
"url": "https://lore.kernel.org/linux-cve-announce/2025090543-CVE-2025-38734-a75f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38735",
"url": "https://lore.kernel.org/linux-cve-announce/2025090543-CVE-2025-38735-3fae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38736",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-38736-b74b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38737",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-38737-4cde@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39673",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-39673-61bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39674",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-39674-6377@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39675",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-39675-bd21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39676",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-39676-9725@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39677",
"url": "https://lore.kernel.org/linux-cve-announce/2025090544-CVE-2025-39677-5733@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39678",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39678-d4ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39679",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39679-4b4a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39680",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39680-9d9a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39681",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39681-ac80@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39682",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39682-ddab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39683",
"url": "https://lore.kernel.org/linux-cve-announce/2025090545-CVE-2025-39683-fb08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39684",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39684-fcce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39685",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39685-ddff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39686",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39686-afb8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39687",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39687-538e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39689",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39689-f538@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39690",
"url": "https://lore.kernel.org/linux-cve-announce/2025090546-CVE-2025-39690-a303@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39691",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39691-c878@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39692",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39692-7452@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39693",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39693-dcbb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39694",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39694-de23@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39695",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39695-1126@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39696",
"url": "https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39696-ab35@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39697",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39697-5284@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39698",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39698-41e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39699",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39699-4d8c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39700",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39700-a0ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39701",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39701-ce5e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39702",
"url": "https://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39702-cb30@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39703",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39703-b03b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39704",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39704-f9b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39705",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39705-6ac5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39706",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39706-087c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39707",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39707-c905@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39708",
"url": "https://lore.kernel.org/linux-cve-announce/2025090549-CVE-2025-39708-a174@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39709",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39709-67cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39710",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39710-198c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39711",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39711-5512@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39712",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39712-6910@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39713",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39713-ec93@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39714",
"url": "https://lore.kernel.org/linux-cve-announce/2025090550-CVE-2025-39714-1820@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39715",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39715-6248@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39716",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39716-7e3c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39717",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39717-9e8a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39718",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39718-2e2c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39719",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39719-825e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39720",
"url": "https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39720-3cbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39721",
"url": "https://lore.kernel.org/linux-cve-announce/2025090552-CVE-2025-39721-0b5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39722",
"url": "https://lore.kernel.org/linux-cve-announce/2025090552-CVE-2025-39722-db08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39723",
"url": "https://lore.kernel.org/linux-cve-announce/2025090552-CVE-2025-39723-0daf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39724",
"url": "https://lore.kernel.org/linux-cve-announce/2025090552-CVE-2025-39724-7097@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39725",
"url": "https://lore.kernel.org/linux-cve-announce/2025090522-CVE-2025-39725-7881@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39726",
"url": "https://lore.kernel.org/linux-cve-announce/2025090522-CVE-2025-39726-8934@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39727",
"url": "https://lore.kernel.org/linux-cve-announce/2025090728-CVE-2025-39727-b07c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39729",
"url": "https://lore.kernel.org/linux-cve-announce/2025090730-CVE-2025-39729-14c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39730",
"url": "https://lore.kernel.org/linux-cve-announce/2025090730-CVE-2025-39730-72c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39731",
"url": "https://lore.kernel.org/linux-cve-announce/2025090730-CVE-2025-39731-34d6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39732",
"url": "https://lore.kernel.org/linux-cve-announce/2025090730-CVE-2025-39732-4c7f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39733",
"url": "https://lore.kernel.org/linux-cve-announce/2025090730-CVE-2025-39733-0de4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-39734",
"url": "https://lore.kernel.org/linux-cve-announce/2025090731-CVE-2025-39734-efa5@gregkh/"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2025-09-09",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6008 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16398 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16398"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6009 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20608 vom 2025-09-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-20608.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16398 vom 2025-09-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-16398.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16904 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16904"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16880 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16880"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-091 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-091.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-266 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-266.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-267 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-267.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-110 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-110.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-268 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-268.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3013 vom 2025-09-29",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3013.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-269 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-269.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-270 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-270.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-105 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-105.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16880 vom 2025-09-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-16880.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-265 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-265.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16904 vom 2025-10-02",
"url": "https://linux.oracle.com/errata/ELSA-2025-16904.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17398 vom 2025-10-06",
"url": "https://access.redhat.com/errata/RHSA-2025:17398"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17397 vom 2025-10-07",
"url": "https://access.redhat.com/errata/RHSA-2025:17397"
},
{
"category": "external",
"summary": "RedHat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2025:17398"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20649 vom 2025-10-07",
"url": "https://linux.oracle.com/errata/ELSA-2025-20649.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17397 vom 2025-10-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-17397.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16904 vom 2025-10-07",
"url": "https://errata.build.resf.org/RLSA-2025:16904"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16880 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:16880"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4328 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20663.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20662 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20662.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03602-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022908.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18932 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18932"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7834-1 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7834-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-1 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7835-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-3 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7835-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-2 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7835-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20719 vom 2025-10-24",
"url": "https://linux.oracle.com/errata/ELSA-2025-20719.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-282 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-282.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-279 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-279.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19105 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19105"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-281 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-281.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19106 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19106"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19104 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19104"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-280 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-280.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19106 vom 2025-10-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-19106.html"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2025-063 vom 2025-10-28",
"url": "https://cloud.google.com/support/bulletins#gcp-2025-063"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19105 vom 2025-10-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-19105.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19222 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19222"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19223 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19223"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19224 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19224"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7833-4 vom 2025-10-31",
"url": "https://ubuntu.com/security/notices/USN-7833-4"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19106 vom 2025-11-02",
"url": "https://errata.build.resf.org/RLSA-2025:19106"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19409 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19409"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-4 vom 2025-10-31",
"url": "https://ubuntu.com/security/notices/USN-7835-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19469 vom 2025-11-03",
"url": "https://access.redhat.com/errata/RHSA-2025:19469"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19409 vom 2025-11-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-19409.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7856-1 vom 2025-11-04",
"url": "https://ubuntu.com/security/notices/USN-7856-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-19469 vom 2025-11-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-19469.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:19105 vom 2025-11-06",
"url": "https://errata.build.resf.org/RLSA-2025:19105"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19886 vom 2025-11-06",
"url": "https://access.redhat.com/errata/RHSA-2025:19886"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-5 vom 2025-11-06",
"url": "https://ubuntu.com/security/notices/USN-7835-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21051 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21051"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21091 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21091"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-25757.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21118 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21118"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21112 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21112"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21136 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21136"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7835-6 vom 2025-11-12",
"url": "https://ubuntu.com/security/notices/USN-7835-6"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21128 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21128"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7250971 vom 2025-11-12",
"url": "https://www.ibm.com/support/pages/node/7250971"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21398 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21398"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21397 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21397"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21469 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21469"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21667 vom 2025-11-18",
"url": "https://access.redhat.com/errata/RHSA-2025:21667"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21760 vom 2025-11-19",
"url": "https://access.redhat.com/errata/RHSA-2025:21760"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21398 vom 2025-11-19",
"url": "http://linux.oracle.com/errata/ELSA-2025-21398.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7880-1 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7880-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-2 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21917 vom 2025-11-24",
"url": "https://access.redhat.com/errata/RHSA-2025:21917"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-1 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21920 vom 2025-11-24",
"url": "https://access.redhat.com/errata/RHSA-2025:21920"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22006 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22006"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7887-1 vom 2025-11-24",
"url": "https://ubuntu.com/security/notices/USN-7887-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20518 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-20518-0.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21931 vom 2025-11-24",
"url": "https://access.redhat.com/errata/RHSA-2025:21931"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21917 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-21917.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-3 vom 2025-11-26",
"url": "https://ubuntu.com/security/notices/USN-7879-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22095 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22095"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7887-2 vom 2025-11-25",
"url": "https://ubuntu.com/security/notices/USN-7887-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22124 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22124"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21926 vom 2025-11-26",
"url": "http://linux.oracle.com/errata/ELSA-2025-21926.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20091-1 vom 2025-11-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVNKE6YBHUN7AVUHO7UZCJJGK4HYS62H/"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:21917 vom 2025-11-27",
"url": "https://errata.build.resf.org/RLSA-2025:21917"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:21920 vom 2025-11-27",
"url": "https://errata.build.resf.org/RLSA-2025:21920"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21469 vom 2025-11-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-21469.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21112 vom 2025-11-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-21112.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21052-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023389.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21040-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21056-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21064-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:21931 vom 2025-11-28",
"url": "https://errata.build.resf.org/RLSA-2025:21931"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21074-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4301-1 vom 2025-11-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLIMXFMWOGTFRJZEC4XPGIMNBCRKQ7IF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21080-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21118 vom 2025-12-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-21118.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-2 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7910-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7910-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21463 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21463.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22752 vom 2025-12-04",
"url": "https://access.redhat.com/errata/RHSA-2025:22752"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-4 vom 2025-12-05",
"url": "https://ubuntu.com/security/notices/USN-7909-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21931 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21931.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22854 vom 2025-12-08",
"url": "https://access.redhat.com/errata/RHSA-2025:22854"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22854 vom 2025-12-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-22854.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23009 vom 2025-12-10",
"url": "https://access.redhat.com/errata/RHSA-2025:23009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22998 vom 2025-12-10",
"url": "https://access.redhat.com/errata/RHSA-2025:22998"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21147-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21180-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22854 vom 2025-12-14",
"url": "https://errata.build.resf.org/RLSA-2025:22854"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7934-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7934-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7933-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7933-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-5 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7909-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7938-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7938-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2025-12-16T23:00:00.000+00:00",
"generator": {
"date": "2025-12-17T09:45:32.592+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1988",
"initial_release_date": "2025-09-07T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian und Red Hat aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Amazon und Oracle Linux aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-14T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Amazon, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux, Google und Red Hat aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-02T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu, Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Dell, Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-11-05T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE, Red Hat, Ubuntu und IBM aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE, Red Hat, Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu, Red Hat und openSUSE aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-12-09T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "48"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Cloud Platform",
"product": {
"name": "Google Cloud Platform",
"product_id": "393401",
"product_identification_helper": {
"cpe": "cpe:/a:google:cloud_platform:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF01",
"product_id": "T048556"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF01",
"product_id": "T048556-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Linux Kernel \u003c6.6.96.2-1 on Linux 3.0",
"product": {
"name": "Microsoft Azure Linux Kernel \u003c6.6.96.2-1 on Linux 3.0",
"product_id": "T046805"
}
},
{
"category": "product_version",
"name": "Linux Kernel 6.6.96.2-1 on Linux 3.0",
"product": {
"name": "Microsoft Azure Linux Kernel 6.6.96.2-1 on Linux 3.0",
"product_id": "T046805-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:linux_kernel__6.6.96.2-1_on_linux_3.0"
}
}
}
],
"category": "product_name",
"name": "Azure"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T046484",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "T035008",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
},
{
"category": "product_version",
"name": "8",
"product": {
"name": "Red Hat Enterprise Linux 8",
"product_id": "T048848",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-38731",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38731"
},
{
"cve": "CVE-2025-38732",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38732"
},
{
"cve": "CVE-2025-38733",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38733"
},
{
"cve": "CVE-2025-38734",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38734"
},
{
"cve": "CVE-2025-38735",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38735"
},
{
"cve": "CVE-2025-38736",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38736"
},
{
"cve": "CVE-2025-38737",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-38737"
},
{
"cve": "CVE-2025-39673",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39673"
},
{
"cve": "CVE-2025-39674",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39674"
},
{
"cve": "CVE-2025-39675",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39675"
},
{
"cve": "CVE-2025-39676",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39676"
},
{
"cve": "CVE-2025-39677",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39677"
},
{
"cve": "CVE-2025-39678",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39678"
},
{
"cve": "CVE-2025-39679",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39679"
},
{
"cve": "CVE-2025-39680",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39680"
},
{
"cve": "CVE-2025-39681",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39681"
},
{
"cve": "CVE-2025-39682",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39682"
},
{
"cve": "CVE-2025-39683",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39683"
},
{
"cve": "CVE-2025-39684",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39684"
},
{
"cve": "CVE-2025-39685",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39685"
},
{
"cve": "CVE-2025-39686",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39686"
},
{
"cve": "CVE-2025-39687",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39687"
},
{
"cve": "CVE-2025-39689",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39689"
},
{
"cve": "CVE-2025-39690",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39690"
},
{
"cve": "CVE-2025-39691",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39691"
},
{
"cve": "CVE-2025-39692",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39692"
},
{
"cve": "CVE-2025-39693",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39693"
},
{
"cve": "CVE-2025-39694",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39694"
},
{
"cve": "CVE-2025-39695",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39695"
},
{
"cve": "CVE-2025-39696",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39696"
},
{
"cve": "CVE-2025-39697",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39697"
},
{
"cve": "CVE-2025-39698",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39698"
},
{
"cve": "CVE-2025-39699",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39699"
},
{
"cve": "CVE-2025-39700",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39700"
},
{
"cve": "CVE-2025-39701",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39701"
},
{
"cve": "CVE-2025-39702",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39702"
},
{
"cve": "CVE-2025-39703",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39703"
},
{
"cve": "CVE-2025-39704",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39704"
},
{
"cve": "CVE-2025-39705",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39705"
},
{
"cve": "CVE-2025-39706",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39706"
},
{
"cve": "CVE-2025-39707",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39707"
},
{
"cve": "CVE-2025-39708",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39708"
},
{
"cve": "CVE-2025-39709",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39709"
},
{
"cve": "CVE-2025-39710",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39710"
},
{
"cve": "CVE-2025-39711",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39711"
},
{
"cve": "CVE-2025-39712",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39712"
},
{
"cve": "CVE-2025-39713",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39713"
},
{
"cve": "CVE-2025-39714",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39714"
},
{
"cve": "CVE-2025-39715",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39715"
},
{
"cve": "CVE-2025-39716",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39716"
},
{
"cve": "CVE-2025-39717",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39717"
},
{
"cve": "CVE-2025-39718",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39718"
},
{
"cve": "CVE-2025-39719",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39719"
},
{
"cve": "CVE-2025-39720",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39720"
},
{
"cve": "CVE-2025-39721",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39721"
},
{
"cve": "CVE-2025-39722",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39722"
},
{
"cve": "CVE-2025-39723",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39723"
},
{
"cve": "CVE-2025-39724",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39724"
},
{
"cve": "CVE-2025-39725",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39725"
},
{
"cve": "CVE-2025-39726",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39726"
},
{
"cve": "CVE-2025-39727",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39727"
},
{
"cve": "CVE-2025-39729",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39729"
},
{
"cve": "CVE-2025-39730",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39730"
},
{
"cve": "CVE-2025-39731",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39731"
},
{
"cve": "CVE-2025-39732",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39732"
},
{
"cve": "CVE-2025-39733",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39733"
},
{
"cve": "CVE-2025-39734",
"product_status": {
"known_affected": [
"T035008",
"67646",
"393401",
"T004914",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T048848",
"T027843",
"T046484",
"398363",
"T048556",
"T048301"
]
},
"release_date": "2025-09-07T22:00:00.000+00:00",
"title": "CVE-2025-39734"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.