Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-40128 (GCVE-0-2025-40128)
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2025-11-13T17:37:15.477Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"rejectedReasons": [
{
"lang": "en",
"value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-40128",
"datePublished": "2025-11-12T10:23:21.061Z",
"dateRejected": "2025-11-13T17:37:15.477Z",
"dateReserved": "2025-04-16T07:20:57.169Z",
"dateUpdated": "2025-11-13T17:37:15.477Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-40128\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-11-12T11:15:42.407\",\"lastModified\":\"2025-11-13T18:15:50.410\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}],\"metrics\":{},\"references\":[]}}"
}
}
ghsa-7vqf-5393-q6gv
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix symbolic link reading when bs > ps
[BUG DURING BS > PS TEST] When running the following script on a btrfs whose block size is larger than page size, e.g. 8K block size and 4K page size, it will trigger a kernel BUG:
# mkfs.btrfs -s 8k $dev # mount $dev $mnt # mkdir $mnt/dir # ln -s dir $mnt/link # ls $mnt/link
The call trace looks like this:
BTRFS warning (device dm-2): support for block size 8192 with page size 4096 is experimental, some features may be missing BTRFS info (device dm-2): checking UUID tree BTRFS info (device dm-2): enabling ssd optimizations BTRFS info (device dm-2): enabling free space tree ------------[ cut here ]------------ kernel BUG at /home/adam/linux/include/linux/highmem.h:275! Oops: invalid opcode: 0000 [#1] SMP CPU: 8 UID: 0 PID: 667 Comm: ls Tainted: G OE 6.17.0-rc4-custom+ #283 PREEMPT(full) Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 02/02/2022 RIP: 0010:zero_user_segments.constprop.0+0xdc/0xe0 [btrfs] Call Trace: btrfs_get_extent.cold+0x85/0x101 [btrfs 7453c70c03e631c8d8bfdd4264fa62d3e238da6f] btrfs_do_readpage+0x244/0x750 [btrfs 7453c70c03e631c8d8bfdd4264fa62d3e238da6f] btrfs_read_folio+0x9c/0x100 [btrfs 7453c70c03e631c8d8bfdd4264fa62d3e238da6f] filemap_read_folio+0x37/0xe0 do_read_cache_folio+0x94/0x3e0 __page_get_link.isra.0+0x20/0x90 page_get_link+0x16/0x40 step_into+0x69b/0x830 path_lookupat+0xa7/0x170 filename_lookup+0xf7/0x200 ? set_ptes.isra.0+0x36/0x70 vfs_statx+0x7a/0x160 do_statx+0x63/0xa0 __x64_sys_statx+0x90/0xe0 do_syscall_64+0x82/0xae0 entry_SYSCALL_64_after_hwframe+0x4b/0x53
Please note bs > ps support is still under development and the enablement patch is not even in btrfs development branch.
[CAUSE] Btrfs reuses its data folio read path to handle symbolic links, as the symbolic link target is stored as an inline data extent.
But for newly created inodes, btrfs only set the minimal order if the target inode is a regular file.
Thus for above newly created symbolic link, it doesn't properly respect the minimal folio order, and triggered the above crash.
[FIX] Call btrfs_set_inode_mapping_order() unconditionally inside btrfs_create_new_inode().
For symbolic links this will fix the crash as now the folio will meet the minimal order.
For regular files this brings no change.
For directory/bdev/char and all the other types of inodes, they won't go through the data read path, thus no effect either.
{
"affected": [],
"aliases": [
"CVE-2025-40128"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-11-12T11:15:42Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix symbolic link reading when bs \u003e ps\n\n[BUG DURING BS \u003e PS TEST]\nWhen running the following script on a btrfs whose block size is larger\nthan page size, e.g. 8K block size and 4K page size, it will trigger a\nkernel BUG:\n\n # mkfs.btrfs -s 8k $dev\n # mount $dev $mnt\n # mkdir $mnt/dir\n # ln -s dir $mnt/link\n # ls $mnt/link\n\nThe call trace looks like this:\n\n BTRFS warning (device dm-2): support for block size 8192 with page size 4096 is experimental, some features may be missing\n BTRFS info (device dm-2): checking UUID tree\n BTRFS info (device dm-2): enabling ssd optimizations\n BTRFS info (device dm-2): enabling free space tree\n ------------[ cut here ]------------\n kernel BUG at /home/adam/linux/include/linux/highmem.h:275!\n Oops: invalid opcode: 0000 [#1] SMP\n CPU: 8 UID: 0 PID: 667 Comm: ls Tainted: G OE 6.17.0-rc4-custom+ #283 PREEMPT(full)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 02/02/2022\n RIP: 0010:zero_user_segments.constprop.0+0xdc/0xe0 [btrfs]\n Call Trace:\n \u003cTASK\u003e\n btrfs_get_extent.cold+0x85/0x101 [btrfs 7453c70c03e631c8d8bfdd4264fa62d3e238da6f]\n btrfs_do_readpage+0x244/0x750 [btrfs 7453c70c03e631c8d8bfdd4264fa62d3e238da6f]\n btrfs_read_folio+0x9c/0x100 [btrfs 7453c70c03e631c8d8bfdd4264fa62d3e238da6f]\n filemap_read_folio+0x37/0xe0\n do_read_cache_folio+0x94/0x3e0\n __page_get_link.isra.0+0x20/0x90\n page_get_link+0x16/0x40\n step_into+0x69b/0x830\n path_lookupat+0xa7/0x170\n filename_lookup+0xf7/0x200\n ? set_ptes.isra.0+0x36/0x70\n vfs_statx+0x7a/0x160\n do_statx+0x63/0xa0\n __x64_sys_statx+0x90/0xe0\n do_syscall_64+0x82/0xae0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n \u003c/TASK\u003e\n\nPlease note bs \u003e ps support is still under development and the\nenablement patch is not even in btrfs development branch.\n\n[CAUSE]\nBtrfs reuses its data folio read path to handle symbolic links, as the\nsymbolic link target is stored as an inline data extent.\n\nBut for newly created inodes, btrfs only set the minimal order if the\ntarget inode is a regular file.\n\nThus for above newly created symbolic link, it doesn\u0027t properly respect\nthe minimal folio order, and triggered the above crash.\n\n[FIX]\nCall btrfs_set_inode_mapping_order() unconditionally inside\nbtrfs_create_new_inode().\n\nFor symbolic links this will fix the crash as now the folio will meet\nthe minimal order.\n\nFor regular files this brings no change.\n\nFor directory/bdev/char and all the other types of inodes, they won\u0027t\ngo through the data read path, thus no effect either.",
"id": "GHSA-7vqf-5393-q6gv",
"modified": "2025-11-12T12:30:27Z",
"published": "2025-11-12T12:30:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40128"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/3ea252a5c48dd3a4e1f7d0c53d3b0f7b648becc9"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/67378b754608a3524d125bfa5744508a49fe48be"
}
],
"schema_version": "1.4.0",
"severity": []
}
fkie_cve-2025-40128
Vulnerability from fkie_nvd
| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"id": "CVE-2025-40128",
"lastModified": "2025-11-13T18:15:50.410",
"metrics": {},
"published": "2025-11-12T11:15:42.407",
"references": [],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Rejected"
}
wid-sec-w-2025-2579
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2579 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2579.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2579 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2579"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40112",
"url": "https://lore.kernel.org/linux-cve-announce/2025111249-CVE-2025-40112-5c8f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40113",
"url": "https://lore.kernel.org/linux-cve-announce/2025111251-CVE-2025-40113-ad3d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40115",
"url": "https://lore.kernel.org/linux-cve-announce/2025111251-CVE-2025-40115-6218@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40116",
"url": "https://lore.kernel.org/linux-cve-announce/2025111251-CVE-2025-40116-3942@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40118",
"url": "https://lore.kernel.org/linux-cve-announce/2025111252-CVE-2025-40118-19e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40119",
"url": "https://lore.kernel.org/linux-cve-announce/2025111252-CVE-2025-40119-41e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40120",
"url": "https://lore.kernel.org/linux-cve-announce/2025111252-CVE-2025-40120-8b68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40121",
"url": "https://lore.kernel.org/linux-cve-announce/2025111252-CVE-2025-40121-c2ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40122",
"url": "https://lore.kernel.org/linux-cve-announce/2025111252-CVE-2025-40122-6893@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40123",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40123-fcb1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40124",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40124-5006@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40125",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40125-cb33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40126",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40126-a667@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40127",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40127-361e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40128",
"url": "https://lore.kernel.org/linux-cve-announce/2025111253-CVE-2025-40128-2dd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40129",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40129-fbb4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40130",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40130-c057@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40131",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40131-1db8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40132",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40132-9d00@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40133",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40133-4d9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40134",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40134-4d24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40135",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40135-67ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40136",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40136-9c55@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40137",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40137-3047@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40138",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40138-e96d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40139",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40139-a030@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40140",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40140-ae1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40141",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40141-072e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40142",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40142-2655@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40143",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40143-a4ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40144",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40144-f4bd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40145",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40145-9b0c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40146",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40146-b919@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40147",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40147-0afa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40148",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40148-eef5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40149",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40149-2c48@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40150",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40150-0f36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40151",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40151-6cb9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40152",
"url": "https://lore.kernel.org/linux-cve-announce/2025111257-CVE-2025-40152-601f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40153",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40153-c820@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40154",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40154-fd98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40155",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40155-5247@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40156",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40156-3045@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40157",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40157-d08c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40158",
"url": "https://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40158-4c9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40159",
"url": "https://lore.kernel.org/linux-cve-announce/2025111239-CVE-2025-40159-fe53@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40160",
"url": "https://lore.kernel.org/linux-cve-announce/2025111239-CVE-2025-40160-b13a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40161",
"url": "https://lore.kernel.org/linux-cve-announce/2025111239-CVE-2025-40161-8d13@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40162",
"url": "https://lore.kernel.org/linux-cve-announce/2025111227-CVE-2025-40162-210b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40163",
"url": "https://lore.kernel.org/linux-cve-announce/2025111227-CVE-2025-40163-55e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40164",
"url": "https://lore.kernel.org/linux-cve-announce/2025111227-CVE-2025-40164-cbee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40165",
"url": "https://lore.kernel.org/linux-cve-announce/2025111227-CVE-2025-40165-872c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40166",
"url": "https://lore.kernel.org/linux-cve-announce/2025111228-CVE-2025-40166-07ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40167",
"url": "https://lore.kernel.org/linux-cve-announce/2025111228-CVE-2025-40167-184f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40168",
"url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40168-bdd5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40169",
"url": "https://lore.kernel.org/linux-cve-announce/2025111259-CVE-2025-40169-c29b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40170",
"url": "https://lore.kernel.org/linux-cve-announce/2025111259-CVE-2025-40170-d39d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40171",
"url": "https://lore.kernel.org/linux-cve-announce/2025111259-CVE-2025-40171-0cb5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40172",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40172-f3b8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40173",
"url": "https://lore.kernel.org/linux-cve-announce/2025111254-CVE-2025-40173-4a68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40174",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40174-b076@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40175",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40175-9dd0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40176",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40176-f2e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40177",
"url": "https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40177-8961@gregkh/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-2 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-1 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7887-1 vom 2025-11-24",
"url": "https://ubuntu.com/security/notices/USN-7887-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-24T23:00:00.000+00:00",
"generator": {
"date": "2025-11-25T08:43:02.851+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2579",
"initial_release_date": "2025-11-11T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-124924, EUVD-2025-124915, EUVD-2025-124941, EUVD-2025-124940, EUVD-2025-124907, EUVD-2025-124921, EUVD-2025-124939, EUVD-2025-124937, EUVD-2025-124936, EUVD-2025-124913, EUVD-2025-124968, EUVD-2025-124967, EUVD-2025-124966, EUVD-2025-124908, EUVD-2025-124922, EUVD-2025-124965, EUVD-2025-124926, EUVD-2025-124964, EUVD-2025-124963, EUVD-2025-124961, EUVD-2025-124960, EUVD-2025-124959, EUVD-2025-124909, EUVD-2025-124912, EUVD-2025-124928, EUVD-2025-124958, EUVD-2025-124917, EUVD-2025-124938, EUVD-2025-124962, EUVD-2025-124925, EUVD-2025-124911, EUVD-2025-124910, EUVD-2025-124929, EUVD-2025-124930, EUVD-2025-124931, EUVD-2025-124933, EUVD-2025-124942, EUVD-2025-124944, EUVD-2025-124949, EUVD-2025-124953, EUVD-2025-106789, EUVD-2025-124914, EUVD-2025-124923, EUVD-2025-124927, EUVD-2025-124932, EUVD-2025-124934, EUVD-2025-124935, EUVD-2025-124943, EUVD-2025-124945, EUVD-2025-124946, EUVD-2025-124947, EUVD-2025-124948, EUVD-2025-124950, EUVD-2025-124951, EUVD-2025-124952, EUVD-2025-124954, EUVD-2025-124955, EUVD-2025-124956, EUVD-2025-124957, EUVD-2025-124969, EUVD-2025-124970, EUVD-2025-124920, EUVD-2025-124919, EUVD-2025-106790, EUVD-2025-124918, EUVD-2025-124906, EUVD-2025-124916"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40110",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40112",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40112"
},
{
"cve": "CVE-2025-40113",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40113"
},
{
"cve": "CVE-2025-40115",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40117",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40117"
},
{
"cve": "CVE-2025-40118",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40119",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40119"
},
{
"cve": "CVE-2025-40120",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40122",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40122"
},
{
"cve": "CVE-2025-40123",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40123"
},
{
"cve": "CVE-2025-40124",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40124"
},
{
"cve": "CVE-2025-40125",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40125"
},
{
"cve": "CVE-2025-40126",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40126"
},
{
"cve": "CVE-2025-40127",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40128",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40128"
},
{
"cve": "CVE-2025-40129",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40130",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40130"
},
{
"cve": "CVE-2025-40131",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40131"
},
{
"cve": "CVE-2025-40132",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40136",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40136"
},
{
"cve": "CVE-2025-40137",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40137"
},
{
"cve": "CVE-2025-40138",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40138"
},
{
"cve": "CVE-2025-40139",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40143",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40143"
},
{
"cve": "CVE-2025-40144",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40144"
},
{
"cve": "CVE-2025-40145",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40145"
},
{
"cve": "CVE-2025-40146",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40146"
},
{
"cve": "CVE-2025-40147",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40147"
},
{
"cve": "CVE-2025-40148",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40148"
},
{
"cve": "CVE-2025-40149",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40150",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40150"
},
{
"cve": "CVE-2025-40151",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40151"
},
{
"cve": "CVE-2025-40152",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40152"
},
{
"cve": "CVE-2025-40153",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40155",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40155"
},
{
"cve": "CVE-2025-40156",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40160",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40160"
},
{
"cve": "CVE-2025-40161",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40163",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40163"
},
{
"cve": "CVE-2025-40164",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40167",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40167"
},
{
"cve": "CVE-2025-40168",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40170",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40170"
},
{
"cve": "CVE-2025-40171",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40174",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40174"
},
{
"cve": "CVE-2025-40175",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"product_status": {
"known_affected": [
"T028462",
"T000126"
]
},
"release_date": "2025-11-11T23:00:00.000+00:00",
"title": "CVE-2025-40177"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.