Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-38720 (GCVE-0-2025-38720)
Vulnerability from cvelistv5 – Published: 2025-09-04 15:33 – Updated: 2025-09-29 05:56| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
3f5a61f6d504f55ed1a36cce044d5123d508721f , < d85a6346fd6f595c4914205762d0cdf35c004a5e
(git)
Affected: 3f5a61f6d504f55ed1a36cce044d5123d508721f , < 1343a8994ca7dba78f5dd818e89d68331c21c35d (git) Affected: 3f5a61f6d504f55ed1a36cce044d5123d508721f , < c875503a9b9082928d7d3fc60b5400d16fbfae4e (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/hisilicon/hibmcge/hbg_err.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "d85a6346fd6f595c4914205762d0cdf35c004a5e",
"status": "affected",
"version": "3f5a61f6d504f55ed1a36cce044d5123d508721f",
"versionType": "git"
},
{
"lessThan": "1343a8994ca7dba78f5dd818e89d68331c21c35d",
"status": "affected",
"version": "3f5a61f6d504f55ed1a36cce044d5123d508721f",
"versionType": "git"
},
{
"lessThan": "c875503a9b9082928d7d3fc60b5400d16fbfae4e",
"status": "affected",
"version": "3f5a61f6d504f55ed1a36cce044d5123d508721f",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/hisilicon/hibmcge/hbg_err.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.14"
},
{
"lessThan": "6.14",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.15.*",
"status": "unaffected",
"version": "6.15.11",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.16.*",
"status": "unaffected",
"version": "6.16.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.17",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.15.11",
"versionStartIncluding": "6.14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.16.2",
"versionStartIncluding": "6.14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.17",
"versionStartIncluding": "6.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hibmcge: fix rtnl deadlock issue\n\nCurrently, the hibmcge netdev acquires the rtnl_lock in\npci_error_handlers.reset_prepare() and releases it in\npci_error_handlers.reset_done().\n\nHowever, in the PCI framework:\npci_reset_bus - __pci_reset_slot - pci_slot_save_and_disable_locked -\n pci_dev_save_and_disable - err_handler-\u003ereset_prepare(dev);\n\nIn pci_slot_save_and_disable_locked():\n\tlist_for_each_entry(dev, \u0026slot-\u003ebus-\u003edevices, bus_list) {\n\t\tif (!dev-\u003eslot || dev-\u003eslot!= slot)\n\t\t\tcontinue;\n\t\tpci_dev_save_and_disable(dev);\n\t\tif (dev-\u003esubordinate)\n\t\t\tpci_bus_save_and_disable_locked(dev-\u003esubordinate);\n\t}\n\nThis will iterate through all devices under the current bus and execute\nerr_handler-\u003ereset_prepare(), causing two devices of the hibmcge driver\nto sequentially request the rtnl_lock, leading to a deadlock.\n\nSince the driver now executes netif_device_detach()\nbefore the reset process, it will not concurrently with\nother netdev APIs, so there is no need to hold the rtnl_lock now.\n\nTherefore, this patch removes the rtnl_lock during the reset process and\nadjusts the position of HBG_NIC_STATE_RESETTING to ensure\nthat multiple resets are not executed concurrently."
}
],
"providerMetadata": {
"dateUpdated": "2025-09-29T05:56:44.628Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/d85a6346fd6f595c4914205762d0cdf35c004a5e"
},
{
"url": "https://git.kernel.org/stable/c/1343a8994ca7dba78f5dd818e89d68331c21c35d"
},
{
"url": "https://git.kernel.org/stable/c/c875503a9b9082928d7d3fc60b5400d16fbfae4e"
}
],
"title": "net: hibmcge: fix rtnl deadlock issue",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-38720",
"datePublished": "2025-09-04T15:33:14.057Z",
"dateReserved": "2025-04-16T04:51:24.033Z",
"dateUpdated": "2025-09-29T05:56:44.628Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-38720\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-04T16:15:41.710\",\"lastModified\":\"2025-11-25T21:47:46.150\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: hibmcge: fix rtnl deadlock issue\\n\\nCurrently, the hibmcge netdev acquires the rtnl_lock in\\npci_error_handlers.reset_prepare() and releases it in\\npci_error_handlers.reset_done().\\n\\nHowever, in the PCI framework:\\npci_reset_bus - __pci_reset_slot - pci_slot_save_and_disable_locked -\\n pci_dev_save_and_disable - err_handler-\u003ereset_prepare(dev);\\n\\nIn pci_slot_save_and_disable_locked():\\n\\tlist_for_each_entry(dev, \u0026slot-\u003ebus-\u003edevices, bus_list) {\\n\\t\\tif (!dev-\u003eslot || dev-\u003eslot!= slot)\\n\\t\\t\\tcontinue;\\n\\t\\tpci_dev_save_and_disable(dev);\\n\\t\\tif (dev-\u003esubordinate)\\n\\t\\t\\tpci_bus_save_and_disable_locked(dev-\u003esubordinate);\\n\\t}\\n\\nThis will iterate through all devices under the current bus and execute\\nerr_handler-\u003ereset_prepare(), causing two devices of the hibmcge driver\\nto sequentially request the rtnl_lock, leading to a deadlock.\\n\\nSince the driver now executes netif_device_detach()\\nbefore the reset process, it will not concurrently with\\nother netdev APIs, so there is no need to hold the rtnl_lock now.\\n\\nTherefore, this patch removes the rtnl_lock during the reset process and\\nadjusts the position of HBG_NIC_STATE_RESETTING to ensure\\nthat multiple resets are not executed concurrently.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.14\",\"versionEndExcluding\":\"6.15.11\",\"matchCriteriaId\":\"6AB72A20-0D99-4FED-888D-A5B7CC969A64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.16\",\"versionEndExcluding\":\"6.16.2\",\"matchCriteriaId\":\"BD7C087D-2415-4521-B624-30003352F899\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"327D22EF-390B-454C-BD31-2ED23C998A1C\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1343a8994ca7dba78f5dd818e89d68331c21c35d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c875503a9b9082928d7d3fc60b5400d16fbfae4e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d85a6346fd6f595c4914205762d0cdf35c004a5e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
FKIE_CVE-2025-38720
Vulnerability from fkie_nvd - Published: 2025-09-04 16:15 - Updated: 2025-11-25 21:47| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.17 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6AB72A20-0D99-4FED-888D-A5B7CC969A64",
"versionEndExcluding": "6.15.11",
"versionStartIncluding": "6.14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BD7C087D-2415-4521-B624-30003352F899",
"versionEndExcluding": "6.16.2",
"versionStartIncluding": "6.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "327D22EF-390B-454C-BD31-2ED23C998A1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hibmcge: fix rtnl deadlock issue\n\nCurrently, the hibmcge netdev acquires the rtnl_lock in\npci_error_handlers.reset_prepare() and releases it in\npci_error_handlers.reset_done().\n\nHowever, in the PCI framework:\npci_reset_bus - __pci_reset_slot - pci_slot_save_and_disable_locked -\n pci_dev_save_and_disable - err_handler-\u003ereset_prepare(dev);\n\nIn pci_slot_save_and_disable_locked():\n\tlist_for_each_entry(dev, \u0026slot-\u003ebus-\u003edevices, bus_list) {\n\t\tif (!dev-\u003eslot || dev-\u003eslot!= slot)\n\t\t\tcontinue;\n\t\tpci_dev_save_and_disable(dev);\n\t\tif (dev-\u003esubordinate)\n\t\t\tpci_bus_save_and_disable_locked(dev-\u003esubordinate);\n\t}\n\nThis will iterate through all devices under the current bus and execute\nerr_handler-\u003ereset_prepare(), causing two devices of the hibmcge driver\nto sequentially request the rtnl_lock, leading to a deadlock.\n\nSince the driver now executes netif_device_detach()\nbefore the reset process, it will not concurrently with\nother netdev APIs, so there is no need to hold the rtnl_lock now.\n\nTherefore, this patch removes the rtnl_lock during the reset process and\nadjusts the position of HBG_NIC_STATE_RESETTING to ensure\nthat multiple resets are not executed concurrently."
}
],
"id": "CVE-2025-38720",
"lastModified": "2025-11-25T21:47:46.150",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-09-04T16:15:41.710",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/1343a8994ca7dba78f5dd818e89d68331c21c35d"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/c875503a9b9082928d7d3fc60b5400d16fbfae4e"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d85a6346fd6f595c4914205762d0cdf35c004a5e"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-667"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2025-1976
Vulnerability from csaf_certbund - Published: 2025-09-04 22:00 - Updated: 2026-03-09 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder andere nicht spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1976 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1976.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1976 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1976"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38679",
"url": "https://lore.kernel.org/linux-cve-announce/2025090443-CVE-2025-38679-be66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38680",
"url": "https://lore.kernel.org/linux-cve-announce/2025090445-CVE-2025-38680-cce6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38681",
"url": "https://lore.kernel.org/linux-cve-announce/2025090446-CVE-2025-38681-db66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38682",
"url": "https://lore.kernel.org/linux-cve-announce/2025090446-CVE-2025-38682-a90a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38683",
"url": "https://lore.kernel.org/linux-cve-announce/2025090446-CVE-2025-38683-573c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38684",
"url": "https://lore.kernel.org/linux-cve-announce/2025090447-CVE-2025-38684-db4c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38685",
"url": "https://lore.kernel.org/linux-cve-announce/2025090447-CVE-2025-38685-d633@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38686",
"url": "https://lore.kernel.org/linux-cve-announce/2025090447-CVE-2025-38686-281b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38687",
"url": "https://lore.kernel.org/linux-cve-announce/2025090448-CVE-2025-38687-564a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38688",
"url": "https://lore.kernel.org/linux-cve-announce/2025090448-CVE-2025-38688-6e94@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38689",
"url": "https://lore.kernel.org/linux-cve-announce/2025090448-CVE-2025-38689-ac95@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38690",
"url": "https://lore.kernel.org/linux-cve-announce/2025090449-CVE-2025-38690-ea6c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38691",
"url": "https://lore.kernel.org/linux-cve-announce/2025090449-CVE-2025-38691-8a2e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38692",
"url": "https://lore.kernel.org/linux-cve-announce/2025090450-CVE-2025-38692-90f5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38693",
"url": "https://lore.kernel.org/linux-cve-announce/2025090450-CVE-2025-38693-aeb5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38694",
"url": "https://lore.kernel.org/linux-cve-announce/2025090450-CVE-2025-38694-056d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38695",
"url": "https://lore.kernel.org/linux-cve-announce/2025090451-CVE-2025-38695-f491@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38696",
"url": "https://lore.kernel.org/linux-cve-announce/2025090451-CVE-2025-38696-4ec2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38697",
"url": "https://lore.kernel.org/linux-cve-announce/2025090451-CVE-2025-38697-b37e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38698",
"url": "https://lore.kernel.org/linux-cve-announce/2025090452-CVE-2025-38698-e0e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38699",
"url": "https://lore.kernel.org/linux-cve-announce/2025090452-CVE-2025-38699-9ca5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38700",
"url": "https://lore.kernel.org/linux-cve-announce/2025090452-CVE-2025-38700-0c1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38701",
"url": "https://lore.kernel.org/linux-cve-announce/2025090453-CVE-2025-38701-691e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38702",
"url": "https://lore.kernel.org/linux-cve-announce/2025090453-CVE-2025-38702-0b09@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38703",
"url": "https://lore.kernel.org/linux-cve-announce/2025090453-CVE-2025-38703-2f5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38704",
"url": "https://lore.kernel.org/linux-cve-announce/2025090454-CVE-2025-38704-4353@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38705",
"url": "https://lore.kernel.org/linux-cve-announce/2025090454-CVE-2025-38705-7cd6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38706",
"url": "https://lore.kernel.org/linux-cve-announce/2025090455-CVE-2025-38706-da55@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38707",
"url": "https://lore.kernel.org/linux-cve-announce/2025090455-CVE-2025-38707-5808@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38708",
"url": "https://lore.kernel.org/linux-cve-announce/2025090455-CVE-2025-38708-6792@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38709",
"url": "https://lore.kernel.org/linux-cve-announce/2025090456-CVE-2025-38709-f62c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38710",
"url": "https://lore.kernel.org/linux-cve-announce/2025090456-CVE-2025-38710-1b60@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38711",
"url": "https://lore.kernel.org/linux-cve-announce/2025090456-CVE-2025-38711-b653@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38712",
"url": "https://lore.kernel.org/linux-cve-announce/2025090457-CVE-2025-38712-6273@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38713",
"url": "https://lore.kernel.org/linux-cve-announce/2025090457-CVE-2025-38713-dc89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38714",
"url": "https://lore.kernel.org/linux-cve-announce/2025090457-CVE-2025-38714-36f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38715",
"url": "https://lore.kernel.org/linux-cve-announce/2025090458-CVE-2025-38715-8464@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38716",
"url": "https://lore.kernel.org/linux-cve-announce/2025090458-CVE-2025-38716-4971@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38717",
"url": "https://lore.kernel.org/linux-cve-announce/2025090459-CVE-2025-38717-fbf6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38718",
"url": "https://lore.kernel.org/linux-cve-announce/2025090459-CVE-2025-38718-5bb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38719",
"url": "https://lore.kernel.org/linux-cve-announce/2025090459-CVE-2025-38719-16b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38720",
"url": "https://lore.kernel.org/linux-cve-announce/2025090400-CVE-2025-38720-a45e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38721",
"url": "https://lore.kernel.org/linux-cve-announce/2025090400-CVE-2025-38721-e31a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38722",
"url": "https://lore.kernel.org/linux-cve-announce/2025090400-CVE-2025-38722-de5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38723",
"url": "https://lore.kernel.org/linux-cve-announce/2025090401-CVE-2025-38723-18f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38724",
"url": "https://lore.kernel.org/linux-cve-announce/2025090401-CVE-2025-38724-5309@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38725",
"url": "https://lore.kernel.org/linux-cve-announce/2025090401-CVE-2025-38725-eb3f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38726",
"url": "https://lore.kernel.org/linux-cve-announce/2025090402-CVE-2025-38726-e4a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38727",
"url": "https://lore.kernel.org/linux-cve-announce/2025090402-CVE-2025-38727-a22c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38728",
"url": "https://lore.kernel.org/linux-cve-announce/2025090402-CVE-2025-38728-191d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38729",
"url": "https://lore.kernel.org/linux-cve-announce/2025090403-CVE-2025-38729-ca88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38730",
"url": "https://lore.kernel.org/linux-cve-announce/2025090403-CVE-2025-38730-f2e6@gregkh/"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2025-09-09",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6009 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6008 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16880 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16880"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16920 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16920"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3013 vom 2025-09-29",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3013.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16880 vom 2025-09-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-16880.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16919 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16919"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-110 vom 2025-09-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-110.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16919 vom 2025-09-30",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-September/018697.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16919 vom 2025-09-30",
"url": "http://linux.oracle.com/errata/ELSA-2025-16919.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16919 vom 2025-09-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-16919.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20650 vom 2025-10-07",
"url": "https://linux.oracle.com/errata/ELSA-2025-20650.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16920 vom 2025-10-06",
"url": "https://errata.build.resf.org/RLSA-2025:16920"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17396 vom 2025-10-06",
"url": "https://access.redhat.com/errata/RHSA-2025:17396"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16919 vom 2025-10-06",
"url": "https://errata.build.resf.org/RLSA-2025:16919"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20649 vom 2025-10-07",
"url": "https://linux.oracle.com/errata/ELSA-2025-20649.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7809-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7809-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7808-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7808-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7810-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7810-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17396 vom 2025-10-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-17396.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16880 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:16880"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4328 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20663.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7808-2 vom 2025-10-14",
"url": "https://ubuntu.com/security/notices/USN-7808-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17760 vom 2025-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-17760.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7810-3 vom 2025-10-14",
"url": "https://ubuntu.com/security/notices/USN-7810-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7810-2 vom 2025-10-14",
"url": "https://ubuntu.com/security/notices/USN-7810-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20662 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20662.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20716 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20716.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03602-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022908.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-1 vom 2025-10-21",
"url": "https://ubuntu.com/security/notices/USN-7829-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-18297 vom 2025-10-20",
"url": "https://linux.oracle.com/errata/ELSA-2025-18297.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-2 vom 2025-10-21",
"url": "https://ubuntu.com/security/notices/USN-7829-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-3 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7829-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20721 vom 2025-10-28",
"url": "http://linux.oracle.com/errata/ELSA-2025-20721.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-4 vom 2025-10-27",
"url": "https://ubuntu.com/security/notices/USN-7829-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19224 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19224"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-5 vom 2025-10-28",
"url": "https://ubuntu.com/security/notices/USN-7829-5"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19223 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19223"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7829-6 vom 2025-11-04",
"url": "https://ubuntu.com/security/notices/USN-7829-6"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-25757.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21091 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21091"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7250971 vom 2025-11-12",
"url": "https://www.ibm.com/support/pages/node/7250971"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21136 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21136"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4128-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21760 vom 2025-11-19",
"url": "https://access.redhat.com/errata/RHSA-2025:21760"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4140-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20518 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-20518-0.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4189-1 vom 2025-11-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22006 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22006"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22066 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22066"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22072 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22072"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20081-1 vom 2025-11-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4KLZE7HUQJ2N6IQEI3G2KJZ5VB36YBI/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22124 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22124"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22087 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22087"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22095 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22095"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20091-1 vom 2025-11-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVNKE6YBHUN7AVUHO7UZCJJGK4HYS62H/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21064-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21056-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21052-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023389.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21040-1 vom 2025-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21074-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22388 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22388"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22387 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22387"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4301-1 vom 2025-11-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLIMXFMWOGTFRJZEC4XPGIMNBCRKQ7IF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21080-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22392 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22392"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22405 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22405"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22388 vom 2025-12-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-22388.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22395 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22395"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4315-1 vom 2025-12-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22571 vom 2025-12-02",
"url": "https://access.redhat.com/errata/RHSA-2025:22571"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22405 vom 2025-12-02",
"url": "https://linux.oracle.com/errata/ELSA-2025-22405.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21118 vom 2025-12-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-21118.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22405 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22405"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22387 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22387"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22388 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22388"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-2 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7910-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7910-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21463 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21463.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22395 vom 2025-12-05",
"url": "https://errata.build.resf.org/RLSA-2025:22395"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-4 vom 2025-12-05",
"url": "https://ubuntu.com/security/notices/USN-7909-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21931 vom 2025-12-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-21931.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22395 vom 2025-12-06",
"url": "https://linux.oracle.com/errata/ELSA-2025-22395.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22910 vom 2025-12-09",
"url": "https://access.redhat.com/errata/RHSA-2025:22910"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22914 vom 2025-12-09",
"url": "https://access.redhat.com/errata/RHSA-2025:22914"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23000 vom 2025-12-10",
"url": "https://access.redhat.com/errata/RHSA-2025:23000"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21179-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21180-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21139-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21147-1 vom 2025-12-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-5 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7909-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7933-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7933-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7938-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7938-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7255154 vom 2025-12-17",
"url": "https://www.ibm.com/support/pages/node/7255154"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23463 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23463"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23947 vom 2025-12-22",
"url": "https://access.redhat.com/errata/RHSA-2025:23947"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23960 vom 2025-12-22",
"url": "https://access.redhat.com/errata/RHSA-2025:23960"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7256201 vom 2026-01-05",
"url": "https://www.ibm.com/support/pages/node/7256201"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20012-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20015-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20021-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0489 vom 2026-01-13",
"url": "https://access.redhat.com/errata/RHSA-2026:0489"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0534 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0534"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0537 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0537"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0535 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0535"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0532 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0532"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0576 vom 2026-01-14",
"url": "https://access.redhat.com/errata/RHSA-2026:0576"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0793 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0793"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0793 vom 2026-01-21",
"url": "https://linux.oracle.com/errata/ELSA-2026-0793.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0793 vom 2026-01-24",
"url": "https://errata.build.resf.org/RLSA-2026:0793"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22910 vom 2026-01-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-22910.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-030 vom 2026-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000421570/dsa-2026-030-security-update-for-dell-networker-vproxy-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23947 vom 2026-01-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-23947.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20228-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20220-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2212 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2212"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6127 vom 2026-02-10",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2282 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2282"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2212 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2212.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2282 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2282.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-1 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4476 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0474-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20317-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0496-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2212 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2212"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2282 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2282"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20333-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20332-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20316-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2759 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2759"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2766 vom 2026-02-17",
"url": "https://access.redhat.com/errata/RHSA-2026:2766"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-3 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-4 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-2 vom 2026-02-18",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0755 vom 2026-02-18",
"url": "https://linux.oracle.com/errata/ELSA-2026-0755.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-6 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-1 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8031-3 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3124 vom 2026-02-24",
"url": "https://access.redhat.com/errata/RHSA-2026:3124"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8028-8 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8052-2 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1581 vom 2026-03-04",
"url": "https://linux.oracle.com/errata/ELSA-2026-1581.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8074-2 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8074-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20560-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20564-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20561-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20562-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4011 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4012 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4012"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4111 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4111"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2026-03-09T23:00:00.000+00:00",
"generator": {
"date": "2026-03-10T09:32:08.268+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1976",
"initial_release_date": "2025-09-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-09-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "2",
"summary": "Produktzuordnung \u00fcberpr\u00fcft, CPE korrigiert"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Amazon, Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux, Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-14T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-20T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Oracle Linux, Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Dell und Ubuntu aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von IBM, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Oracle Linux, SUSE und Red Hat aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von openSUSE und Red Hat aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-11-27T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-12-02T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-09T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von IBM und Red Hat aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-04T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-08T23:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Debian und Red Hat aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Ubuntu und Debian aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-09T23:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "79"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vProxy \u003c19.14",
"product": {
"name": "Dell NetWorker vProxy \u003c19.14",
"product_id": "T050451"
}
},
{
"category": "product_version",
"name": "vProxy 19.14",
"product": {
"name": "Dell NetWorker vProxy 19.14",
"product_id": "T050451-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.14"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF01",
"product_id": "T048556"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF01",
"product_id": "T048556-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF03",
"product_id": "T049499"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF03",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF03",
"product_id": "T049499-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if03"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.9.1",
"product": {
"name": "IBM Security Verify Access \u003c10.0.9.1",
"product_id": "T049459"
}
},
{
"category": "product_version",
"name": "10.0.9.1",
"product": {
"name": "IBM Security Verify Access 10.0.9.1",
"product_id": "T049459-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_verify_access:v10.0.9.1"
}
}
}
],
"category": "product_name",
"name": "Security Verify Access"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Linux Kernel \u003c6.6.96.2-1 on Linux 3.0",
"product": {
"name": "Microsoft Azure Linux Kernel \u003c6.6.96.2-1 on Linux 3.0",
"product_id": "T046805"
}
},
{
"category": "product_version",
"name": "Linux Kernel 6.6.96.2-1 on Linux 3.0",
"product": {
"name": "Microsoft Azure Linux Kernel 6.6.96.2-1 on Linux 3.0",
"product_id": "T046805-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:linux_kernel__6.6.96.2-1_on_linux_3.0"
}
}
}
],
"category": "product_name",
"name": "Azure"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "6368",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-38679",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38679"
},
{
"cve": "CVE-2025-38680",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38680"
},
{
"cve": "CVE-2025-38681",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38681"
},
{
"cve": "CVE-2025-38682",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38682"
},
{
"cve": "CVE-2025-38683",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38683"
},
{
"cve": "CVE-2025-38684",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38684"
},
{
"cve": "CVE-2025-38685",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38685"
},
{
"cve": "CVE-2025-38686",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38686"
},
{
"cve": "CVE-2025-38687",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38687"
},
{
"cve": "CVE-2025-38688",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38688"
},
{
"cve": "CVE-2025-38689",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38689"
},
{
"cve": "CVE-2025-38690",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38690"
},
{
"cve": "CVE-2025-38691",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38691"
},
{
"cve": "CVE-2025-38692",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38692"
},
{
"cve": "CVE-2025-38693",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38693"
},
{
"cve": "CVE-2025-38694",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38694"
},
{
"cve": "CVE-2025-38695",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38695"
},
{
"cve": "CVE-2025-38696",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38696"
},
{
"cve": "CVE-2025-38697",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38697"
},
{
"cve": "CVE-2025-38698",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38698"
},
{
"cve": "CVE-2025-38699",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38699"
},
{
"cve": "CVE-2025-38700",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38700"
},
{
"cve": "CVE-2025-38701",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38701"
},
{
"cve": "CVE-2025-38702",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38702"
},
{
"cve": "CVE-2025-38703",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38703"
},
{
"cve": "CVE-2025-38704",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38704"
},
{
"cve": "CVE-2025-38705",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38705"
},
{
"cve": "CVE-2025-38706",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38706"
},
{
"cve": "CVE-2025-38707",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38707"
},
{
"cve": "CVE-2025-38708",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38708"
},
{
"cve": "CVE-2025-38709",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38709"
},
{
"cve": "CVE-2025-38710",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38710"
},
{
"cve": "CVE-2025-38711",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38711"
},
{
"cve": "CVE-2025-38712",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38712"
},
{
"cve": "CVE-2025-38713",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38713"
},
{
"cve": "CVE-2025-38714",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38714"
},
{
"cve": "CVE-2025-38715",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38715"
},
{
"cve": "CVE-2025-38716",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38716"
},
{
"cve": "CVE-2025-38717",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38717"
},
{
"cve": "CVE-2025-38718",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38718"
},
{
"cve": "CVE-2025-38719",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38719"
},
{
"cve": "CVE-2025-38720",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38720"
},
{
"cve": "CVE-2025-38721",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38721"
},
{
"cve": "CVE-2025-38722",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38722"
},
{
"cve": "CVE-2025-38723",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38723"
},
{
"cve": "CVE-2025-38724",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38724"
},
{
"cve": "CVE-2025-38725",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38725"
},
{
"cve": "CVE-2025-38726",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38726"
},
{
"cve": "CVE-2025-38727",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38727"
},
{
"cve": "CVE-2025-38728",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-38729",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38729"
},
{
"cve": "CVE-2025-38730",
"product_status": {
"known_affected": [
"67646",
"6368",
"T004914",
"T050451",
"T032255",
"2951",
"T002207",
"T046805",
"T000126",
"T027843",
"T049499",
"398363",
"T049459",
"T048556",
"T048301"
]
},
"release_date": "2025-09-04T22:00:00.000+00:00",
"title": "CVE-2025-38730"
}
]
}
GHSA-4457-8Q65-98HW
Vulnerability from github – Published: 2025-09-05 18:31 – Updated: 2025-11-26 00:30In the Linux kernel, the following vulnerability has been resolved:
net: hibmcge: fix rtnl deadlock issue
Currently, the hibmcge netdev acquires the rtnl_lock in pci_error_handlers.reset_prepare() and releases it in pci_error_handlers.reset_done().
However, in the PCI framework: pci_reset_bus - __pci_reset_slot - pci_slot_save_and_disable_locked - pci_dev_save_and_disable - err_handler->reset_prepare(dev);
In pci_slot_save_and_disable_locked(): list_for_each_entry(dev, &slot->bus->devices, bus_list) { if (!dev->slot || dev->slot!= slot) continue; pci_dev_save_and_disable(dev); if (dev->subordinate) pci_bus_save_and_disable_locked(dev->subordinate); }
This will iterate through all devices under the current bus and execute err_handler->reset_prepare(), causing two devices of the hibmcge driver to sequentially request the rtnl_lock, leading to a deadlock.
Since the driver now executes netif_device_detach() before the reset process, it will not concurrently with other netdev APIs, so there is no need to hold the rtnl_lock now.
Therefore, this patch removes the rtnl_lock during the reset process and adjusts the position of HBG_NIC_STATE_RESETTING to ensure that multiple resets are not executed concurrently.
{
"affected": [],
"aliases": [
"CVE-2025-38720"
],
"database_specific": {
"cwe_ids": [
"CWE-667"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-04T16:15:41Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hibmcge: fix rtnl deadlock issue\n\nCurrently, the hibmcge netdev acquires the rtnl_lock in\npci_error_handlers.reset_prepare() and releases it in\npci_error_handlers.reset_done().\n\nHowever, in the PCI framework:\npci_reset_bus - __pci_reset_slot - pci_slot_save_and_disable_locked -\n pci_dev_save_and_disable - err_handler-\u003ereset_prepare(dev);\n\nIn pci_slot_save_and_disable_locked():\n\tlist_for_each_entry(dev, \u0026slot-\u003ebus-\u003edevices, bus_list) {\n\t\tif (!dev-\u003eslot || dev-\u003eslot!= slot)\n\t\t\tcontinue;\n\t\tpci_dev_save_and_disable(dev);\n\t\tif (dev-\u003esubordinate)\n\t\t\tpci_bus_save_and_disable_locked(dev-\u003esubordinate);\n\t}\n\nThis will iterate through all devices under the current bus and execute\nerr_handler-\u003ereset_prepare(), causing two devices of the hibmcge driver\nto sequentially request the rtnl_lock, leading to a deadlock.\n\nSince the driver now executes netif_device_detach()\nbefore the reset process, it will not concurrently with\nother netdev APIs, so there is no need to hold the rtnl_lock now.\n\nTherefore, this patch removes the rtnl_lock during the reset process and\nadjusts the position of HBG_NIC_STATE_RESETTING to ensure\nthat multiple resets are not executed concurrently.",
"id": "GHSA-4457-8q65-98hw",
"modified": "2025-11-26T00:30:16Z",
"published": "2025-09-05T18:31:17Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38720"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/1343a8994ca7dba78f5dd818e89d68331c21c35d"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/c875503a9b9082928d7d3fc60b5400d16fbfae4e"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d85a6346fd6f595c4914205762d0cdf35c004a5e"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.