Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-38379 (GCVE-0-2025-38379)
Vulnerability from cvelistv5
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/smb/client/cifsglob.h",
"fs/smb/client/smb2pdu.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "0cee638d92ac898d73eccc4e4bab70e9fc95946a",
"status": "affected",
"version": "202d7e838967dda02855cd925db7fd8c52c56af7",
"versionType": "git"
},
{
"lessThan": "3f6932ef25378794894c3c1024092ad14da2d330",
"status": "affected",
"version": "2c34f1e095a12be3674fb79d84d1af7896e49245",
"versionType": "git"
},
{
"lessThan": "9d2b629a9dc5c72537645533af1cb11a7d34c4b1",
"status": "affected",
"version": "4f81ee0af2b8c4089e308f7cb6b5ea5a4efe5b94",
"versionType": "git"
},
{
"lessThan": "3bbe46716092d8ef6b0df4b956f585c5cd0fc78e",
"status": "affected",
"version": "42ca547b13a20e7cbb04fbdf8d5f089ac4bb35b7",
"versionType": "git"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/smb/client/cifsglob.h",
"fs/smb/client/smb2pdu.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "6.6.97",
"status": "affected",
"version": "6.6.95",
"versionType": "semver"
},
{
"lessThan": "6.12.37",
"status": "affected",
"version": "6.12.35",
"versionType": "semver"
},
{
"lessThan": "6.15.6",
"status": "affected",
"version": "6.15.4",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.97",
"versionStartIncluding": "6.6.95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.37",
"versionStartIncluding": "6.12.35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.15.6",
"versionStartIncluding": "6.15.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix warning when reconnecting channel\n\nWhen reconnecting a channel in smb2_reconnect_server(), a dummy tcon\nis passed down to smb2_reconnect() with -\u003equery_interface\nuninitialized, so we can\u0027t call queue_delayed_work() on it.\n\nFix the following warning by ensuring that we\u0027re queueing the delayed\nworker from correct tcon.\n\nWARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200\nModules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs]\nCPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014\nWorkqueue: cifsiod smb2_reconnect_server [cifs]\nRIP: 0010:__queue_delayed_work+0x1d2/0x200\nCode: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00\n00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f\u003e 0b 90 e9 65 fe\nff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9\nRSP: 0018:ffffc900014afad8 EFLAGS: 00010003\nRAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1\nRDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0\nRBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331\nR10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040\nR13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020\nFS: 0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n queue_delayed_work_on+0xb4/0xc0\n smb2_reconnect+0xb22/0xf50 [cifs]\n smb2_reconnect_server+0x413/0xd40 [cifs]\n ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs]\n ? local_clock_noinstr+0xd/0xd0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n process_one_work+0x4c5/0xa10\n ? __pfx_process_one_work+0x10/0x10\n ? __list_add_valid_or_report+0x37/0x120\n worker_thread+0x2f1/0x5a0\n ? __kthread_parkme+0xde/0x100\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x1fe/0x380\n ? kthread+0x10f/0x380\n ? __pfx_kthread+0x10/0x10\n ? local_clock_noinstr+0xd/0xd0\n ? ret_from_fork+0x1b/0x1f0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n ? rcu_is_watching+0x20/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x15b/0x1f0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\nirq event stamp: 1116206\nhardirqs last enabled at (1116205): [\u003cffffffff8143af42\u003e] __up_console_sem+0x52/0x60\nhardirqs last disabled at (1116206): [\u003cffffffff81399f0e\u003e] queue_delayed_work_on+0x6e/0xc0\nsoftirqs last enabled at (1116138): [\u003cffffffffc04562fd\u003e] __smb_send_rqst+0x42d/0x950 [cifs]\nsoftirqs last disabled at (1116136): [\u003cffffffff823d35e1\u003e] release_sock+0x21/0xf0"
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T04:20:26.678Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/0cee638d92ac898d73eccc4e4bab70e9fc95946a"
},
{
"url": "https://git.kernel.org/stable/c/3f6932ef25378794894c3c1024092ad14da2d330"
},
{
"url": "https://git.kernel.org/stable/c/9d2b629a9dc5c72537645533af1cb11a7d34c4b1"
},
{
"url": "https://git.kernel.org/stable/c/3bbe46716092d8ef6b0df4b956f585c5cd0fc78e"
}
],
"title": "smb: client: fix warning when reconnecting channel",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-38379",
"datePublished": "2025-07-25T12:53:21.098Z",
"dateReserved": "2025-04-16T04:51:24.010Z",
"dateUpdated": "2025-07-28T04:20:26.678Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-38379\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-07-25T13:15:27.033\",\"lastModified\":\"2025-11-19T20:05:38.043\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nsmb: client: fix warning when reconnecting channel\\n\\nWhen reconnecting a channel in smb2_reconnect_server(), a dummy tcon\\nis passed down to smb2_reconnect() with -\u003equery_interface\\nuninitialized, so we can\u0027t call queue_delayed_work() on it.\\n\\nFix the following warning by ensuring that we\u0027re queueing the delayed\\nworker from correct tcon.\\n\\nWARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200\\nModules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs]\\nCPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary)\\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014\\nWorkqueue: cifsiod smb2_reconnect_server [cifs]\\nRIP: 0010:__queue_delayed_work+0x1d2/0x200\\nCode: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00\\n00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f\u003e 0b 90 e9 65 fe\\nff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9\\nRSP: 0018:ffffc900014afad8 EFLAGS: 00010003\\nRAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1\\nRDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0\\nRBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331\\nR10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040\\nR13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020\\nFS: 0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000\\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\nCR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0\\nPKRU: 55555554\\nCall Trace:\\n \u003cTASK\u003e\\n queue_delayed_work_on+0xb4/0xc0\\n smb2_reconnect+0xb22/0xf50 [cifs]\\n smb2_reconnect_server+0x413/0xd40 [cifs]\\n ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs]\\n ? local_clock_noinstr+0xd/0xd0\\n ? local_clock+0x15/0x30\\n ? lock_release+0x29b/0x390\\n process_one_work+0x4c5/0xa10\\n ? __pfx_process_one_work+0x10/0x10\\n ? __list_add_valid_or_report+0x37/0x120\\n worker_thread+0x2f1/0x5a0\\n ? __kthread_parkme+0xde/0x100\\n ? __pfx_worker_thread+0x10/0x10\\n kthread+0x1fe/0x380\\n ? kthread+0x10f/0x380\\n ? __pfx_kthread+0x10/0x10\\n ? local_clock_noinstr+0xd/0xd0\\n ? ret_from_fork+0x1b/0x1f0\\n ? local_clock+0x15/0x30\\n ? lock_release+0x29b/0x390\\n ? rcu_is_watching+0x20/0x50\\n ? __pfx_kthread+0x10/0x10\\n ret_from_fork+0x15b/0x1f0\\n ? __pfx_kthread+0x10/0x10\\n ret_from_fork_asm+0x1a/0x30\\n \u003c/TASK\u003e\\nirq event stamp: 1116206\\nhardirqs last enabled at (1116205): [\u003cffffffff8143af42\u003e] __up_console_sem+0x52/0x60\\nhardirqs last disabled at (1116206): [\u003cffffffff81399f0e\u003e] queue_delayed_work_on+0x6e/0xc0\\nsoftirqs last enabled at (1116138): [\u003cffffffffc04562fd\u003e] __smb_send_rqst+0x42d/0x950 [cifs]\\nsoftirqs last disabled at (1116136): [\u003cffffffff823d35e1\u003e] release_sock+0x21/0xf0\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: se corrige la advertencia al reconectar el canal. Al reconectar un canal en smb2_reconnect_server(), se pasa una transacci\u00f3n ficticia a smb2_reconnect() con -\u0026gt;query_interface sin inicializar, por lo que no se puede ejecutar queue_delayed_work() en ella. Corrija la siguiente advertencia asegur\u00e1ndose de que se est\u00e9 poniendo en cola el trabajador retrasado desde la transacci\u00f3n correcta. WARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200 Modules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs] CPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014 Workqueue: cifsiod smb2_reconnect_server [cifs] RIP: 0010:__queue_delayed_work+0x1d2/0x200 Code: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00 00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f\u0026gt; 0b 90 e9 65 fe ff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9 RSP: 0018:ffffc900014afad8 EFLAGS: 00010003 RAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1 RDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0 RBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331 R10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040 R13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020 FS: 0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0 PKRU: 55555554 Call Trace: queue_delayed_work_on+0xb4/0xc0 smb2_reconnect+0xb22/0xf50 [cifs] smb2_reconnect_server+0x413/0xd40 [cifs] ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs] ? local_clock_noinstr+0xd/0xd0 ? local_clock+0x15/0x30 ? lock_release+0x29b/0x390 process_one_work+0x4c5/0xa10 ? __pfx_process_one_work+0x10/0x10 ? __list_add_valid_or_report+0x37/0x120 worker_thread+0x2f1/0x5a0 ? __kthread_parkme+0xde/0x100 ? __pfx_worker_thread+0x10/0x10 kthread+0x1fe/0x380 ? kthread+0x10f/0x380 ? __pfx_kthread+0x10/0x10 ? local_clock_noinstr+0xd/0xd0 ? ret_from_fork+0x1b/0x1f0 ? local_clock+0x15/0x30 ? lock_release+0x29b/0x390 ? rcu_is_watching+0x20/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x15b/0x1f0 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 irq event stamp: 1116206 hardirqs last enabled at (1116205): [] __up_console_sem+0x52/0x60 hardirqs last disabled at (1116206): [] queue_delayed_work_on+0x6e/0xc0 softirqs last enabled at (1116138): [] __smb_send_rqst+0x42d/0x950 [cifs] softirqs last disabled at (1116136): [] release_sock+0x21/0xf0\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.6.95\",\"versionEndExcluding\":\"6.6.97\",\"matchCriteriaId\":\"CD4AB842-8CE8-4B2B-AB35-7A0CB834BB79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.12.35\",\"versionEndExcluding\":\"6.12.37\",\"matchCriteriaId\":\"94C5AF1D-C169-4AB9-8C6E-CDB6F3181468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.15.4\",\"versionEndExcluding\":\"6.15.6\",\"matchCriteriaId\":\"C320AF0D-B4B6-4663-B73E-833679BE8464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D4894DB-CCFE-4602-B1BF-3960B2E19A01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"09709862-E348-4378-8632-5A7813EDDC86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"415BF58A-8197-43F5-B3D7-D1D63057A26E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0517869-312D-4429-80C2-561086E1421C\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0cee638d92ac898d73eccc4e4bab70e9fc95946a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3bbe46716092d8ef6b0df4b956f585c5cd0fc78e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3f6932ef25378794894c3c1024092ad14da2d330\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9d2b629a9dc5c72537645533af1cb11a7d34c4b1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
msrc_cve-2025-38379
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38379 smb: client: fix warning when reconnecting channel - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-38379.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "smb: client: fix warning when reconnecting channel",
"tracking": {
"current_release_date": "2025-09-03T22:56:14.000Z",
"generator": {
"date": "2025-10-20T03:36:12.154Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-38379",
"initial_release_date": "2025-07-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-09-03T22:56:14.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 kernel 6.6.96.2-1",
"product": {
"name": "azl3 kernel 6.6.96.2-1",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 kernel 6.6.96.2-2",
"product": {
"name": "\u003cazl3 kernel 6.6.96.2-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 kernel 6.6.96.2-2",
"product": {
"name": "azl3 kernel 6.6.96.2-2",
"product_id": "20412"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.96.2-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kernel 6.6.96.2-2 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.96.2-2 as a component of Azure Linux 3.0",
"product_id": "20412-17084"
},
"product_reference": "20412",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-38379",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20412-17084"
],
"known_affected": [
"17084-2",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38379 smb: client: fix warning when reconnecting channel - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-38379.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-03T22:56:14.000Z",
"details": "6.6.104.2-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"title": "smb: client: fix warning when reconnecting channel"
}
]
}
wid-sec-w-2025-1653
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder andere nicht spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1653 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1653.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1653 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1653"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38353",
"url": "https://lore.kernel.org/linux-cve-announce/2025072553-CVE-2025-38353-a9eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38354",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38354-bdcd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38355",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38355-2855@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38356",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38356-286a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38357",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38357-8b0a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38358",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38358-8d7f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38359",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38359-8cda@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38360",
"url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38360-1f17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38361",
"url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38361-3f11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38362",
"url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38362-8922@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38363",
"url": "https://lore.kernel.org/linux-cve-announce/2025072557-CVE-2025-38363-122c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38364",
"url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38364-74db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38365",
"url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38365-0519@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38366",
"url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38366-26b8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38367",
"url": "https://lore.kernel.org/linux-cve-announce/2025072558-CVE-2025-38367-df91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38368",
"url": "https://lore.kernel.org/linux-cve-announce/2025072559-CVE-2025-38368-e561@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38369",
"url": "https://lore.kernel.org/linux-cve-announce/2025072559-CVE-2025-38369-6ddf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38370",
"url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38370-857d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38371",
"url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38371-ff41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38372",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38372-6659@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38373",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38373-b6fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38374",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38374-52a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38375",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38375-3faa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38376",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38376-e290@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38377",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38377-a0c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38378",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38378-4e10@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38379",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38379-97db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38380",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38380-d1a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38381",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38381-b27a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38382",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38382-c4f2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38383",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38383-c967@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38384",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38384-391e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38385",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38385-936c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38386",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38386-0a8a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38387",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38387-f9d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38388",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38388-402a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38389",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38389-b1f4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38390",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38390-7d67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38391",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38391-0064@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38392",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38392-17a6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38393",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38393-f2e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38394",
"url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38394-f005@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38395",
"url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38395-3a19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38396",
"url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38396-92a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38397",
"url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38397-d375@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38398",
"url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38398-1271@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38399",
"url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38399-00ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38400",
"url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38400-a0d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38401",
"url": "https://lore.kernel.org/linux-cve-announce/2025072510-CVE-2025-38401-789b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38402",
"url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38402-e08c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38403",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38403-0da0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38404",
"url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38404-f719@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38405",
"url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38405-014e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38406",
"url": "https://lore.kernel.org/linux-cve-announce/2025072533-CVE-2025-38406-5f5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38407",
"url": "https://lore.kernel.org/linux-cve-announce/2025072520-CVE-2025-38407-98b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38408",
"url": "https://lore.kernel.org/linux-cve-announce/2025072520-CVE-2025-38408-29e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38409",
"url": "https://lore.kernel.org/linux-cve-announce/2025072520-CVE-2025-38409-cee4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38410",
"url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38410-e0e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38411",
"url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38411-0ca7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38412",
"url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38412-2ccc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38413",
"url": "https://lore.kernel.org/linux-cve-announce/2025072521-CVE-2025-38413-d64f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38414",
"url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38414-8302@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38415",
"url": "https://lore.kernel.org/linux-cve-announce/2025072513-CVE-2025-38415-c634@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38416",
"url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38416-e4bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38417",
"url": "https://lore.kernel.org/linux-cve-announce/2025072546-CVE-2025-38417-12d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38418",
"url": "https://lore.kernel.org/linux-cve-announce/2025072546-CVE-2025-38418-7af0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38419",
"url": "https://lore.kernel.org/linux-cve-announce/2025072546-CVE-2025-38419-c07e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38420",
"url": "https://lore.kernel.org/linux-cve-announce/2025072552-CVE-2025-38420-13a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38421",
"url": "https://lore.kernel.org/linux-cve-announce/2025072554-CVE-2025-38421-8601@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38422",
"url": "https://lore.kernel.org/linux-cve-announce/2025072554-CVE-2025-38422-5d9b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38423",
"url": "https://lore.kernel.org/linux-cve-announce/2025072554-CVE-2025-38423-171a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38424",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38424-500e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38425",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38425-d34f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38426",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38426-718c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38427",
"url": "https://lore.kernel.org/linux-cve-announce/2025072555-CVE-2025-38427-6e37@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38428",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38428-8b33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38429",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38429-f662@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38430",
"url": "https://lore.kernel.org/linux-cve-announce/2025072556-CVE-2025-38430-dafd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38431",
"url": "https://lore.kernel.org/linux-cve-announce/2025072537-CVE-2025-38431-9bb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38432",
"url": "https://lore.kernel.org/linux-cve-announce/2025072516-CVE-2025-38432-ce36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38433",
"url": "https://lore.kernel.org/linux-cve-announce/2025072511-CVE-2025-38433-6d14@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38434",
"url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38434-ecdf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38435",
"url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38435-ffc0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38436",
"url": "https://lore.kernel.org/linux-cve-announce/2025072512-CVE-2025-38436-8cb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38437",
"url": "https://lore.kernel.org/linux-cve-announce/2025072559-CVE-2025-38437-9752@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38438",
"url": "https://lore.kernel.org/linux-cve-announce/2025072501-CVE-2025-38438-f653@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38439",
"url": "https://lore.kernel.org/linux-cve-announce/2025072501-CVE-2025-38439-3f3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38440",
"url": "https://lore.kernel.org/linux-cve-announce/2025072501-CVE-2025-38440-cb71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38441",
"url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38441-bb71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38442",
"url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38442-2844@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38443",
"url": "https://lore.kernel.org/linux-cve-announce/2025072502-CVE-2025-38443-419c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38444",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38444-4b60@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38445",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38445-7295@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38446",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38446-492b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38447",
"url": "https://lore.kernel.org/linux-cve-announce/2025072503-CVE-2025-38447-5233@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38448",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38448-f242@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38449",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38449-cbf0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38450",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38450-a59f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38451",
"url": "https://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38451-ee66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38452",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38452-d9d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38453",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38453-69b1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38454",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38454-8908@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38455",
"url": "https://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38455-9331@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38456",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38456-3c0a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38457",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38457-d302@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38458",
"url": "https://lore.kernel.org/linux-cve-announce/2025072506-CVE-2025-38458-d999@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38459",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38459-e941@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38460",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38460-40fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38461",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38461-33b1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38462",
"url": "https://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38462-3e15@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38463",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38463-f4a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38464",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38464-44a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38465",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38465-28ad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38466",
"url": "https://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38466-11e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38467",
"url": "https://lore.kernel.org/linux-cve-announce/2025072509-CVE-2025-38467-eb0c@gregkh/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13776 vom 2025-08-13",
"url": "https://access.redhat.com/errata/RHSA-2025:13776"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5973 vom 2025-08-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00137.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5975 vom 2025-08-13",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00139.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13960 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:13960"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13962 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:13962"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13960 vom 2025-08-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-13960.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14054 vom 2025-08-19",
"url": "https://access.redhat.com/errata/RHSA-2025:14054"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14005 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:14005"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14009 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:14009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14003 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:14003"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14082 vom 2025-08-19",
"url": "https://access.redhat.com/errata/RHSA-2025:14082"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13962 vom 2025-08-20",
"url": "https://linux.oracle.com/errata/ELSA-2025-13962.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14009 vom 2025-08-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-14009.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14420 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14420"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14418 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14418"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14510 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14510"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14420 vom 2025-08-26",
"url": "https://linux.oracle.com/errata/ELSA-2025-14420.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14510 vom 2025-08-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-14510.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2025:15009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14985 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:14985"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15011 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:15011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15008 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:15008"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15005 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:15005"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15227 vom 2025-09-04",
"url": "https://access.redhat.com/errata/RHSA-2025:15227"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15008 vom 2025-09-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-15008.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15224 vom 2025-09-04",
"url": "https://access.redhat.com/errata/RHSA-2025:15224"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15011 vom 2025-09-03",
"url": "https://linux.oracle.com/errata/ELSA-2025-15011.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15005 vom 2025-09-05",
"url": "http://linux.oracle.com/errata/ELSA-2025-15005.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15429 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15429"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15447 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15447"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20552 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20552.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:15009 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:15009"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15429 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-15429.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15668 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15668"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15661 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15661"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15660 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15660"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15658 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15658"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15656 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15656"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20653-1 vom 2025-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022432.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15647 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15647"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20669-1 vom 2025-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15670 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15670"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15447 vom 2025-09-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-15447.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15661 vom 2025-09-13",
"url": "http://linux.oracle.com/errata/ELSA-2025-15661.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03204-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022522.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15782 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15782"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15786 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15786"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15785 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15785"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15785 vom 2025-09-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-15785.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-260 vom 2025-09-17",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-260.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-104 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-104.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-109 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-109.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-261 vom 2025-09-17",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-261.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-262 vom 2025-09-17",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-262.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2025-263 vom 2025-09-17",
"url": "https://alas.aws.amazon.com/AL2/ALAS2LIVEPATCH-2025-263.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15782 vom 2025-09-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-15782.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03272-1 vom 2025-09-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022589.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03283-1 vom 2025-09-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022596.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6008 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03290-1 vom 2025-09-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022602.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16373 vom 2025-09-22",
"url": "https://access.redhat.com/errata/RHSA-2025:16373"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16372 vom 2025-09-22",
"url": "https://access.redhat.com/errata/RHSA-2025:16372"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03314-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022615.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03310-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022610.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16372 vom 2025-09-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-16372.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16541 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16541"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03301-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022605.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16540 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16540"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16538 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16538"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16539 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16539"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16580 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16580"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16583 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16583"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7770-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7770-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7769-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7769-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16582 vom 2025-09-24",
"url": "https://access.redhat.com/errata/RHSA-2025:16582"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7769-2 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7769-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7771-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7771-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16669 vom 2025-09-25",
"url": "https://access.redhat.com/errata/RHSA-2025:16669"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-2 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-3 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7776-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7776-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7775-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-2 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7775-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7769-3 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7769-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20756-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022703.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03383-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03382-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022721.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03384-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022723.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20739-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022711.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3013 vom 2025-09-29",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3013.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17122 vom 2025-10-01",
"url": "https://access.redhat.com/errata/RHSA-2025:17122"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17123 vom 2025-10-01",
"url": "https://access.redhat.com/errata/RHSA-2025:17123"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-3 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7775-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7789-1 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7789-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17159 vom 2025-10-01",
"url": "https://access.redhat.com/errata/RHSA-2025:17159"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16904 vom 2025-10-02",
"url": "https://linux.oracle.com/errata/ELSA-2025-16904.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17192 vom 2025-10-01",
"url": "https://access.redhat.com/errata/RHSA-2025:17192"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-4 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7774-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17241 vom 2025-10-02",
"url": "https://access.redhat.com/errata/RHSA-2025:17241"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-5 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7774-5"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16904 vom 2025-10-07",
"url": "https://errata.build.resf.org/RLSA-2025:16904"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7789-2 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7789-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17570 vom 2025-10-08",
"url": "https://access.redhat.com/errata/RHSA-2025:17570"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:15011 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:15011"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:15661 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:15661"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4328 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20663.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17958 vom 2025-10-14",
"url": "https://access.redhat.com/errata/RHSA-2025:17958"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18043 vom 2025-10-15",
"url": "https://access.redhat.com/errata/RHSA-2025:18043"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20716 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20716.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03601-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022903.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03614-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03600-1 vom 2025-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHWHH7ZSMFJ6PQZ3CBDGGCWHNBCWD26Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03602-1 vom 2025-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022908.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03634-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03633-1 vom 2025-10-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03646-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022939.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03650-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022941.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03638-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03636-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7834-1 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7834-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18932 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18932"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7833-1 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7833-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7WMM33D7UTTQM25T2XCVZHFJKIMM3TO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022975.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3762-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5PU3QBFUI54V4YM7FX4AIWKDVDLIFMV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3748-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYXC2NBEEGHSFXWCA3DVT5LVZMZ5RRNP/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3755-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFR7CE7W5U4CT7EDERPCHLWSGEIHWJLA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3764-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SP6KY7ONJTFGDWCHVV7CO7D4KUEJ27DA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3751-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMB6RXALFYMRMM4UK7R54RAQRCZJEBH4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3765-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022991.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3772-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022994.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3771-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022995.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3768-1 vom 2025-10-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JX5Y5NWCULMT7SH5C6ZUDMMTVZPLLOJC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20851-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7833-3 vom 2025-10-24",
"url": "https://ubuntu.com/security/notices/USN-7833-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20861-1 vom 2025-10-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20891-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20878-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20883-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20874-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20886-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20873-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20877-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20881-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20876-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20882-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20875-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20887-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20885-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20879-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20884-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20888-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20870-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7249276 vom 2025-10-27",
"url": "https://www.ibm.com/support/pages/node/7249276"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20890-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20907-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20902-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20905-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20903-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20918-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20904-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3886-1 vom 2025-10-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20909-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20917-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20916-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20913-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20915-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20914-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20906-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20898-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20912-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20920-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-404 vom 2025-10-31",
"url": "https://www.dell.com/support/kbdoc/000385435"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7833-4 vom 2025-10-31",
"url": "https://ubuntu.com/security/notices/USN-7833-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7856-1 vom 2025-11-04",
"url": "https://ubuntu.com/security/notices/USN-7856-1"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-390 vom 2025-11-05",
"url": "https://www.dell.com/support/kbdoc/000385230"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7864-1 vom 2025-11-07",
"url": "https://ubuntu.com/security/notices/USN-7864-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3995-1 vom 2025-11-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25754 vom 2025-11-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-25754.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4056-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20095 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20095"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20518 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20518"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4057-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-25757.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20996-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20994-1 vom 2025-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7250971 vom 2025-11-12",
"url": "https://www.ibm.com/support/pages/node/7250971"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21667 vom 2025-11-18",
"url": "https://access.redhat.com/errata/RHSA-2025:21667"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4132-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4141-1 vom 2025-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7879-1 vom 2025-11-21",
"url": "https://ubuntu.com/security/notices/USN-7879-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:20518 vom 2025-11-21",
"url": "https://errata.build.resf.org/RLSA-2025:20518"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20518 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-20518-0.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-24T23:00:00.000+00:00",
"generator": {
"date": "2025-11-25T09:14:31.147+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1653",
"initial_release_date": "2025-07-27T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat und Debian aufgenommen"
},
{
"date": "2025-08-13T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux, SUSE und Red Hat aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-21T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-25T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-01T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-09-04T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-10T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-09-11T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux und Amazon aufgenommen"
},
{
"date": "2025-09-18T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-09-21T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Debian, SUSE und Red Hat aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE, Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-09-24T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2025-09-25T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-08T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-14T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von SUSE und IBM aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von SUSE und Dell aufgenommen"
},
{
"date": "2025-11-02T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-04T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Ubuntu und Dell aufgenommen"
},
{
"date": "2025-11-06T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-09T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE und IBM aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "60"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Virtual Edition",
"product": {
"name": "Dell NetWorker Virtual Edition",
"product_id": "T048226",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual_edition"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Appliance \u003c5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance \u003c5.32.00.18",
"product_id": "T048301"
}
},
{
"category": "product_version",
"name": "Appliance 5.32.00.18",
"product": {
"name": "Dell Secure Connect Gateway Appliance 5.32.00.18",
"product_id": "T048301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:appliance__5.32.00.18"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF01",
"product_id": "T048556"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF01",
"product_id": "T048556-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T046484",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "T044137",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-38353",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38353"
},
{
"cve": "CVE-2025-38354",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38354"
},
{
"cve": "CVE-2025-38355",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38355"
},
{
"cve": "CVE-2025-38356",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38356"
},
{
"cve": "CVE-2025-38357",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38357"
},
{
"cve": "CVE-2025-38358",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38358"
},
{
"cve": "CVE-2025-38359",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38359"
},
{
"cve": "CVE-2025-38360",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38360"
},
{
"cve": "CVE-2025-38361",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38361"
},
{
"cve": "CVE-2025-38362",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38362"
},
{
"cve": "CVE-2025-38363",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38363"
},
{
"cve": "CVE-2025-38364",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38364"
},
{
"cve": "CVE-2025-38365",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38365"
},
{
"cve": "CVE-2025-38366",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38366"
},
{
"cve": "CVE-2025-38367",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38367"
},
{
"cve": "CVE-2025-38368",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38368"
},
{
"cve": "CVE-2025-38369",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38369"
},
{
"cve": "CVE-2025-38370",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38370"
},
{
"cve": "CVE-2025-38371",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38371"
},
{
"cve": "CVE-2025-38372",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38372"
},
{
"cve": "CVE-2025-38373",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38373"
},
{
"cve": "CVE-2025-38374",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38374"
},
{
"cve": "CVE-2025-38375",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38375"
},
{
"cve": "CVE-2025-38376",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38376"
},
{
"cve": "CVE-2025-38377",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38377"
},
{
"cve": "CVE-2025-38378",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38378"
},
{
"cve": "CVE-2025-38379",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38379"
},
{
"cve": "CVE-2025-38380",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38380"
},
{
"cve": "CVE-2025-38381",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38381"
},
{
"cve": "CVE-2025-38382",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38382"
},
{
"cve": "CVE-2025-38383",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38383"
},
{
"cve": "CVE-2025-38384",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38384"
},
{
"cve": "CVE-2025-38385",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38385"
},
{
"cve": "CVE-2025-38386",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38386"
},
{
"cve": "CVE-2025-38387",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38387"
},
{
"cve": "CVE-2025-38388",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38388"
},
{
"cve": "CVE-2025-38389",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38389"
},
{
"cve": "CVE-2025-38390",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38390"
},
{
"cve": "CVE-2025-38391",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38391"
},
{
"cve": "CVE-2025-38392",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38392"
},
{
"cve": "CVE-2025-38393",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38393"
},
{
"cve": "CVE-2025-38394",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38394"
},
{
"cve": "CVE-2025-38395",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38395"
},
{
"cve": "CVE-2025-38396",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38396"
},
{
"cve": "CVE-2025-38397",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38397"
},
{
"cve": "CVE-2025-38398",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38398"
},
{
"cve": "CVE-2025-38399",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38399"
},
{
"cve": "CVE-2025-38400",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38400"
},
{
"cve": "CVE-2025-38401",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38401"
},
{
"cve": "CVE-2025-38402",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38402"
},
{
"cve": "CVE-2025-38403",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38403"
},
{
"cve": "CVE-2025-38404",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38404"
},
{
"cve": "CVE-2025-38405",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38405"
},
{
"cve": "CVE-2025-38406",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38406"
},
{
"cve": "CVE-2025-38407",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38407"
},
{
"cve": "CVE-2025-38408",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38408"
},
{
"cve": "CVE-2025-38409",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38409"
},
{
"cve": "CVE-2025-38410",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38410"
},
{
"cve": "CVE-2025-38411",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38411"
},
{
"cve": "CVE-2025-38412",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38412"
},
{
"cve": "CVE-2025-38413",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38413"
},
{
"cve": "CVE-2025-38414",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38414"
},
{
"cve": "CVE-2025-38415",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38415"
},
{
"cve": "CVE-2025-38416",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38416"
},
{
"cve": "CVE-2025-38417",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38417"
},
{
"cve": "CVE-2025-38418",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38418"
},
{
"cve": "CVE-2025-38419",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38419"
},
{
"cve": "CVE-2025-38420",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38420"
},
{
"cve": "CVE-2025-38421",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38421"
},
{
"cve": "CVE-2025-38422",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38422"
},
{
"cve": "CVE-2025-38423",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38423"
},
{
"cve": "CVE-2025-38424",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38424"
},
{
"cve": "CVE-2025-38425",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38425"
},
{
"cve": "CVE-2025-38426",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38426"
},
{
"cve": "CVE-2025-38427",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38427"
},
{
"cve": "CVE-2025-38428",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38428"
},
{
"cve": "CVE-2025-38429",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38429"
},
{
"cve": "CVE-2025-38430",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38430"
},
{
"cve": "CVE-2025-38431",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38431"
},
{
"cve": "CVE-2025-38432",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38432"
},
{
"cve": "CVE-2025-38433",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38433"
},
{
"cve": "CVE-2025-38434",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38434"
},
{
"cve": "CVE-2025-38435",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38435"
},
{
"cve": "CVE-2025-38436",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38436"
},
{
"cve": "CVE-2025-38437",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38437"
},
{
"cve": "CVE-2025-38438",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38438"
},
{
"cve": "CVE-2025-38439",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38439"
},
{
"cve": "CVE-2025-38440",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38440"
},
{
"cve": "CVE-2025-38441",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38441"
},
{
"cve": "CVE-2025-38442",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38442"
},
{
"cve": "CVE-2025-38443",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38443"
},
{
"cve": "CVE-2025-38444",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38444"
},
{
"cve": "CVE-2025-38445",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38445"
},
{
"cve": "CVE-2025-38446",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38446"
},
{
"cve": "CVE-2025-38447",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38447"
},
{
"cve": "CVE-2025-38448",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38448"
},
{
"cve": "CVE-2025-38449",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38449"
},
{
"cve": "CVE-2025-38450",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38450"
},
{
"cve": "CVE-2025-38451",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38451"
},
{
"cve": "CVE-2025-38452",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38452"
},
{
"cve": "CVE-2025-38453",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38453"
},
{
"cve": "CVE-2025-38454",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38454"
},
{
"cve": "CVE-2025-38455",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38455"
},
{
"cve": "CVE-2025-38456",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38456"
},
{
"cve": "CVE-2025-38457",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38457"
},
{
"cve": "CVE-2025-38458",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38458"
},
{
"cve": "CVE-2025-38459",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38459"
},
{
"cve": "CVE-2025-38460",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38460"
},
{
"cve": "CVE-2025-38461",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38461"
},
{
"cve": "CVE-2025-38462",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38462"
},
{
"cve": "CVE-2025-38463",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38463"
},
{
"cve": "CVE-2025-38464",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38464"
},
{
"cve": "CVE-2025-38465",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38465"
},
{
"cve": "CVE-2025-38466",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38466"
},
{
"cve": "CVE-2025-38467",
"product_status": {
"known_affected": [
"67646",
"T004914",
"T032255",
"T039664",
"T044137",
"2951",
"T002207",
"T000126",
"T021415",
"T046484",
"398363",
"T048226",
"T048556",
"T048301"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-38467"
}
]
}
fkie_cve-2025-38379
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/0cee638d92ac898d73eccc4e4bab70e9fc95946a | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/3bbe46716092d8ef6b0df4b956f585c5cd0fc78e | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/3f6932ef25378794894c3c1024092ad14da2d330 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/9d2b629a9dc5c72537645533af1cb11a7d34c4b1 | Patch |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.16 | |
| linux | linux_kernel | 6.16 | |
| linux | linux_kernel | 6.16 | |
| linux | linux_kernel | 6.16 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD4AB842-8CE8-4B2B-AB35-7A0CB834BB79",
"versionEndExcluding": "6.6.97",
"versionStartIncluding": "6.6.95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94C5AF1D-C169-4AB9-8C6E-CDB6F3181468",
"versionEndExcluding": "6.12.37",
"versionStartIncluding": "6.12.35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C320AF0D-B4B6-4663-B73E-833679BE8464",
"versionEndExcluding": "6.15.6",
"versionStartIncluding": "6.15.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6D4894DB-CCFE-4602-B1BF-3960B2E19A01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "09709862-E348-4378-8632-5A7813EDDC86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*",
"matchCriteriaId": "415BF58A-8197-43F5-B3D7-D1D63057A26E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A0517869-312D-4429-80C2-561086E1421C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix warning when reconnecting channel\n\nWhen reconnecting a channel in smb2_reconnect_server(), a dummy tcon\nis passed down to smb2_reconnect() with -\u003equery_interface\nuninitialized, so we can\u0027t call queue_delayed_work() on it.\n\nFix the following warning by ensuring that we\u0027re queueing the delayed\nworker from correct tcon.\n\nWARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200\nModules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs]\nCPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014\nWorkqueue: cifsiod smb2_reconnect_server [cifs]\nRIP: 0010:__queue_delayed_work+0x1d2/0x200\nCode: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00\n00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f\u003e 0b 90 e9 65 fe\nff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9\nRSP: 0018:ffffc900014afad8 EFLAGS: 00010003\nRAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1\nRDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0\nRBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331\nR10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040\nR13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020\nFS: 0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n queue_delayed_work_on+0xb4/0xc0\n smb2_reconnect+0xb22/0xf50 [cifs]\n smb2_reconnect_server+0x413/0xd40 [cifs]\n ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs]\n ? local_clock_noinstr+0xd/0xd0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n process_one_work+0x4c5/0xa10\n ? __pfx_process_one_work+0x10/0x10\n ? __list_add_valid_or_report+0x37/0x120\n worker_thread+0x2f1/0x5a0\n ? __kthread_parkme+0xde/0x100\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x1fe/0x380\n ? kthread+0x10f/0x380\n ? __pfx_kthread+0x10/0x10\n ? local_clock_noinstr+0xd/0xd0\n ? ret_from_fork+0x1b/0x1f0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n ? rcu_is_watching+0x20/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x15b/0x1f0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\nirq event stamp: 1116206\nhardirqs last enabled at (1116205): [\u003cffffffff8143af42\u003e] __up_console_sem+0x52/0x60\nhardirqs last disabled at (1116206): [\u003cffffffff81399f0e\u003e] queue_delayed_work_on+0x6e/0xc0\nsoftirqs last enabled at (1116138): [\u003cffffffffc04562fd\u003e] __smb_send_rqst+0x42d/0x950 [cifs]\nsoftirqs last disabled at (1116136): [\u003cffffffff823d35e1\u003e] release_sock+0x21/0xf0"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: se corrige la advertencia al reconectar el canal. Al reconectar un canal en smb2_reconnect_server(), se pasa una transacci\u00f3n ficticia a smb2_reconnect() con -\u0026gt;query_interface sin inicializar, por lo que no se puede ejecutar queue_delayed_work() en ella. Corrija la siguiente advertencia asegur\u00e1ndose de que se est\u00e9 poniendo en cola el trabajador retrasado desde la transacci\u00f3n correcta. WARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200 Modules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs] CPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014 Workqueue: cifsiod smb2_reconnect_server [cifs] RIP: 0010:__queue_delayed_work+0x1d2/0x200 Code: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00 00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f\u0026gt; 0b 90 e9 65 fe ff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9 RSP: 0018:ffffc900014afad8 EFLAGS: 00010003 RAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1 RDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0 RBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331 R10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040 R13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020 FS: 0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0 PKRU: 55555554 Call Trace: queue_delayed_work_on+0xb4/0xc0 smb2_reconnect+0xb22/0xf50 [cifs] smb2_reconnect_server+0x413/0xd40 [cifs] ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs] ? local_clock_noinstr+0xd/0xd0 ? local_clock+0x15/0x30 ? lock_release+0x29b/0x390 process_one_work+0x4c5/0xa10 ? __pfx_process_one_work+0x10/0x10 ? __list_add_valid_or_report+0x37/0x120 worker_thread+0x2f1/0x5a0 ? __kthread_parkme+0xde/0x100 ? __pfx_worker_thread+0x10/0x10 kthread+0x1fe/0x380 ? kthread+0x10f/0x380 ? __pfx_kthread+0x10/0x10 ? local_clock_noinstr+0xd/0xd0 ? ret_from_fork+0x1b/0x1f0 ? local_clock+0x15/0x30 ? lock_release+0x29b/0x390 ? rcu_is_watching+0x20/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x15b/0x1f0 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 irq event stamp: 1116206 hardirqs last enabled at (1116205): [] __up_console_sem+0x52/0x60 hardirqs last disabled at (1116206): [] queue_delayed_work_on+0x6e/0xc0 softirqs last enabled at (1116138): [] __smb_send_rqst+0x42d/0x950 [cifs] softirqs last disabled at (1116136): [] release_sock+0x21/0xf0"
}
],
"id": "CVE-2025-38379",
"lastModified": "2025-11-19T20:05:38.043",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-07-25T13:15:27.033",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/0cee638d92ac898d73eccc4e4bab70e9fc95946a"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/3bbe46716092d8ef6b0df4b956f585c5cd0fc78e"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/3f6932ef25378794894c3c1024092ad14da2d330"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/9d2b629a9dc5c72537645533af1cb11a7d34c4b1"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ghsa-mj73-cg42-f79h
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix warning when reconnecting channel
When reconnecting a channel in smb2_reconnect_server(), a dummy tcon is passed down to smb2_reconnect() with ->query_interface uninitialized, so we can't call queue_delayed_work() on it.
Fix the following warning by ensuring that we're queueing the delayed worker from correct tcon.
WARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200 Modules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs] CPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014 Workqueue: cifsiod smb2_reconnect_server [cifs] RIP: 0010:__queue_delayed_work+0x1d2/0x200 Code: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00 00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f> 0b 90 e9 65 fe ff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9 RSP: 0018:ffffc900014afad8 EFLAGS: 00010003 RAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1 RDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0 RBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331 R10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040 R13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020 FS: 0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0 PKRU: 55555554 Call Trace: queue_delayed_work_on+0xb4/0xc0 smb2_reconnect+0xb22/0xf50 [cifs] smb2_reconnect_server+0x413/0xd40 [cifs] ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs] ? local_clock_noinstr+0xd/0xd0 ? local_clock+0x15/0x30 ? lock_release+0x29b/0x390 process_one_work+0x4c5/0xa10 ? __pfx_process_one_work+0x10/0x10 ? __list_add_valid_or_report+0x37/0x120 worker_thread+0x2f1/0x5a0 ? __kthread_parkme+0xde/0x100 ? __pfx_worker_thread+0x10/0x10 kthread+0x1fe/0x380 ? kthread+0x10f/0x380 ? __pfx_kthread+0x10/0x10 ? local_clock_noinstr+0xd/0xd0 ? ret_from_fork+0x1b/0x1f0 ? local_clock+0x15/0x30 ? lock_release+0x29b/0x390 ? rcu_is_watching+0x20/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x15b/0x1f0 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 irq event stamp: 1116206 hardirqs last enabled at (1116205): [] __up_console_sem+0x52/0x60 hardirqs last disabled at (1116206): [] queue_delayed_work_on+0x6e/0xc0 softirqs last enabled at (1116138): [] __smb_send_rqst+0x42d/0x950 [cifs] softirqs last disabled at (1116136): [] release_sock+0x21/0xf0
{
"affected": [],
"aliases": [
"CVE-2025-38379"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-25T13:15:27Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix warning when reconnecting channel\n\nWhen reconnecting a channel in smb2_reconnect_server(), a dummy tcon\nis passed down to smb2_reconnect() with -\u003equery_interface\nuninitialized, so we can\u0027t call queue_delayed_work() on it.\n\nFix the following warning by ensuring that we\u0027re queueing the delayed\nworker from correct tcon.\n\nWARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200\nModules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs]\nCPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014\nWorkqueue: cifsiod smb2_reconnect_server [cifs]\nRIP: 0010:__queue_delayed_work+0x1d2/0x200\nCode: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00\n00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f\u003e 0b 90 e9 65 fe\nff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9\nRSP: 0018:ffffc900014afad8 EFLAGS: 00010003\nRAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1\nRDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0\nRBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331\nR10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040\nR13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020\nFS: 0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n queue_delayed_work_on+0xb4/0xc0\n smb2_reconnect+0xb22/0xf50 [cifs]\n smb2_reconnect_server+0x413/0xd40 [cifs]\n ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs]\n ? local_clock_noinstr+0xd/0xd0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n process_one_work+0x4c5/0xa10\n ? __pfx_process_one_work+0x10/0x10\n ? __list_add_valid_or_report+0x37/0x120\n worker_thread+0x2f1/0x5a0\n ? __kthread_parkme+0xde/0x100\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x1fe/0x380\n ? kthread+0x10f/0x380\n ? __pfx_kthread+0x10/0x10\n ? local_clock_noinstr+0xd/0xd0\n ? ret_from_fork+0x1b/0x1f0\n ? local_clock+0x15/0x30\n ? lock_release+0x29b/0x390\n ? rcu_is_watching+0x20/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x15b/0x1f0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\nirq event stamp: 1116206\nhardirqs last enabled at (1116205): [\u003cffffffff8143af42\u003e] __up_console_sem+0x52/0x60\nhardirqs last disabled at (1116206): [\u003cffffffff81399f0e\u003e] queue_delayed_work_on+0x6e/0xc0\nsoftirqs last enabled at (1116138): [\u003cffffffffc04562fd\u003e] __smb_send_rqst+0x42d/0x950 [cifs]\nsoftirqs last disabled at (1116136): [\u003cffffffff823d35e1\u003e] release_sock+0x21/0xf0",
"id": "GHSA-mj73-cg42-f79h",
"modified": "2025-11-19T21:31:16Z",
"published": "2025-07-25T15:30:51Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38379"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/0cee638d92ac898d73eccc4e4bab70e9fc95946a"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/3bbe46716092d8ef6b0df4b956f585c5cd0fc78e"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/3f6932ef25378794894c3c1024092ad14da2d330"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/9d2b629a9dc5c72537645533af1cb11a7d34c4b1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.