Auto-Update: 2025-07-04T16:00:12.343601+00:00

This commit is contained in:
cad-safe-bot 2025-07-04 16:03:51 +00:00
parent 0e63d08065
commit 4ea872044d
64 changed files with 2481 additions and 82 deletions

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-38178",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:24.233",
"lastModified": "2025-07-04T14:15:24.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/igen6: Fix NULL pointer dereference\n\nA kernel panic was reported with the following kernel log:\n\n EDAC igen6: Expected 2 mcs, but only 1 detected.\n BUG: unable to handle page fault for address: 000000000000d570\n ...\n Hardware name: Notebook V54x_6x_TU/V54x_6x_TU, BIOS Dasharo (coreboot+UEFI) v0.9.0 07/17/2024\n RIP: e030:ecclog_handler+0x7e/0xf0 [igen6_edac]\n ...\n igen6_probe+0x2a0/0x343 [igen6_edac]\n ...\n igen6_init+0xc5/0xff0 [igen6_edac]\n ...\n\nThis issue occurred because one memory controller was disabled by\nthe BIOS but the igen6_edac driver still checked all the memory\ncontrollers, including this absent one, to identify the source of\nthe error. Accessing the null MMIO for the absent memory controller\nresulted in the oops above.\n\nFix this issue by reverting the configuration structure to non-const\nand updating the field 'res_cfg->num_imc' to reflect the number of\ndetected memory controllers."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/40e69c93d6dadc5355bfe90f3940c402d171289c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/88efa0de3285be66969b71ec137d9dab1ee19e52",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-38179",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:24.553",
"lastModified": "2025-07-04T14:15:24.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix max_sge overflow in smb_extract_folioq_to_rdma()\n\nThis fixes the following problem:\n\n[ 749.901015] [ T8673] run fstests cifs/001 at 2025-06-17 09:40:30\n[ 750.346409] [ T9870] ==================================================================\n[ 750.346814] [ T9870] BUG: KASAN: slab-out-of-bounds in smb_set_sge+0x2cc/0x3b0 [cifs]\n[ 750.347330] [ T9870] Write of size 8 at addr ffff888011082890 by task xfs_io/9870\n[ 750.347705] [ T9870]\n[ 750.348077] [ T9870] CPU: 0 UID: 0 PID: 9870 Comm: xfs_io Kdump: loaded Not tainted 6.16.0-rc2-metze.02+ #1 PREEMPT(voluntary)\n[ 750.348082] [ T9870] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006\n[ 750.348085] [ T9870] Call Trace:\n[ 750.348086] [ T9870] <TASK>\n[ 750.348088] [ T9870] dump_stack_lvl+0x76/0xa0\n[ 750.348106] [ T9870] print_report+0xd1/0x640\n[ 750.348116] [ T9870] ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n[ 750.348120] [ T9870] ? kasan_complete_mode_report_info+0x26/0x210\n[ 750.348124] [ T9870] kasan_report+0xe7/0x130\n[ 750.348128] [ T9870] ? smb_set_sge+0x2cc/0x3b0 [cifs]\n[ 750.348262] [ T9870] ? smb_set_sge+0x2cc/0x3b0 [cifs]\n[ 750.348377] [ T9870] __asan_report_store8_noabort+0x17/0x30\n[ 750.348381] [ T9870] smb_set_sge+0x2cc/0x3b0 [cifs]\n[ 750.348496] [ T9870] smbd_post_send_iter+0x1990/0x3070 [cifs]\n[ 750.348625] [ T9870] ? __pfx_smbd_post_send_iter+0x10/0x10 [cifs]\n[ 750.348741] [ T9870] ? update_stack_state+0x2a0/0x670\n[ 750.348749] [ T9870] ? cifs_flush+0x153/0x320 [cifs]\n[ 750.348870] [ T9870] ? cifs_flush+0x153/0x320 [cifs]\n[ 750.348990] [ T9870] ? update_stack_state+0x2a0/0x670\n[ 750.348995] [ T9870] smbd_send+0x58c/0x9c0 [cifs]\n[ 750.349117] [ T9870] ? __pfx_smbd_send+0x10/0x10 [cifs]\n[ 750.349231] [ T9870] ? unwind_get_return_address+0x65/0xb0\n[ 750.349235] [ T9870] ? __pfx_stack_trace_consume_entry+0x10/0x10\n[ 750.349242] [ T9870] ? arch_stack_walk+0xa7/0x100\n[ 750.349250] [ T9870] ? stack_trace_save+0x92/0xd0\n[ 750.349254] [ T9870] __smb_send_rqst+0x931/0xec0 [cifs]\n[ 750.349374] [ T9870] ? kernel_text_address+0x173/0x190\n[ 750.349379] [ T9870] ? kasan_save_stack+0x39/0x70\n[ 750.349382] [ T9870] ? kasan_save_track+0x18/0x70\n[ 750.349385] [ T9870] ? __kasan_slab_alloc+0x9d/0xa0\n[ 750.349389] [ T9870] ? __pfx___smb_send_rqst+0x10/0x10 [cifs]\n[ 750.349508] [ T9870] ? smb2_mid_entry_alloc+0xb4/0x7e0 [cifs]\n[ 750.349626] [ T9870] ? cifs_call_async+0x277/0xb00 [cifs]\n[ 750.349746] [ T9870] ? cifs_issue_write+0x256/0x610 [cifs]\n[ 750.349867] [ T9870] ? netfs_do_issue_write+0xc2/0x340 [netfs]\n[ 750.349900] [ T9870] ? netfs_advance_write+0x45b/0x1270 [netfs]\n[ 750.349929] [ T9870] ? netfs_write_folio+0xd6c/0x1be0 [netfs]\n[ 750.349958] [ T9870] ? netfs_writepages+0x2e9/0xa80 [netfs]\n[ 750.349987] [ T9870] ? do_writepages+0x21f/0x590\n[ 750.349993] [ T9870] ? filemap_fdatawrite_wbc+0xe1/0x140\n[ 750.349997] [ T9870] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 750.350002] [ T9870] smb_send_rqst+0x22e/0x2f0 [cifs]\n[ 750.350131] [ T9870] ? __pfx_smb_send_rqst+0x10/0x10 [cifs]\n[ 750.350255] [ T9870] ? local_clock_noinstr+0xe/0xd0\n[ 750.350261] [ T9870] ? kasan_save_alloc_info+0x37/0x60\n[ 750.350268] [ T9870] ? __kasan_check_write+0x14/0x30\n[ 750.350271] [ T9870] ? _raw_spin_lock+0x81/0xf0\n[ 750.350275] [ T9870] ? __pfx__raw_spin_lock+0x10/0x10\n[ 750.350278] [ T9870] ? smb2_setup_async_request+0x293/0x580 [cifs]\n[ 750.350398] [ T9870] cifs_call_async+0x477/0xb00 [cifs]\n[ 750.350518] [ T9870] ? __pfx_smb2_writev_callback+0x10/0x10 [cifs]\n[ 750.350636] [ T9870] ? __pfx_cifs_call_async+0x10/0x10 [cifs]\n[ 750.350756] [ T9870] ? __pfx__raw_spin_lock+0x10/0x10\n[ 750.350760] [ T9870] ? __kasan_check_write+0x14/0x30\n[ 750.350763] [ T98\n---truncated---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/8ae7814589d7bd850294ac14ec4c1725dafd42ca",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a379a8a2a0032e12e7ef397197c9c2ad011588d6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e0ba9b2f188166550296005e64b15e80db82ad8a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38180",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:24.700",
"lastModified": "2025-07-04T14:15:24.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: fix /proc/net/atm/lec handling\n\n/proc/net/atm/lec must ensure safety against dev_lec[] changes.\n\nIt appears it had dev_put() calls without prior dev_hold(),\nleading to imbalance and UAF."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/5fe1b23a2f87f43aeeac51e08819cbc6fd808cbc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9b9aeb3ada44d8abea1e31e4446113f460848ae4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a5e3a144268899f1a8c445c8a3bfa15873ba85e8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ca3829c18c8d0ceb656605d3bff6bb3dfb078589",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d03b79f459c7935cff830d98373474f440bd03ae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e612c4b014f5808fbc6beae21f5ccaca5e76a2f8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f2d1443b18806640abdb530e88009af7be2588e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fcfccf56f4eba7d00aa2d33c7bb1b33083237742",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38181",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:24.860",
"lastModified": "2025-07-04T14:15:24.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: Fix null-ptr-deref in calipso_req_{set,del}attr().\n\nsyzkaller reported a null-ptr-deref in sock_omalloc() while allocating\na CALIPSO option. [0]\n\nThe NULL is of struct sock, which was fetched by sk_to_full_sk() in\ncalipso_req_setattr().\n\nSince commit a1a5344ddbe8 (\"tcp: avoid two atomic ops for syncookies\"),\nreqsk->rsk_listener could be NULL when SYN Cookie is returned to its\nclient, as hinted by the leading SYN Cookie log.\n\nHere are 3 options to fix the bug:\n\n 1) Return 0 in calipso_req_setattr()\n 2) Return an error in calipso_req_setattr()\n 3) Alaways set rsk_listener\n\n1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie\nfor CALIPSO. 3) is also no go as there have been many efforts to reduce\natomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35\n(\"tcp/dccp: do not touch listener sk_refcnt under synflood\").\n\nAs of the blamed commit, SYN Cookie already did not need refcounting,\nand no one has stumbled on the bug for 9 years, so no CALIPSO user will\ncare about SYN Cookie.\n\nLet's return an error in calipso_req_setattr() and calipso_req_delattr()\nin the SYN Cookie case.\n\nThis can be reproduced by [1] on Fedora and now connect() of nc times out.\n\n[0]:\nTCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\nCPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nRIP: 0010:read_pnet include/net/net_namespace.h:406 [inline]\nRIP: 0010:sock_net include/net/sock.h:655 [inline]\nRIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806\nCode: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b\nRSP: 0018:ffff88811af89038 EFLAGS: 00010216\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400\nRDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030\nRBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e\nR10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000\nR13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050\nFS: 00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0\nPKRU: 80000000\nCall Trace:\n <IRQ>\n ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288\n calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204\n calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597\n netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249\n selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342\n selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551\n security_inet_conn_request+0x50/0xa0 security/security.c:4945\n tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825\n tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275\n tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328\n tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781\n tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667\n tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904\n ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436\n ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491\n dst_input include/net/dst.h:469 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]\n ip6_rcv_finish+0xb6/0x490 net/ipv6/ip6_input.c:69\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netf\n---truncated---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/058dd4a370f23a5553a9449f2db53d5bfa88d45e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/10876da918fa1aec0227fb4c67647513447f53a9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/956f1499412ed0953f6a116df7fdb855e9f1fc66",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/988edde4d52d5c02ea4dd95d7619372a5e2fb7b7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bde8833eb075ba8e8674de88e32de6b669966451",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d092c7fd8e220b23d6c47e03d7d0cc79e731f379",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dc724bd34d56f5589f7587a091a8cda2386826c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f4ae0f61dd9a63329ecb49b1e6356139d43240b8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-38182",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:24.990",
"lastModified": "2025-07-04T14:15:24.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nublk: santizize the arguments from userspace when adding a device\n\nSanity check the values for queue depth and number of queues\nwe get from userspace when adding a device."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0f8df5d6f25ac17c52a8bc6418e60a3e63130550",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3162d8235c8c4d585525cee8a59d1c180940a968",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8c8472855884355caf3d8e0c50adf825f83454b2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e2b2b7cf6368580114851cb3932f2ad9fbf23386",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-38183",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.113",
"lastModified": "2025-07-04T14:15:25.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: lan743x: fix potential out-of-bounds write in lan743x_ptp_io_event_clock_get()\n\nBefore calling lan743x_ptp_io_event_clock_get(), the 'channel' value\nis checked against the maximum value of PCI11X1X_PTP_IO_MAX_CHANNELS(8).\nThis seems correct and aligns with the PTP interrupt status register\n(PTP_INT_STS) specifications.\n\nHowever, lan743x_ptp_io_event_clock_get() writes to ptp->extts[] with\nonly LAN743X_PTP_N_EXTTS(4) elements, using channel as an index:\n\n lan743x_ptp_io_event_clock_get(..., u8 channel,...)\n {\n ...\n /* Update Local timestamp */\n extts = &ptp->extts[channel];\n extts->ts.tv_sec = sec;\n ...\n }\n\nTo avoid an out-of-bounds write and utilize all the supported GPIO\ninputs, set LAN743X_PTP_N_EXTTS to 8.\n\nDetected using the static analysis tool - Svace."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/41017bd66c533f7af912c58273c7dfd5de0065d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4da0d23516857230b8e9b3022e25422ee2e2ba80",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/66bba1fd5bad548c03f7e42669a59f3f4d8211cc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e353b0854d3a1a31cb061df8d022fbfea53a0f24",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e8d48201a132f4aab31351c19a802c5a5ae820fa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38184",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.237",
"lastModified": "2025-07-04T14:15:25.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer\n\nThe reproduction steps:\n1. create a tun interface\n2. enable l2 bearer\n3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun\n\ntipc: Started in network mode\ntipc: Node identity 8af312d38a21, cluster identity 4711\ntipc: Enabled bearer <eth:syz_tun>, priority 1\nOops: general protection fault\nKASAN: null-ptr-deref in range\nCPU: 1 UID: 1000 PID: 559 Comm: poc Not tainted 6.16.0-rc1+ #117 PREEMPT\nHardware name: QEMU Ubuntu 24.04 PC\nRIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0\n\nthe ub was in fact a struct dev.\n\nwhen bid != 0 && skip_cnt != 0, bearer_list[bid] may be NULL or\nother media when other thread changes it.\n\nfix this by checking media_id."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/05d332ba075753d569d66333d62d60fff5f57ad8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/0d3d91c3500f0c480e016faa4e2259c588616e59",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/0f4a72fb266e48dbe928e1d936eab149e4ac3e1b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3998283e4c32c0fe69edd59b0876c193f50abce6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8595350615f952fcf8bc861464a6bf6b1129af50",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c2e17984752b9131061d1a2ca1199da2706337fd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d3dfe821dfe091c0045044343c8d86596d66e2cf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f82727adcf2992822e12198792af450a76ebd5ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38185",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.377",
"lastModified": "2025-07-04T14:15:25.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: atmtcp: Free invalid length skb in atmtcp_c_send().\n\nsyzbot reported the splat below. [0]\n\nvcc_sendmsg() copies data passed from userspace to skb and passes\nit to vcc->dev->ops->send().\n\natmtcp_c_send() accesses skb->data as struct atmtcp_hdr after\nchecking if skb->len is 0, but it's not enough.\n\nAlso, when skb->len == 0, skb and sk (vcc) were leaked because\ndev_kfree_skb() is not called and sk_wmem_alloc adjustment is missing\nto revert atm_account_tx() in vcc_sendmsg(), which is expected\nto be done in atm_pop_raw().\n\nLet's properly free skb with an invalid length in atmtcp_c_send().\n\n[0]:\nBUG: KMSAN: uninit-value in atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294\n atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294\n vcc_sendmsg+0xd7c/0xff0 net/atm/common.c:644\n sock_sendmsg_nosec net/socket.c:712 [inline]\n __sock_sendmsg+0x330/0x3d0 net/socket.c:727\n ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620\n __sys_sendmsg net/socket.c:2652 [inline]\n __do_sys_sendmsg net/socket.c:2657 [inline]\n __se_sys_sendmsg net/socket.c:2655 [inline]\n __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655\n x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4154 [inline]\n slab_alloc_node mm/slub.c:4197 [inline]\n kmem_cache_alloc_node_noprof+0x818/0xf00 mm/slub.c:4249\n kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:579\n __alloc_skb+0x347/0x7d0 net/core/skbuff.c:670\n alloc_skb include/linux/skbuff.h:1336 [inline]\n vcc_sendmsg+0xb40/0xff0 net/atm/common.c:628\n sock_sendmsg_nosec net/socket.c:712 [inline]\n __sock_sendmsg+0x330/0x3d0 net/socket.c:727\n ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566\n ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620\n __sys_sendmsg net/socket.c:2652 [inline]\n __do_sys_sendmsg net/socket.c:2657 [inline]\n __se_sys_sendmsg net/socket.c:2655 [inline]\n __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655\n x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nCPU: 1 UID: 0 PID: 5798 Comm: syz-executor192 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(undef)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/1b0ad18704913c92a3ad53748fbc0f219a75b876",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2f370ae1fb6317985f3497b1bb80d457508ca2f7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3261c017a7c5d2815c6a388c5a3280d1fba0e8db",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a4b0fd8c25a7583f8564af6cc910418fb8954e89",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c19c0943424b412a84fdf178e6c71fe5480e4f0f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c9260c837de1d2b454960a4a2e44a81272fbcd22",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ca00f0e6d733ecd9150716d1fd0138d26e674706",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e996507f59610e5752b8702537f13f551e7a2c96",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-38186",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.520",
"lastModified": "2025-07-04T14:15:25.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_en: Fix double invocation of bnxt_ulp_stop()/bnxt_ulp_start()\n\nBefore the commit under the Fixes tag below, bnxt_ulp_stop() and\nbnxt_ulp_start() were always invoked in pairs. After that commit,\nthe new bnxt_ulp_restart() can be invoked after bnxt_ulp_stop()\nhas been called. This may result in the RoCE driver's aux driver\n.suspend() method being invoked twice. The 2nd bnxt_re_suspend()\ncall will crash when it dereferences a NULL pointer:\n\n(NULL ib_device): Handle device suspend call\nBUG: kernel NULL pointer dereference, address: 0000000000000b78\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP PTI\nCPU: 20 UID: 0 PID: 181 Comm: kworker/u96:5 Tainted: G S 6.15.0-rc1 #4 PREEMPT(voluntary)\nTainted: [S]=CPU_OUT_OF_SPEC\nHardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.4.3 01/17/2017\nWorkqueue: bnxt_pf_wq bnxt_sp_task [bnxt_en]\nRIP: 0010:bnxt_re_suspend+0x45/0x1f0 [bnxt_re]\nCode: 8b 05 a7 3c 5b f5 48 89 44 24 18 31 c0 49 8b 5c 24 08 4d 8b 2c 24 e8 ea 06 0a f4 48 c7 c6 04 60 52 c0 48 89 df e8 1b ce f9 ff <48> 8b 83 78 0b 00 00 48 8b 80 38 03 00 00 a8 40 0f 85 b5 00 00 00\nRSP: 0018:ffffa2e84084fd88 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001\nRDX: 0000000000000000 RSI: ffffffffb4b6b934 RDI: 00000000ffffffff\nRBP: ffffa1760954c9c0 R08: 0000000000000000 R09: c0000000ffffdfff\nR10: 0000000000000001 R11: ffffa2e84084fb50 R12: ffffa176031ef070\nR13: ffffa17609775000 R14: ffffa17603adc180 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffffa17daa397000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000b78 CR3: 00000004aaa30003 CR4: 00000000003706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<TASK>\nbnxt_ulp_stop+0x69/0x90 [bnxt_en]\nbnxt_sp_task+0x678/0x920 [bnxt_en]\n? __schedule+0x514/0xf50\nprocess_scheduled_works+0x9d/0x400\nworker_thread+0x11c/0x260\n? __pfx_worker_thread+0x10/0x10\nkthread+0xfe/0x1e0\n? __pfx_kthread+0x10/0x10\nret_from_fork+0x2b/0x40\n? __pfx_kthread+0x10/0x10\nret_from_fork_asm+0x1a/0x30\n\nCheck the BNXT_EN_FLAG_ULP_STOPPED flag and do not proceed if the flag\nis already set. This will preserve the original symmetrical\nbnxt_ulp_stop() and bnxt_ulp_start().\n\nAlso, inside bnxt_ulp_start(), clear the BNXT_EN_FLAG_ULP_STOPPED\nflag after taking the mutex to avoid any race condition. And for\nsymmetry, only proceed in bnxt_ulp_start() if the\nBNXT_EN_FLAG_ULP_STOPPED is set."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/1e9ac33fa271be0d2480fd732f9642d81542500b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6f2cd309492924b8afd2c62aebff815c1119d124",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cca4ffd4a5b768752b91f6f75d77928e47886913",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-38187",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.640",
"lastModified": "2025-07-04T14:15:25.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: fix a use-after-free in r535_gsp_rpc_push()\n\nThe RPC container is released after being passed to r535_gsp_rpc_send().\n\nWhen sending the initial fragment of a large RPC and passing the\ncaller's RPC container, the container will be freed prematurely. Subsequent\nattempts to send remaining fragments will therefore result in a\nuse-after-free.\n\nAllocate a temporary RPC container for holding the initial fragment of a\nlarge RPC when sending. Free the caller's container when all fragments\nare successfully sent.\n\n[ Rebase onto Blackwell changes. - Danilo ]"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/9802f0a63b641f4cddb2139c814c2e95cb825099",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cd4677407c0ee250fc21e36439c8a442ddd62cc1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-38188",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.760",
"lastModified": "2025-07-04T14:15:25.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/a7xx: Call CP_RESET_CONTEXT_STATE\n\nCalling this packet is necessary when we switch contexts because there\nare various pieces of state used by userspace to synchronize between BR\nand BV that are persistent across submits and we need to make sure that\nthey are in a \"safe\" state when switching contexts. Otherwise a\nuserspace submission in one context could cause another context to\nfunction incorrectly and hang, effectively a denial of service (although\nwithout leaking data). This was missed during initial a7xx bringup.\n\nPatchwork: https://patchwork.freedesktop.org/patch/654924/"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2b520c6104f34e3a548525173c38ebca4402cac3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/35fe72f3c425bbf1d580bd9066e2456b1dbae4a8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8a1f52651dd8203695d293c6824d8f6c067877d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-38189",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:25.883",
"lastModified": "2025-07-04T14:15:25.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/v3d: Avoid NULL pointer dereference in `v3d_job_update_stats()`\n\nThe following kernel Oops was recently reported by Mesa CI:\n\n[ 800.139824] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000588\n[ 800.148619] Mem abort info:\n[ 800.151402] ESR = 0x0000000096000005\n[ 800.155141] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 800.160444] SET = 0, FnV = 0\n[ 800.163488] EA = 0, S1PTW = 0\n[ 800.166619] FSC = 0x05: level 1 translation fault\n[ 800.171487] Data abort info:\n[ 800.174357] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000\n[ 800.179832] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 800.184873] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 800.190176] user pgtable: 4k pages, 39-bit VAs, pgdp=00000001014c2000\n[ 800.196607] [0000000000000588] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n[ 800.205305] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP\n[ 800.211564] Modules linked in: vc4 snd_soc_hdmi_codec drm_display_helper v3d cec gpu_sched drm_dma_helper drm_shmem_helper drm_kms_helper drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm i2c_brcmstb snd_timer snd backlight\n[ 800.234448] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.25+rpt-rpi-v8 #1 Debian 1:6.12.25-1+rpt1\n[ 800.244182] Hardware name: Raspberry Pi 4 Model B Rev 1.4 (DT)\n[ 800.250005] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 800.256959] pc : v3d_job_update_stats+0x60/0x130 [v3d]\n[ 800.262112] lr : v3d_job_update_stats+0x48/0x130 [v3d]\n[ 800.267251] sp : ffffffc080003e60\n[ 800.270555] x29: ffffffc080003e60 x28: ffffffd842784980 x27: 0224012000000000\n[ 800.277687] x26: ffffffd84277f630 x25: ffffff81012fd800 x24: 0000000000000020\n[ 800.284818] x23: ffffff8040238b08 x22: 0000000000000570 x21: 0000000000000158\n[ 800.291948] x20: 0000000000000000 x19: ffffff8040238000 x18: 0000000000000000\n[ 800.299078] x17: ffffffa8c1bd2000 x16: ffffffc080000000 x15: 0000000000000000\n[ 800.306208] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 800.313338] x11: 0000000000000040 x10: 0000000000001a40 x9 : ffffffd83b39757c\n[ 800.320468] x8 : ffffffd842786420 x7 : 7fffffffffffffff x6 : 0000000000ef32b0\n[ 800.327598] x5 : 00ffffffffffffff x4 : 0000000000000015 x3 : ffffffd842784980\n[ 800.334728] x2 : 0000000000000004 x1 : 0000000000010002 x0 : 000000ba4c0ca382\n[ 800.341859] Call trace:\n[ 800.344294] v3d_job_update_stats+0x60/0x130 [v3d]\n[ 800.349086] v3d_irq+0x124/0x2e0 [v3d]\n[ 800.352835] __handle_irq_event_percpu+0x58/0x218\n[ 800.357539] handle_irq_event+0x54/0xb8\n[ 800.361369] handle_fasteoi_irq+0xac/0x240\n[ 800.365458] handle_irq_desc+0x48/0x68\n[ 800.369200] generic_handle_domain_irq+0x24/0x38\n[ 800.373810] gic_handle_irq+0x48/0xd8\n[ 800.377464] call_on_irq_stack+0x24/0x58\n[ 800.381379] do_interrupt_handler+0x88/0x98\n[ 800.385554] el1_interrupt+0x34/0x68\n[ 800.389123] el1h_64_irq_handler+0x18/0x28\n[ 800.393211] el1h_64_irq+0x64/0x68\n[ 800.396603] default_idle_call+0x3c/0x168\n[ 800.400606] do_idle+0x1fc/0x230\n[ 800.403827] cpu_startup_entry+0x40/0x50\n[ 800.407742] rest_init+0xe4/0xf0\n[ 800.410962] start_kernel+0x5e8/0x790\n[ 800.414616] __primary_switched+0x80/0x90\n[ 800.418622] Code: 8b170277 8b160296 11000421 b9000861 (b9401ac1)\n[ 800.424707] ---[ end trace 0000000000000000 ]---\n[ 800.457313] ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---\n\nThis issue happens when the file descriptor is closed before the jobs\nsubmitted by it are completed. When the job completes, we update the\nglobal GPU stats and the per-fd GPU stats, which are exposed through\nfdinfo. If the file descriptor was closed, then the struct `v3d_file_priv`\nand its stats were already freed and we can't update the per-fd stats.\n\nTherefore, if the file descriptor was already closed, don't u\n---truncated---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/4f4701489d0f768a232b10d281491184f34bacf0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c886784000934d5486621106da0614c85bcd76a8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e1bc3a13bd775791cca0bb144d977b00f3598042",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38190",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.017",
"lastModified": "2025-07-04T14:15:26.017",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: Revert atm_account_tx() if copy_from_iter_full() fails.\n\nIn vcc_sendmsg(), we account skb->truesize to sk->sk_wmem_alloc by\natm_account_tx().\n\nIt is expected to be reverted by atm_pop_raw() later called by\nvcc->dev->ops->send(vcc, skb).\n\nHowever, vcc_sendmsg() misses the same revert when copy_from_iter_full()\nfails, and then we will leak a socket.\n\nLet's factorise the revert part as atm_return_tx() and call it in\nthe failure path.\n\nNote that the corresponding sk_wmem_alloc operation can be found in\nalloc_tx() as of the blamed commit.\n\n $ git blame -L:alloc_tx net/atm/common.c c55fa3cccbc2c~"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2252c539c43f9a1431a7e8b34e3c18e9dd77a96d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/287b4f085d2ca3375cf1ee672af27410c64777e8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3902205eadf35db59dbc2186c2a98b9e6182efa5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3d828519bd69bfcaabdd942a872679617ef06739",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5e0d00992118e234ebf29d5145c1cc920342777e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7851263998d4269125fd6cb3fdbfc7c6db853859",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7d6bc28cfe5c8e3a279b4b4bdeed6698b2702685",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c12430edd92fd49a4800b0f3fb395b50cb16bcc1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-38191",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.157",
"lastModified": "2025-07-04T14:15:26.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix null pointer dereference in destroy_previous_session\n\nIf client set ->PreviousSessionId on kerberos session setup stage,\nNULL pointer dereference error will happen. Since sess->user is not\nset yet, It can pass the user argument as NULL to destroy_previous_session.\nsess->user will be set in ksmbd_krb5_authenticate(). So this patch move\ncalling destroy_previous_session() after ksmbd_krb5_authenticate()."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/076f1adefb9837977af7ed233883842ddc446644",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/0902625a24eea7fdc187faa5d97df244d159dd6e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1193486dffb7432a09f57f5d09049b4d4123538b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/281afc52e2961cd5dd8326ebc9c5bc40904c0468",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7ac5b66acafcc9292fb935d7e03790f2b8b2dc0e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-38192",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.280",
"lastModified": "2025-07-04T14:15:26.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: clear the dst when changing skb protocol\n\nA not-so-careful NAT46 BPF program can crash the kernel\nif it indiscriminately flips ingress packets from v4 to v6:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n ip6_rcv_core (net/ipv6/ip6_input.c:190:20)\n ipv6_rcv (net/ipv6/ip6_input.c:306:8)\n process_backlog (net/core/dev.c:6186:4)\n napi_poll (net/core/dev.c:6906:9)\n net_rx_action (net/core/dev.c:7028:13)\n do_softirq (kernel/softirq.c:462:3)\n netif_rx (net/core/dev.c:5326:3)\n dev_loopback_xmit (net/core/dev.c:4015:2)\n ip_mc_finish_output (net/ipv4/ip_output.c:363:8)\n NF_HOOK (./include/linux/netfilter.h:314:9)\n ip_mc_output (net/ipv4/ip_output.c:400:5)\n dst_output (./include/net/dst.h:459:9)\n ip_local_out (net/ipv4/ip_output.c:130:9)\n ip_send_skb (net/ipv4/ip_output.c:1496:8)\n udp_send_skb (net/ipv4/udp.c:1040:8)\n udp_sendmsg (net/ipv4/udp.c:1328:10)\n\nThe output interface has a 4->6 program attached at ingress.\nWe try to loop the multicast skb back to the sending socket.\nIngress BPF runs as part of netif_rx(), pushes a valid v6 hdr\nand changes skb->protocol to v6. We enter ip6_rcv_core which\ntries to use skb_dst(). But the dst is still an IPv4 one left\nafter IPv4 mcast output.\n\nClear the dst in all BPF helpers which change the protocol.\nTry to preserve metadata dsts, those may carry non-routing\nmetadata."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2a3ad42a57b43145839f2f233fb562247658a6d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ba9db6f907ac02215e30128770f85fbd7db2fcf9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bfa4d86e130a09f67607482e988313430e38f6c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e9994e7b9f7bbb882d13c8191731649249150d21",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-38193",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.403",
"lastModified": "2025-07-04T14:15:26.403",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: reject invalid perturb period\n\nGerrard Tai reported that SFQ perturb_period has no range check yet,\nand this can be used to trigger a race condition fixed in a separate patch.\n\nWe want to make sure ctl->perturb_period * HZ will not overflow\nand is positive.\n\n\ntc qd add dev lo root sfq perturb -10 # negative value : error\nError: sch_sfq: invalid perturb period.\n\ntc qd add dev lo root sfq perturb 1000000000 # too big : error\nError: sch_sfq: invalid perturb period.\n\ntc qd add dev lo root sfq perturb 2000000 # acceptable value\ntc -s -d qd sh dev lo\nqdisc sfq 8005: root refcnt 2 limit 127p quantum 64Kb depth 127 flows 128 divisor 1024 perturb 2000000sec\n Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)\n backlog 0b 0p requeues 0"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0357da9149eac621f39e235a135ebf155f01f7c3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/590b2d7d0beadba2aa576708a05a05f0aae39295",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7ca52541c05c832d32b112274f81a985101f9ba8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/956b5aebb349449b38d920d444ca1392d43719d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b11a50544af691b787384089b68f740ae20a441b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f9b97d466e6026ccbdda30bb5b71965b67ccbc82",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38194",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.530",
"lastModified": "2025-07-04T14:15:26.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\njffs2: check that raw node were preallocated before writing summary\n\nSyzkaller detected a kernel bug in jffs2_link_node_ref, caused by fault\ninjection in jffs2_prealloc_raw_node_refs. jffs2_sum_write_sumnode doesn't\ncheck return value of jffs2_prealloc_raw_node_refs and simply lets any\nerror propagate into jffs2_sum_write_data, which eventually calls\njffs2_link_node_ref in order to link the summary to an expectedly allocated\nnode.\n\nkernel BUG at fs/jffs2/nodelist.c:592!\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\nCPU: 1 PID: 31277 Comm: syz-executor.7 Not tainted 6.1.128-syzkaller-00139-ge10f83ca10a1 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:jffs2_link_node_ref+0x570/0x690 fs/jffs2/nodelist.c:592\nCall Trace:\n <TASK>\n jffs2_sum_write_data fs/jffs2/summary.c:841 [inline]\n jffs2_sum_write_sumnode+0xd1a/0x1da0 fs/jffs2/summary.c:874\n jffs2_do_reserve_space+0xa18/0xd60 fs/jffs2/nodemgmt.c:388\n jffs2_reserve_space+0x55f/0xaa0 fs/jffs2/nodemgmt.c:197\n jffs2_write_inode_range+0x246/0xb50 fs/jffs2/write.c:362\n jffs2_write_end+0x726/0x15d0 fs/jffs2/file.c:301\n generic_perform_write+0x314/0x5d0 mm/filemap.c:3856\n __generic_file_write_iter+0x2ae/0x4d0 mm/filemap.c:3973\n generic_file_write_iter+0xe3/0x350 mm/filemap.c:4005\n call_write_iter include/linux/fs.h:2265 [inline]\n do_iter_readv_writev+0x20f/0x3c0 fs/read_write.c:735\n do_iter_write+0x186/0x710 fs/read_write.c:861\n vfs_iter_write+0x70/0xa0 fs/read_write.c:902\n iter_file_splice_write+0x73b/0xc90 fs/splice.c:685\n do_splice_from fs/splice.c:763 [inline]\n direct_splice_actor+0x10c/0x170 fs/splice.c:950\n splice_direct_to_actor+0x337/0xa10 fs/splice.c:896\n do_splice_direct+0x1a9/0x280 fs/splice.c:1002\n do_sendfile+0xb13/0x12c0 fs/read_write.c:1255\n __do_sys_sendfile64 fs/read_write.c:1323 [inline]\n __se_sys_sendfile64 fs/read_write.c:1309 [inline]\n __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nFix this issue by checking return value of jffs2_prealloc_raw_node_refs\nbefore calling jffs2_sum_write_data.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/337f80f3d546e131c7aa90b61d8cde051ae858c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/346cfb9d19ea7feb6fb57917b21c4797fb444dab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3f46644a5131a4793fc95c32a7d0a769745b06e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4adee34098a6ee86a54bf3ec885eab620c126a6b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8ce46dc5b10b0b6f67663202a4921b0e11ad7367",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c0edcdb4fc106d69a2d1a0ce4868193511c389f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/da12ef7e19048dc5714032c2db587a215852b200",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ec9e6f22bce433b260ea226de127ec68042849b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-38195",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.667",
"lastModified": "2025-07-04T14:15:26.667",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Fix panic caused by NULL-PMD in huge_pte_offset()\n\nERROR INFO:\n\nCPU 25 Unable to handle kernel paging request at virtual address 0x0\n ...\n Call Trace:\n [<900000000023c30c>] huge_pte_offset+0x3c/0x58\n [<900000000057fd4c>] hugetlb_follow_page_mask+0x74/0x438\n [<900000000051fee8>] __get_user_pages+0xe0/0x4c8\n [<9000000000522414>] faultin_page_range+0x84/0x380\n [<9000000000564e8c>] madvise_vma_behavior+0x534/0xa48\n [<900000000056689c>] do_madvise+0x1bc/0x3e8\n [<9000000000566df4>] sys_madvise+0x24/0x38\n [<90000000015b9e88>] do_syscall+0x78/0x98\n [<9000000000221f18>] handle_syscall+0xb8/0x158\n\nIn some cases, pmd may be NULL and rely on NULL as the return value for\nprocessing, so it is necessary to determine this situation here."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/985f086f281b7bbb6644851e63af1a17ffff9277",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b427d98d55217b53c88643579fbbd8a4c351a105",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b5c7397b7fd125203c60b59860c168ee92291272",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ee084fa96123ede8b0563a1b5a9b23adc43cd50d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-38196",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.787",
"lastModified": "2025-07-04T14:15:26.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/rsrc: validate buffer count with offset for cloning\n\nsyzbot reports that it can trigger a WARN_ON() for kmalloc() attempt\nthat's too big:\n\nWARNING: CPU: 0 PID: 6488 at mm/slub.c:5024 __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024\nModules linked in:\nCPU: 0 UID: 0 PID: 6488 Comm: syz-executor312 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\npstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024\nlr : __do_kmalloc_node mm/slub.c:-1 [inline]\nlr : __kvmalloc_node_noprof+0x3b4/0x640 mm/slub.c:5012\nsp : ffff80009cfd7a90\nx29: ffff80009cfd7ac0 x28: ffff0000dd52a120 x27: 0000000000412dc0\nx26: 0000000000000178 x25: ffff7000139faf70 x24: 0000000000000000\nx23: ffff800082f4cea8 x22: 00000000ffffffff x21: 000000010cd004a8\nx20: ffff0000d75816c0 x19: ffff0000dd52a000 x18: 00000000ffffffff\nx17: ffff800092f39000 x16: ffff80008adbe9e4 x15: 0000000000000005\nx14: 1ffff000139faf1c x13: 0000000000000000 x12: 0000000000000000\nx11: ffff7000139faf21 x10: 0000000000000003 x9 : ffff80008f27b938\nx8 : 0000000000000002 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 00000000ffffffff x4 : 0000000000400dc0 x3 : 0000000200000000\nx2 : 000000010cd004a8 x1 : ffff80008b3ebc40 x0 : 0000000000000001\nCall trace:\n __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024 (P)\n kvmalloc_array_node_noprof include/linux/slab.h:1065 [inline]\n io_rsrc_data_alloc io_uring/rsrc.c:206 [inline]\n io_clone_buffers io_uring/rsrc.c:1178 [inline]\n io_register_clone_buffers+0x484/0xa14 io_uring/rsrc.c:1287\n __io_uring_register io_uring/register.c:815 [inline]\n __do_sys_io_uring_register io_uring/register.c:926 [inline]\n __se_sys_io_uring_register io_uring/register.c:903 [inline]\n __arm64_sys_io_uring_register+0x42c/0xea8 io_uring/register.c:903\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767\n el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786\n el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600\n\nwhich is due to offset + buffer_count being too large. The registration\ncode checks only the total count of buffers, but given that the indexing\nis an array, it should also check offset + count. That can't exceed\nIORING_MAX_REG_BUFFERS either, as there's no way to reach buffers beyond\nthat limit.\n\nThere's no issue with registrering a table this large, outside of the\nfact that it's pointless to register buffers that cannot be reached, and\nthat it can trigger this kmalloc() warning for attempting an allocation\nthat is too large."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0e23ac818f3afb16660b0ba384875d56a7013879",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1d27f11bf02b38c431e49a17dee5c10a2b4c2e28",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-38197",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:26.913",
"lastModified": "2025-07-04T14:15:26.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: dell_rbu: Fix list usage\n\nPass the correct list head to list_for_each_entry*() when looping through\nthe packet list.\n\nWithout this patch, reading the packet data via sysfs will show the data\nincorrectly (because it starts at the wrong packet), and clearing the\npacket list will result in a NULL pointer dereference."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/07d7b8e7ef7d1f812a6211ed531947c56d09e95e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/32d05e6cc3a7bf6c8f16f7b7ef8fe80eca0c233e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4d71f2c1e5263a9f042faa71d59515709869dc79",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5e8c658acd1b7c186aeffa46bf08795e121f401a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/61ce04601e0d8265ec6d2ffa6df5a7e1bce64854",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a7b477b64ef5e37cb08dd536ae07c46f9f28262e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f3b840fb1508a80cd8a0efb5c886ae1995a88b24",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-38198",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:27.040",
"lastModified": "2025-07-04T14:15:27.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Make sure modelist not set on unregistered console\n\nIt looks like attempting to write to the \"store_modes\" sysfs node will\nrun afoul of unregistered consoles:\n\nUBSAN: array-index-out-of-bounds in drivers/video/fbdev/core/fbcon.c:122:28\nindex -1 is out of range for type 'fb_info *[32]'\n...\n fbcon_info_from_console+0x192/0x1a0 drivers/video/fbdev/core/fbcon.c:122\n fbcon_new_modelist+0xbf/0x2d0 drivers/video/fbdev/core/fbcon.c:3048\n fb_new_modelist+0x328/0x440 drivers/video/fbdev/core/fbmem.c:673\n store_modes+0x1c9/0x3e0 drivers/video/fbdev/core/fbsysfs.c:113\n dev_attr_store+0x55/0x80 drivers/base/core.c:2439\n\nstatic struct fb_info *fbcon_registered_fb[FB_MAX];\n...\nstatic signed char con2fb_map[MAX_NR_CONSOLES];\n...\nstatic struct fb_info *fbcon_info_from_console(int console)\n...\n return fbcon_registered_fb[con2fb_map[console]];\n\nIf con2fb_map contains a -1 things go wrong here. Instead, return NULL,\nas callers of fbcon_info_from_console() are trying to compare against\nexisting \"info\" pointers, so error handling should kick in correctly."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/519ba75728ee8cd561dce25fc52a2ec5c47171dc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/54b28f7c567dd659e5f9562f518e4d7f3f6a367b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b3237d451bf3a4490cb1a76f3b7c91d9888f1c4b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cedc1b63394a866bf8663a3e40f4546f1d28c8d8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f28f1f578cd810779d01999c60618cda14c281dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-38199",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:27.707",
"lastModified": "2025-07-04T14:15:27.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Fix memory leak due to multiple rx_stats allocation\n\nrx_stats for each arsta is allocated when adding a station.\narsta->rx_stats will be freed when a station is removed.\n\nRedundant allocations are occurring when the same station is added\nmultiple times. This causes ath12k_mac_station_add() to be called\nmultiple times, and rx_stats is allocated each time. As a result there\nis memory leaks.\n\nPrevent multiple allocations of rx_stats when ath12k_mac_station_add()\nis called repeatedly by checking if rx_stats is already allocated\nbefore allocating again. Allocate arsta->rx_stats if arsta->rx_stats\nis NULL respectively.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1\nTested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/232f962ae5fca98912a719e64b4964a5aec7c99b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c426497fa2055c8005196922e7d29c41d7e0948a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38200",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:27.877",
"lastModified": "2025-07-04T14:15:27.877",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix MMIO write access to an invalid page in i40e_clear_hw\n\nWhen the device sends a specific input, an integer underflow can occur, leading\nto MMIO write access to an invalid page.\n\nPrevent the integer underflow by changing the type of related variables."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/015bac5daca978448f2671478c553ce1f300c21e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2a1f4f2e36442a9bdf771acf6ee86f3cf876e5ca",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3502dd42f178dae9d54696013386bb52b4f2e655",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5e75c9082987479e647c75ec8fdf18fa68263c42",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/872607632c658d3739e4e7889e4f3c419ae2c193",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8cde755f56163281ec2c46b4ae8b61f532758a6f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d88a1e8f024ba26e19350958fecbf771a9960352",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fecb2fc3fc10c95724407cc45ea35af4a65cdde2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-38201",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.000",
"lastModified": "2025-07-04T14:15:28.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX\n\nOtherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof()\nwhen resizing hashtable because __GFP_NOWARN is unset.\n\nSimilar to:\n\n b541ba7d1f5a (\"netfilter: conntrack: clamp maximum hashtable size to INT_MAX\")"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0ab3de047808f375a36cd345225572eb3366f3c6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b85e3367a5716ed3662a4fe266525190d2af76df",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d2768016f091f8a5264076b433fd7c3fabb6eb97",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-38202",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.117",
"lastModified": "2025-07-04T14:15:28.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()\n\nbpf_map_lookup_percpu_elem() helper is also available for sleepable bpf\nprogram. When BPF JIT is disabled or under 32-bit host,\nbpf_map_lookup_percpu_elem() will not be inlined. Using it in a\nsleepable bpf program will trigger the warning in\nbpf_map_lookup_percpu_elem(), because the bpf program only holds\nrcu_read_lock_trace lock. Therefore, add the missed check."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2d834477bbc1e8b8a59ff8b0c081529d6bed7b22",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2f8c69a72e8ad87b36b8052f789da3cc2b2e186c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7bf4461f1c97207fda757014690d55a447ce859f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b522d4d334f206284b1a44b0b0b2f99fd443b39b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d4965578267e2e81f67c86e2608481e77e9c8569",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-38203",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.247",
"lastModified": "2025-07-04T14:15:28.247",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: Fix null-ptr-deref in jfs_ioc_trim\n\n[ Syzkaller Report ]\n\nOops: general protection fault, probably for non-canonical address\n0xdffffc0000000087: 0000 [#1\nKASAN: null-ptr-deref in range [0x0000000000000438-0x000000000000043f]\nCPU: 2 UID: 0 PID: 10614 Comm: syz-executor.0 Not tainted\n6.13.0-rc6-gfbfd64d25c7a-dirty #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nSched_ext: serialise (enabled+all), task: runnable_at=-30ms\nRIP: 0010:jfs_ioc_trim+0x34b/0x8f0\nCode: e7 e8 59 a4 87 fe 4d 8b 24 24 4d 8d bc 24 38 04 00 00 48 8d 93\n90 82 fe ff 4c 89 ff 31 f6\nRSP: 0018:ffffc900055f7cd0 EFLAGS: 00010206\nRAX: 0000000000000087 RBX: 00005866a9e67ff8 RCX: 000000000000000a\nRDX: 0000000000000001 RSI: 0000000000000004 RDI: 0000000000000001\nRBP: dffffc0000000000 R08: ffff88807c180003 R09: 1ffff1100f830000\nR10: dffffc0000000000 R11: ffffed100f830001 R12: 0000000000000000\nR13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000438\nFS: 00007fe520225640(0000) GS:ffff8880b7e80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005593c91b2c88 CR3: 000000014927c000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<TASK>\n? __die_body+0x61/0xb0\n? die_addr+0xb1/0xe0\n? exc_general_protection+0x333/0x510\n? asm_exc_general_protection+0x26/0x30\n? jfs_ioc_trim+0x34b/0x8f0\njfs_ioctl+0x3c8/0x4f0\n? __pfx_jfs_ioctl+0x10/0x10\n? __pfx_jfs_ioctl+0x10/0x10\n__se_sys_ioctl+0x269/0x350\n? __pfx___se_sys_ioctl+0x10/0x10\n? do_syscall_64+0xfb/0x210\ndo_syscall_64+0xee/0x210\n? syscall_exit_to_user_mode+0x1e0/0x330\nentry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fe51f4903ad\nCode: c3 e8 a7 2b 00 00 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 89 f8 48\n89 f7 48 89 d6 48 89 ca 4d\nRSP: 002b:00007fe5202250c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007fe51f5cbf80 RCX: 00007fe51f4903ad\nRDX: 0000000020000680 RSI: 00000000c0185879 RDI: 0000000000000005\nRBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fe520225640\nR13: 000000000000000e R14: 00007fe51f44fca0 R15: 00007fe52021d000\n</TASK>\nModules linked in:\n---[ end trace 0000000000000000 ]---\nRIP: 0010:jfs_ioc_trim+0x34b/0x8f0\nCode: e7 e8 59 a4 87 fe 4d 8b 24 24 4d 8d bc 24 38 04 00 00 48 8d 93\n90 82 fe ff 4c 89 ff 31 f6\nRSP: 0018:ffffc900055f7cd0 EFLAGS: 00010206\nRAX: 0000000000000087 RBX: 00005866a9e67ff8 RCX: 000000000000000a\nRDX: 0000000000000001 RSI: 0000000000000004 RDI: 0000000000000001\nRBP: dffffc0000000000 R08: ffff88807c180003 R09: 1ffff1100f830000\nR10: dffffc0000000000 R11: ffffed100f830001 R12: 0000000000000000\nR13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000438\nFS: 00007fe520225640(0000) GS:ffff8880b7e80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005593c91b2c88 CR3: 000000014927c000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nKernel panic - not syncing: Fatal exception\n\n[ Analysis ]\n\nWe believe that we have found a concurrency bug in the `fs/jfs` module\nthat results in a null pointer dereference. There is a closely related\nissue which has been fixed:\n\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d6c1b3599b2feb5c7291f5ac3a36e5fa7cedb234\n\n... but, unfortunately, the accepted patch appears to still be\nsusceptible to a null pointer dereference under some interleavings.\n\nTo trigger the bug, we think that `JFS_SBI(ipbmap->i_sb)->bmap` is set\nto NULL in `dbFreeBits` and then dereferenced in `jfs_ioc_trim`. This\nbug manifests quite rarely under normal circumstances, but is\ntriggereable from a syz-program."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0d50231d473f89024158dc62624930de45d13718",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4a8cb9908b51500a76f5156423bd295df53bff89",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9806ae34d7d661c372247cd36f83bfa0523d60ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a4685408ff6c3e2af366ad9a7274f45ff3f394ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a9d41c925069c950e18160e12a7e10e0f58c56fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-38204",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.383",
"lastModified": "2025-07-04T14:15:28.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds read in add_missing_indices\n\nstbl is s8 but it must contain offsets into slot which can go from 0 to\n127.\n\nAdded a bound check for that error and return -EIO if the check fails.\nAlso make jfs_readdir return with error if add_missing_indices returns\nwith an error."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/44618bee303bed151ef3a525ff79fbd7689593b5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5dff41a86377563f7a2b968aae00d25b4ceb37c9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/81af4b34fd72d390d7f237c6a545cc6d09707956",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bfa4655d28f338e68d345aed80d19be7999bbce2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c8399564a58fb6ea2ff21a6fd278417943cb51a5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-38205",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.540",
"lastModified": "2025-07-04T14:15:28.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Avoid divide by zero by initializing dummy pitch to 1\n\n[Why]\nIf the dummy values in `populate_dummy_dml_surface_cfg()` aren't updated\nthen they can lead to a divide by zero in downstream callers like\nCalculateVMAndRowBytes()\n\n[How]\nInitialize dummy value to a value to avoid divide by zero."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/7e40f64896e8e3dca471e287672db5ace12ea0be",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8044f981b2cf8c32fe1bd5d1fc991552cdf7ffe0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-38206",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.703",
"lastModified": "2025-07-04T14:15:28.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nexfat: fix double free in delayed_free\n\nThe double free could happen in the following path.\n\nexfat_create_upcase_table()\n exfat_create_upcase_table() : return error\n exfat_free_upcase_table() : free ->vol_utbl\n exfat_load_default_upcase_table : return error\n exfat_kill_sb()\n delayed_free()\n exfat_free_upcase_table() <--------- double free\nThis patch set ->vol_util as NULL after freeing it."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/13d8de1b6568dcc31a95534ced16bc0c9a67bc15",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1f3d9724e16d62c7d42c67d6613b8512f2887c22",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/66e84439ec2af776ce749e8540f8fdd257774152",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d3cef0e7a5c1aa6217c51faa9ce8ecac35d6e1fd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-38207",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.823",
"lastModified": "2025-07-04T14:15:28.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix uprobe pte be overwritten when expanding vma\n\nPatch series \"Fix uprobe pte be overwritten when expanding vma\".\n\n\nThis patch (of 4):\n\nWe encountered a BUG alert triggered by Syzkaller as follows:\n BUG: Bad rss-counter state mm:00000000b4a60fca type:MM_ANONPAGES val:1\n\nAnd we can reproduce it with the following steps:\n1. register uprobe on file at zero offset\n2. mmap the file at zero offset:\n addr1 = mmap(NULL, 2 * 4096, PROT_NONE, MAP_PRIVATE, fd, 0);\n3. mremap part of vma1 to new vma2:\n addr2 = mremap(addr1, 4096, 2 * 4096, MREMAP_MAYMOVE);\n4. mremap back to orig addr1:\n mremap(addr2, 4096, 4096, MREMAP_MAYMOVE | MREMAP_FIXED, addr1);\n\nIn step 3, the vma1 range [addr1, addr1 + 4096] will be remap to new vma2\nwith range [addr2, addr2 + 8192], and remap uprobe anon page from the vma1\nto vma2, then unmap the vma1 range [addr1, addr1 + 4096].\n\nIn step 4, the vma2 range [addr2, addr2 + 4096] will be remap back to the\naddr range [addr1, addr1 + 4096]. Since the addr range [addr1 + 4096,\naddr1 + 8192] still maps the file, it will take vma_merge_new_range to\nexpand the range, and then do uprobe_mmap in vma_complete. Since the\nmerged vma pgoff is also zero offset, it will install uprobe anon page to\nthe merged vma. However, the upcomming move_page_tables step, which use\nset_pte_at to remap the vma2 uprobe pte to the merged vma, will overwrite\nthe newly uprobe pte in the merged vma, and lead that pte to be orphan.\n\nSince the uprobe pte will be remapped to the merged vma, we can remove the\nunnecessary uprobe_mmap upon merged vma.\n\nThis problem was first found in linux-6.6.y and also exists in the\ncommunity syzkaller:\nhttps://lore.kernel.org/all/000000000000ada39605a5e71711@google.com/T/"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2b12d06c37fd3a394376f42f026a7478d826ed63",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/58b83b9a9a929611a2a2e7d88f45cb0d786b7ee0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-38208",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:28.950",
"lastModified": "2025-07-04T14:15:28.950",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: add NULL check in automount_fullpath\n\npage is checked for null in __build_path_from_dentry_optional_prefix\nwhen tcon->origin_fullpath is not set. However, the check is missing when\nit is set.\nAdd a check to prevent a potential NULL pointer dereference."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/37166d63e42c34846a16001950ecec96229a8d17",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a9e916fa5c7d0ec2256aa44aa24ddd92f529ce35",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cce8e71ca1f7ad9045707f0d22490c1e9ed1df6c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f1e7a277a1736e12cc4bd6d93b8a5c439b8ca20c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-38209",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.080",
"lastModified": "2025-07-04T14:15:29.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: remove tag set when second admin queue config fails\n\nCommit 104d0e2f6222 (\"nvme-fabrics: reset admin connection for secure\nconcatenation\") modified nvme_tcp_setup_ctrl() to call\nnvme_tcp_configure_admin_queue() twice. The first call prepares for\nDH-CHAP negotitation, and the second call is required for secure\nconcatenation. However, this change triggered BUG KASAN slab-use-after-\nfree in blk_mq_queue_tag_busy_iter(). This BUG can be recreated by\nrepeating the blktests test case nvme/063 a few times [1].\n\nWhen the BUG happens, nvme_tcp_create_ctrl() fails in the call chain\nbelow:\n\nnvme_tcp_create_ctrl()\n nvme_tcp_alloc_ctrl() new=true ... Alloc nvme_tcp_ctrl and admin_tag_set\n nvme_tcp_setup_ctrl() new=true\n nvme_tcp_configure_admin_queue() new=true ... Succeed\n nvme_alloc_admin_tag_set() ... Alloc the tag set for admin_tag_set\n nvme_stop_keep_alive()\n nvme_tcp_teardown_admin_queue() remove=false\n nvme_tcp_configure_admin_queue() new=false\n nvme_tcp_alloc_admin_queue() ... Fail, but do not call nvme_remove_admin_tag_set()\n nvme_uninit_ctrl()\n nvme_put_ctrl() ... Free up the nvme_tcp_ctrl and admin_tag_set\n\nThe first call of nvme_tcp_configure_admin_queue() succeeds with\nnew=true argument. The second call fails with new=false argument. This\nsecond call does not call nvme_remove_admin_tag_set() on failure, due to\nthe new=false argument. Then the admin tag set is not removed. However,\nnvme_tcp_create_ctrl() assumes that nvme_tcp_setup_ctrl() would call\nnvme_remove_admin_tag_set(). Then it frees up struct nvme_tcp_ctrl which\nhas admin_tag_set field. Later on, the timeout handler accesses the\nadmin_tag_set field and causes the BUG KASAN slab-use-after-free.\n\nTo not leave the admin tag set, call nvme_remove_admin_tag_set() when\nthe second nvme_tcp_configure_admin_queue() call fails. Do not return\nfrom nvme_tcp_setup_ctrl() on failure. Instead, jump to \"destroy_admin\"\ngo-to label to call nvme_tcp_teardown_admin_queue() which calls\nnvme_remove_admin_tag_set()."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/db1da838b6012e4570c6f81e28ffe1d0ff595948",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e7143706702a209c814ed2c3fc6486c2a7decf6c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-38210",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.207",
"lastModified": "2025-07-04T14:15:29.207",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nconfigfs-tsm-report: Fix NULL dereference of tsm_ops\n\nUnlike sysfs, the lifetime of configfs objects is controlled by\nuserspace. There is no mechanism for the kernel to find and delete all\ncreated config-items. Instead, the configfs-tsm-report mechanism has an\nexpectation that tsm_unregister() can happen at any time and cause\nestablished config-item access to start failing.\n\nThat expectation is not fully satisfied. While tsm_report_read(),\ntsm_report_{is,is_bin}_visible(), and tsm_report_make_item() safely fail\nif tsm_ops have been unregistered, tsm_report_privlevel_store()\ntsm_report_provider_show() fail to check for ops registration. Add the\nmissing checks for tsm_ops having been removed.\n\nNow, in supporting the ability for tsm_unregister() to always succeed,\nit leaves the problem of what to do with lingering config-items. The\nexpectation is that the admin that arranges for the ->remove() (unbind)\nof the ${tsm_arch}-guest driver is also responsible for deletion of all\nopen config-items. Until that deletion happens, ->probe() (reload /\nbind) of the ${tsm_arch}-guest driver fails.\n\nThis allows for emergency shutdown / revocation of attestation\ninterfaces, and requires coordinated restart."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/015f04ac884a454d4d8aaa7b67758f047742b1cf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cefbafcbdef011d6ef9414902311afdfba3c33eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fba4ceaa242d2bdf4c04b77bda41d32d02d3925d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-38211",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.337",
"lastModified": "2025-07-04T14:15:29.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/iwcm: Fix use-after-free of work objects after cm_id destruction\n\nThe commit 59c68ac31e15 (\"iw_cm: free cm_id resources on the last\nderef\") simplified cm_id resource management by freeing cm_id once all\nreferences to the cm_id were removed. The references are removed either\nupon completion of iw_cm event handlers or when the application destroys\nthe cm_id. This commit introduced the use-after-free condition where\ncm_id_private object could still be in use by event handler works during\nthe destruction of cm_id. The commit aee2424246f9 (\"RDMA/iwcm: Fix a\nuse-after-free related to destroying CM IDs\") addressed this use-after-\nfree by flushing all pending works at the cm_id destruction.\n\nHowever, still another use-after-free possibility remained. It happens\nwith the work objects allocated for each cm_id_priv within\nalloc_work_entries() during cm_id creation, and subsequently freed in\ndealloc_work_entries() once all references to the cm_id are removed.\nIf the cm_id's last reference is decremented in the event handler work,\nthe work object for the work itself gets removed, and causes the use-\nafter-free BUG below:\n\n BUG: KASAN: slab-use-after-free in __pwq_activate_work+0x1ff/0x250\n Read of size 8 at addr ffff88811f9cf800 by task kworker/u16:1/147091\n\n CPU: 2 UID: 0 PID: 147091 Comm: kworker/u16:1 Not tainted 6.15.0-rc2+ #27 PREEMPT(voluntary)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014\n Workqueue: 0x0 (iw_cm_wq)\n Call Trace:\n <TASK>\n dump_stack_lvl+0x6a/0x90\n print_report+0x174/0x554\n ? __virt_addr_valid+0x208/0x430\n ? __pwq_activate_work+0x1ff/0x250\n kasan_report+0xae/0x170\n ? __pwq_activate_work+0x1ff/0x250\n __pwq_activate_work+0x1ff/0x250\n pwq_dec_nr_in_flight+0x8c5/0xfb0\n process_one_work+0xc11/0x1460\n ? __pfx_process_one_work+0x10/0x10\n ? assign_work+0x16c/0x240\n worker_thread+0x5ef/0xfd0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x3b0/0x770\n ? __pfx_kthread+0x10/0x10\n ? rcu_is_watching+0x11/0xb0\n ? _raw_spin_unlock_irq+0x24/0x50\n ? rcu_is_watching+0x11/0xb0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x30/0x70\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\n Allocated by task 147416:\n kasan_save_stack+0x2c/0x50\n kasan_save_track+0x10/0x30\n __kasan_kmalloc+0xa6/0xb0\n alloc_work_entries+0xa9/0x260 [iw_cm]\n iw_cm_connect+0x23/0x4a0 [iw_cm]\n rdma_connect_locked+0xbfd/0x1920 [rdma_cm]\n nvme_rdma_cm_handler+0x8e5/0x1b60 [nvme_rdma]\n cma_cm_event_handler+0xae/0x320 [rdma_cm]\n cma_work_handler+0x106/0x1b0 [rdma_cm]\n process_one_work+0x84f/0x1460\n worker_thread+0x5ef/0xfd0\n kthread+0x3b0/0x770\n ret_from_fork+0x30/0x70\n ret_from_fork_asm+0x1a/0x30\n\n Freed by task 147091:\n kasan_save_stack+0x2c/0x50\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kfree+0x13a/0x4b0\n dealloc_work_entries+0x125/0x1f0 [iw_cm]\n iwcm_deref_id+0x6f/0xa0 [iw_cm]\n cm_work_handler+0x136/0x1ba0 [iw_cm]\n process_one_work+0x84f/0x1460\n worker_thread+0x5ef/0xfd0\n kthread+0x3b0/0x770\n ret_from_fork+0x30/0x70\n ret_from_fork_asm+0x1a/0x30\n\n Last potentially related work creation:\n kasan_save_stack+0x2c/0x50\n kasan_record_aux_stack+0xa3/0xb0\n __queue_work+0x2ff/0x1390\n queue_work_on+0x67/0xc0\n cm_event_handler+0x46a/0x820 [iw_cm]\n siw_cm_upcall+0x330/0x650 [siw]\n siw_cm_work_handler+0x6b9/0x2b20 [siw]\n process_one_work+0x84f/0x1460\n worker_thread+0x5ef/0xfd0\n kthread+0x3b0/0x770\n ret_from_fork+0x30/0x70\n ret_from_fork_asm+0x1a/0x30\n\nThis BUG is reproducible by repeating the blktests test case nvme/061\nfor the rdma transport and the siw driver.\n\nTo avoid the use-after-free of cm_id_private work objects, ensure that\nthe last reference to the cm_id is decremented not in the event handler\nworks, but in the cm_id destruction context. For that purpose, mo\n---truncated---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/23a707bbcbea468eedb398832eeb7e8e0ceafd21",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3b4a50d733acad6831f6bd9288a76a80f70650ac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6883b680e703c6b2efddb4e7a8d891ce1803d06b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/764c9f69beabef8bdc651a7746c59f7a340d104f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/78381dc8a6b61c9bb9987d37b4d671b99767c4a1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fd960b5ddf4faf00da43babdd3acda68842e1f6a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38212",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.473",
"lastModified": "2025-07-04T14:15:29.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc: fix to protect IPCS lookups using RCU\n\nsyzbot reported that it discovered a use-after-free vulnerability, [0]\n\n[0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/\n\nidr_for_each() is protected by rwsem, but this is not enough. If it is\nnot protected by RCU read-critical region, when idr_for_each() calls\nradix_tree_node_free() through call_rcu() to free the radix_tree_node\nstructure, the node will be freed immediately, and when reading the next\nnode in radix_tree_for_each_slot(), the already freed memory may be read.\n\nTherefore, we need to add code to make sure that idr_for_each() is\nprotected within the RCU read-critical region when we call it in\nshm_destroy_orphaned()."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/5180561afff8e0f029073c8c8117c95c6512d1f9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5f1e1573bf103303944fd7225559de5d8297539c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/68c173ea138b66d7dd1fd980c9bc578a18e11884",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/74bc813d11c30e28fc5261dc877cca662ccfac68",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/78297d53d3878d43c1d627d20cd09f611fa4b91d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b968ba8bfd9f90914957bbbd815413bf6a98eca7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d66adabe91803ef34a8b90613c81267b5ded1472",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38213",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.710",
"lastModified": "2025-07-04T14:15:29.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvgacon: Add check for vc_origin address range in vgacon_scroll()\n\nOur in-house Syzkaller reported the following BUG (twice), which we\nbelieved was the same issue with [1]:\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in vcs_scr_readw+0xc2/0xd0 drivers/tty/vt/vt.c:4740\nRead of size 2 at addr ffff88800f5bef60 by task syz.7.2620/12393\n...\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x72/0xa0 lib/dump_stack.c:106\n print_address_description.constprop.0+0x6b/0x3d0 mm/kasan/report.c:364\n print_report+0xba/0x280 mm/kasan/report.c:475\n kasan_report+0xa9/0xe0 mm/kasan/report.c:588\n vcs_scr_readw+0xc2/0xd0 drivers/tty/vt/vt.c:4740\n vcs_write_buf_noattr drivers/tty/vt/vc_screen.c:493 [inline]\n vcs_write+0x586/0x840 drivers/tty/vt/vc_screen.c:690\n vfs_write+0x219/0x960 fs/read_write.c:584\n ksys_write+0x12e/0x260 fs/read_write.c:639\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x59/0x110 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x78/0xe2\n ...\n </TASK>\n\nAllocated by task 5614:\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\n ____kasan_kmalloc mm/kasan/common.c:374 [inline]\n __kasan_kmalloc+0x8f/0xa0 mm/kasan/common.c:383\n kasan_kmalloc include/linux/kasan.h:201 [inline]\n __do_kmalloc_node mm/slab_common.c:1007 [inline]\n __kmalloc+0x62/0x140 mm/slab_common.c:1020\n kmalloc include/linux/slab.h:604 [inline]\n kzalloc include/linux/slab.h:721 [inline]\n vc_do_resize+0x235/0xf40 drivers/tty/vt/vt.c:1193\n vgacon_adjust_height+0x2d4/0x350 drivers/video/console/vgacon.c:1007\n vgacon_font_set+0x1f7/0x240 drivers/video/console/vgacon.c:1031\n con_font_set drivers/tty/vt/vt.c:4628 [inline]\n con_font_op+0x4da/0xa20 drivers/tty/vt/vt.c:4675\n vt_k_ioctl+0xa10/0xb30 drivers/tty/vt/vt_ioctl.c:474\n vt_ioctl+0x14c/0x1870 drivers/tty/vt/vt_ioctl.c:752\n tty_ioctl+0x655/0x1510 drivers/tty/tty_io.c:2779\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:871 [inline]\n __se_sys_ioctl+0x12d/0x190 fs/ioctl.c:857\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x59/0x110 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\nLast potentially related work creation:\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\n __kasan_record_aux_stack+0x94/0xa0 mm/kasan/generic.c:492\n __call_rcu_common.constprop.0+0xc3/0xa10 kernel/rcu/tree.c:2713\n netlink_release+0x620/0xc20 net/netlink/af_netlink.c:802\n __sock_release+0xb5/0x270 net/socket.c:663\n sock_close+0x1e/0x30 net/socket.c:1425\n __fput+0x408/0xab0 fs/file_table.c:384\n __fput_sync+0x4c/0x60 fs/file_table.c:465\n __do_sys_close fs/open.c:1580 [inline]\n __se_sys_close+0x68/0xd0 fs/open.c:1565\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x59/0x110 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\n __kasan_record_aux_stack+0x94/0xa0 mm/kasan/generic.c:492\n __call_rcu_common.constprop.0+0xc3/0xa10 kernel/rcu/tree.c:2713\n netlink_release+0x620/0xc20 net/netlink/af_netlink.c:802\n __sock_release+0xb5/0x270 net/socket.c:663\n sock_close+0x1e/0x30 net/socket.c:1425\n __fput+0x408/0xab0 fs/file_table.c:384\n task_work_run+0x154/0x240 kernel/task_work.c:239\n exit_task_work include/linux/task_work.h:45 [inline]\n do_exit+0x8e5/0x1320 kernel/exit.c:874\n do_group_exit+0xcd/0x280 kernel/exit.c:1023\n get_signal+0x1675/0x1850 kernel/signal.c:2905\n arch_do_signal_or_restart+0x80/0x3b0 arch/x86/kernel/signal.c:310\n exit_to_user_mode_loop kernel/entry/common.c:111 [inline]\n exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]\n __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]\n syscall_exit_to_user_mode+0x1b3/0x1e0 kernel/entry/common.c:218\n do_syscall_64+0x66/0x110 arch/x86/ent\n---truncated---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2f4040a5855a59e48296f1b5a7cc0fceea3195b1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/499b77fa1416a85fee106e60b240e912bca10cb8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/843de5fbfe277e30fb333a7fa033b684c37829ac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/864f9963ec6b4b76d104d595ba28110b87158003",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9928ba7de39793a1c7c77b8b9e6ecf6209110311",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bf9c07864765864b968e59c7b72db91130d621ca",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e44532b1c358bfd2c4c7dc28fd01d47fef09ac70",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f20fd54af4e1077fdbca4dd98375a4d1d941e50d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38214",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.843",
"lastModified": "2025-07-04T14:15:29.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var\n\nIf fb_add_videomode() in fb_set_var() fails to allocate memory for\nfb_videomode, later it may lead to a null-ptr dereference in\nfb_videomode_to_var(), as the fb_info is registered while not having the\nmode in modelist that is expected to be there, i.e. the one that is\ndescribed in fb_info->var.\n\n================================================================\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\nCPU: 1 PID: 30371 Comm: syz-executor.1 Not tainted 5.10.226-syzkaller #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:fb_videomode_to_var+0x24/0x610 drivers/video/fbdev/core/modedb.c:901\nCall Trace:\n display_to_var+0x3a/0x7c0 drivers/video/fbdev/core/fbcon.c:929\n fbcon_resize+0x3e2/0x8f0 drivers/video/fbdev/core/fbcon.c:2071\n resize_screen drivers/tty/vt/vt.c:1176 [inline]\n vc_do_resize+0x53a/0x1170 drivers/tty/vt/vt.c:1263\n fbcon_modechanged+0x3ac/0x6e0 drivers/video/fbdev/core/fbcon.c:2720\n fbcon_update_vcs+0x43/0x60 drivers/video/fbdev/core/fbcon.c:2776\n do_fb_ioctl+0x6d2/0x740 drivers/video/fbdev/core/fbmem.c:1128\n fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1203\n vfs_ioctl fs/ioctl.c:48 [inline]\n __do_sys_ioctl fs/ioctl.c:753 [inline]\n __se_sys_ioctl fs/ioctl.c:739 [inline]\n __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739\n do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46\n entry_SYSCALL_64_after_hwframe+0x67/0xd1\n================================================================\n\nThe reason is that fb_info->var is being modified in fb_set_var(), and\nthen fb_videomode_to_var() is called. If it fails to add the mode to\nfb_info->modelist, fb_set_var() returns error, but does not restore the\nold value of fb_info->var. Restore fb_info->var on failure the same way\nit is done earlier in the function.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/05f6e183879d9785a3cdf2f08a498bc31b7a20aa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1a10d91766eb6ddfd5414e4785611e33a4fe0f9b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3ca78032a388a0795201792b36e6fc9b6e6e8eed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8a3a2887794b2c8e78b3e5d6e3de724527c9f41b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b3071bb463ea1e6c686d0dc9638fc940f2f5cf17",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ee20216f12d9482cd70e44dae5e7fabb38367c71",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fab201d72fde38d081e2c5d4ad25595c535b7b22",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ff0e037241173b574b385bff53d67567b9816db5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-38215",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:29.980",
"lastModified": "2025-07-04T14:15:29.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var\n\nIf fb_add_videomode() in do_register_framebuffer() fails to allocate\nmemory for fb_videomode, it will later lead to a null-ptr dereference in\nfb_videomode_to_var(), as the fb_info is registered while not having the\nmode in modelist that is expected to be there, i.e. the one that is\ndescribed in fb_info->var.\n\n================================================================\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\nCPU: 1 PID: 30371 Comm: syz-executor.1 Not tainted 5.10.226-syzkaller #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:fb_videomode_to_var+0x24/0x610 drivers/video/fbdev/core/modedb.c:901\nCall Trace:\n display_to_var+0x3a/0x7c0 drivers/video/fbdev/core/fbcon.c:929\n fbcon_resize+0x3e2/0x8f0 drivers/video/fbdev/core/fbcon.c:2071\n resize_screen drivers/tty/vt/vt.c:1176 [inline]\n vc_do_resize+0x53a/0x1170 drivers/tty/vt/vt.c:1263\n fbcon_modechanged+0x3ac/0x6e0 drivers/video/fbdev/core/fbcon.c:2720\n fbcon_update_vcs+0x43/0x60 drivers/video/fbdev/core/fbcon.c:2776\n do_fb_ioctl+0x6d2/0x740 drivers/video/fbdev/core/fbmem.c:1128\n fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1203\n vfs_ioctl fs/ioctl.c:48 [inline]\n __do_sys_ioctl fs/ioctl.c:753 [inline]\n __se_sys_ioctl fs/ioctl.c:739 [inline]\n __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739\n do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46\n entry_SYSCALL_64_after_hwframe+0x67/0xd1\n================================================================\n\nEven though fbcon_init() checks beforehand if fb_match_mode() in\nvar_to_display() fails, it can not prevent the panic because fbcon_init()\ndoes not return error code. Considering this and the comment in the code\nabout fb_match_mode() returning NULL - \"This should not happen\" - it is\nbetter to prevent registering the fb_info if its mode was not set\nsuccessfully. Also move fb_add_videomode() closer to the beginning of\ndo_register_framebuffer() to avoid having to do the cleanup on fail.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0909b2b49c4546a7a08c80f53d93736b63270827",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/17186f1f90d34fa701e4f14e6818305151637b9e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3f2098f4fba7718eb2501207ca6e99d22427f25a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d803c4c2a4ac8ce2be6d899d5c7ab0bf7ec355e9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-38216",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.103",
"lastModified": "2025-07-04T14:15:30.103",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Restore context entry setup order for aliased devices\n\nCommit 2031c469f816 (\"iommu/vt-d: Add support for static identity domain\")\nchanged the context entry setup during domain attachment from a\nset-and-check policy to a clear-and-reset approach. This inadvertently\nintroduced a regression affecting PCI aliased devices behind PCIe-to-PCI\nbridges.\n\nSpecifically, keyboard and touchpad stopped working on several Apple\nMacbooks with below messages:\n\n kernel: platform pxa2xx-spi.3: Adding to iommu group 20\n kernel: input: Apple SPI Keyboard as\n /devices/pci0000:00/0000:00:1e.3/pxa2xx-spi.3/spi_master/spi2/spi-APP000D:00/input/input0\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr\n 0xffffa000 [fault reason 0x06] PTE Read access is not set\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr\n 0xffffa000 [fault reason 0x06] PTE Read access is not set\n kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr\n 0xffffa000 [fault reason 0x06] PTE Read access is not set\n kernel: DMAR: DRHD: handling fault status reg 3\n kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00\n\nFix this by restoring the previous context setup order."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/320302baed05c6456164652541f23d2a96522c06",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d43c81b691813e16a2d08208ce8947aebdab83cd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fb5873b779dd5858123c19bbd6959566771e2e83",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-38217",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.227",
"lastModified": "2025-07-04T14:15:30.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (ftsteutates) Fix TOCTOU race in fts_read()\n\nIn the fts_read() function, when handling hwmon_pwm_auto_channels_temp,\nthe code accesses the shared variable data->fan_source[channel] twice\nwithout holding any locks. It is first checked against\nFTS_FAN_SOURCE_INVALID, and if the check passes, it is read again\nwhen used as an argument to the BIT() macro.\n\nThis creates a Time-of-Check to Time-of-Use (TOCTOU) race condition.\nAnother thread executing fts_update_device() can modify the value of\ndata->fan_source[channel] between the check and its use. If the value\nis changed to FTS_FAN_SOURCE_INVALID (0xff) during this window, the\nBIT() macro will be called with a large shift value (BIT(255)).\nA bit shift by a value greater than or equal to the type width is\nundefined behavior and can lead to a crash or incorrect values being\nreturned to userspace.\n\nFix this by reading data->fan_source[channel] into a local variable\nonce, eliminating the race condition. Additionally, add a bounds check\nto ensure the value is less than BITS_PER_LONG before passing it to\nthe BIT() macro, making the code more robust against undefined behavior.\n\nThis possible bug was found by an experimental static analysis tool\ndeveloped by our team."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/14c9ede9ca4cd078ad76a6ab9617b81074eb58bf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4d646f627d3b7ed1cacca66e598af8bcd632d465",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/83e2ba8971ccd8fc08319fc7593288f070d80a76",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d95d87841d2a575bed3691884e8fedef57d7710d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-38218",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.353",
"lastModified": "2025-07-04T14:15:30.353",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on sit_bitmap_size\n\nw/ below testcase, resize will generate a corrupted image which\ncontains inconsistent metadata, so when mounting such image, it\nwill trigger kernel panic:\n\ntouch img\ntruncate -s $((512*1024*1024*1024)) img\nmkfs.f2fs -f img $((256*1024*1024))\nresize.f2fs -s -i img -t $((1024*1024*1024))\nmount img /mnt/f2fs\n\n------------[ cut here ]------------\nkernel BUG at fs/f2fs/segment.h:863!\nOops: invalid opcode: 0000 [#1] SMP PTI\nCPU: 11 UID: 0 PID: 3922 Comm: mount Not tainted 6.15.0-rc1+ #191 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nRIP: 0010:f2fs_ra_meta_pages+0x47c/0x490\n\nCall Trace:\n f2fs_build_segment_manager+0x11c3/0x2600\n f2fs_fill_super+0xe97/0x2840\n mount_bdev+0xf4/0x140\n legacy_get_tree+0x2b/0x50\n vfs_get_tree+0x29/0xd0\n path_mount+0x487/0xaf0\n __x64_sys_mount+0x116/0x150\n do_syscall_64+0x82/0x190\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7fdbfde1bcfe\n\nThe reaseon is:\n\nsit_i->bitmap_size is 192, so size of sit bitmap is 192*8=1536, at maximum\nthere are 1536 sit blocks, however MAIN_SEGS is 261893, so that sit_blk_cnt\nis 4762, build_sit_entries() -> current_sit_addr() tries to access\nout-of-boundary in sit_bitmap at offset from [1536, 4762), once sit_bitmap\nand sit_bitmap_mirror is not the same, it will trigger f2fs_bug_on().\n\nLet's add sanity check in f2fs_sanity_check_ckpt() to avoid panic."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/38ef48a8afef8df646b6f6ae7abb872f18b533c1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3e5ac62a56a24f4d88ce8ffd7bc452428b235868",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5db0d252c64e91ba1929c70112352e85dc5751e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/79ef8a6c4ec53d327580fd7d2b522cf4f1d05b0c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/82f51bff393e4c12cf4de553120ca831cfa4ef19",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ad862f71016ba38039df1c96ed55c0a4314cc183",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ee1b421c469876544e297ec1090574bd76100247",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38219",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.473",
"lastModified": "2025-07-04T14:15:30.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: prevent kernel warning due to negative i_nlink from corrupted image\n\nWARNING: CPU: 1 PID: 9426 at fs/inode.c:417 drop_nlink+0xac/0xd0\nhome/cc/linux/fs/inode.c:417\nModules linked in:\nCPU: 1 UID: 0 PID: 9426 Comm: syz-executor568 Not tainted\n6.14.0-12627-g94d471a4f428 #2 PREEMPT(full)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nRIP: 0010:drop_nlink+0xac/0xd0 home/cc/linux/fs/inode.c:417\nCode: 48 8b 5d 28 be 08 00 00 00 48 8d bb 70 07 00 00 e8 f9 67 e6 ff\nf0 48 ff 83 70 07 00 00 5b 5d e9 9a 12 82 ff e8 95 12 82 ff 90\n&lt;0f&gt; 0b 90 c7 45 48 ff ff ff ff 5b 5d e9 83 12 82 ff e8 fe 5f e6\nff\nRSP: 0018:ffffc900026b7c28 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8239710f\nRDX: ffff888041345a00 RSI: ffffffff8239717b RDI: 0000000000000005\nRBP: ffff888054509ad0 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000000000000 R11: ffffffff9ab36f08 R12: ffff88804bb40000\nR13: ffff8880545091e0 R14: 0000000000008000 R15: ffff8880545091e0\nFS: 000055555d0c5880(0000) GS:ffff8880eb3e3000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f915c55b178 CR3: 0000000050d20000 CR4: 0000000000352ef0\nCall Trace:\n <task>\n f2fs_i_links_write home/cc/linux/fs/f2fs/f2fs.h:3194 [inline]\n f2fs_drop_nlink+0xd1/0x3c0 home/cc/linux/fs/f2fs/dir.c:845\n f2fs_delete_entry+0x542/0x1450 home/cc/linux/fs/f2fs/dir.c:909\n f2fs_unlink+0x45c/0x890 home/cc/linux/fs/f2fs/namei.c:581\n vfs_unlink+0x2fb/0x9b0 home/cc/linux/fs/namei.c:4544\n do_unlinkat+0x4c5/0x6a0 home/cc/linux/fs/namei.c:4608\n __do_sys_unlink home/cc/linux/fs/namei.c:4654 [inline]\n __se_sys_unlink home/cc/linux/fs/namei.c:4652 [inline]\n __x64_sys_unlink+0xc5/0x110 home/cc/linux/fs/namei.c:4652\n do_syscall_x64 home/cc/linux/arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xc7/0x250 home/cc/linux/arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fb3d092324b\nCode: 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66\n2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 57 00 00 00 0f 05\n&lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01\n48\nRSP: 002b:00007ffdc232d938 EFLAGS: 00000206 ORIG_RAX: 0000000000000057\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb3d092324b\nRDX: 00007ffdc232d960 RSI: 00007ffdc232d960 RDI: 00007ffdc232d9f0\nRBP: 00007ffdc232d9f0 R08: 0000000000000001 R09: 00007ffdc232d7c0\nR10: 00000000fffffffd R11: 0000000000000206 R12: 00007ffdc232eaf0\nR13: 000055555d0cebb0 R14: 00007ffdc232d958 R15: 0000000000000001\n </task>"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/1f6332872374b7f482fc4ad865f9422fedb587fc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/42cb74a92adaf88061039601ddf7c874f58b554e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5018d035530b6fbfad33eeb1dd1bc87da419a276",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a87cbcc909ccfd394d4936a94663f586453d0961",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/aaa644e7ffff02e12c89cbce4753bc0b6f23ff87",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d14cbed4baccd712447fb3f9c011f008b56b2097",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d9a55869d8237e677ddaa18b0f58586364cfbc1c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fbfe8446cd3274b9e367f5708d94574230a44409",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-38220",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.597",
"lastModified": "2025-07-04T14:15:30.597",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: only dirty folios when data journaling regular files\n\nfstest generic/388 occasionally reproduces a crash that looks as\nfollows:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n...\nCall Trace:\n <TASK>\n ext4_block_zero_page_range+0x30c/0x380 [ext4]\n ext4_truncate+0x436/0x440 [ext4]\n ext4_process_orphan+0x5d/0x110 [ext4]\n ext4_orphan_cleanup+0x124/0x4f0 [ext4]\n ext4_fill_super+0x262d/0x3110 [ext4]\n get_tree_bdev_flags+0x132/0x1d0\n vfs_get_tree+0x26/0xd0\n vfs_cmd_create+0x59/0xe0\n __do_sys_fsconfig+0x4ed/0x6b0\n do_syscall_64+0x82/0x170\n ...\n\nThis occurs when processing a symlink inode from the orphan list. The\npartial block zeroing code in the truncate path calls\next4_dirty_journalled_data() -> folio_mark_dirty(). The latter calls\nmapping->a_ops->dirty_folio(), but symlink inodes are not assigned an\na_ops vector in ext4, hence the crash.\n\nTo avoid this problem, update the ext4_dirty_journalled_data() helper to\nonly mark the folio dirty on regular files (for which a_ops is\nassigned). This also matches the journaling logic in the ext4_symlink()\ncreation path, where ext4_handle_dirty_metadata() is called directly."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/be5f3061a6f904e3674257879e71881ceee5b673",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cf6a4c4ac7b6e3214f25df594c9689a62f1bb456",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d7af6eee8cd60f55aa8c5fe2b91f11ec0c9a0f27",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e26268ff1dcae5662c1b96c35f18cfa6ab73d9de",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-38221",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.723",
"lastModified": "2025-07-04T14:15:30.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix out of bounds punch offset\n\nPunching a hole with a start offset that exceeds max_end is not\npermitted and will result in a negative length in the\ntruncate_inode_partial_folio() function while truncating the page cache,\npotentially leading to undesirable consequences.\n\nA simple reproducer:\n\n truncate -s 9895604649994 /mnt/foo\n xfs_io -c \"pwrite 8796093022208 4096\" /mnt/foo\n xfs_io -c \"fpunch 8796093022213 25769803777\" /mnt/foo\n\n kernel BUG at include/linux/highmem.h:275!\n Oops: invalid opcode: 0000 [#1] SMP PTI\n CPU: 3 UID: 0 PID: 710 Comm: xfs_io Not tainted 6.15.0-rc3\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014\n RIP: 0010:zero_user_segments.constprop.0+0xd7/0x110\n RSP: 0018:ffffc90001cf3b38 EFLAGS: 00010287\n RAX: 0000000000000005 RBX: ffffea0001485e40 RCX: 0000000000001000\n RDX: 000000000040b000 RSI: 0000000000000005 RDI: 000000000040b000\n RBP: 000000000040affb R08: ffff888000000000 R09: ffffea0000000000\n R10: 0000000000000003 R11: 00000000fffc7fc5 R12: 0000000000000005\n R13: 000000000040affb R14: ffffea0001485e40 R15: ffff888031cd3000\n FS: 00007f4f63d0b780(0000) GS:ffff8880d337d000(0000)\n knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000001ae0b038 CR3: 00000000536aa000 CR4: 00000000000006f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n <TASK>\n truncate_inode_partial_folio+0x3dd/0x620\n truncate_inode_pages_range+0x226/0x720\n ? bdev_getblk+0x52/0x3e0\n ? ext4_get_group_desc+0x78/0x150\n ? crc32c_arch+0xfd/0x180\n ? __ext4_get_inode_loc+0x18c/0x840\n ? ext4_inode_csum+0x117/0x160\n ? jbd2_journal_dirty_metadata+0x61/0x390\n ? __ext4_handle_dirty_metadata+0xa0/0x2b0\n ? kmem_cache_free+0x90/0x5a0\n ? jbd2_journal_stop+0x1d5/0x550\n ? __ext4_journal_stop+0x49/0x100\n truncate_pagecache_range+0x50/0x80\n ext4_truncate_page_cache_block_range+0x57/0x3a0\n ext4_punch_hole+0x1fe/0x670\n ext4_fallocate+0x792/0x17d0\n ? __count_memcg_events+0x175/0x2a0\n vfs_fallocate+0x121/0x560\n ksys_fallocate+0x51/0xc0\n __x64_sys_fallocate+0x24/0x40\n x64_sys_call+0x18d2/0x4170\n do_syscall_64+0xa7/0x220\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFix this by filtering out cases where the punching start offset exceeds\nmax_end."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/28b62cb58fd014338f5004170f2e3a35bf0af238",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b5e58bcd79625423487fa3ecba8e8411b5396327",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,49 @@
{
"id": "CVE-2025-38222",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.850",
"lastModified": "2025-07-04T14:15:30.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: inline: fix len overflow in ext4_prepare_inline_data\n\nWhen running the following code on an ext4 filesystem with inline_data\nfeature enabled, it will lead to the bug below.\n\n fd = open(\"file1\", O_RDWR | O_CREAT | O_TRUNC, 0666);\n ftruncate(fd, 30);\n pwrite(fd, \"a\", 1, (1UL << 40) + 5UL);\n\nThat happens because write_begin will succeed as when\next4_generic_write_inline_data calls ext4_prepare_inline_data, pos + len\nwill be truncated, leading to ext4_prepare_inline_data parameter to be 6\ninstead of 0x10000000006.\n\nThen, later when write_end is called, we hit:\n\n BUG_ON(pos + len > EXT4_I(inode)->i_inline_size);\n\nat ext4_write_inline_data.\n\nFix it by using a loff_t type for the len parameter in\next4_prepare_inline_data instead of an unsigned int.\n\n[ 44.545164] ------------[ cut here ]------------\n[ 44.545530] kernel BUG at fs/ext4/inline.c:240!\n[ 44.545834] Oops: invalid opcode: 0000 [#1] SMP NOPTI\n[ 44.546172] CPU: 3 UID: 0 PID: 343 Comm: test Not tainted 6.15.0-rc2-00003-g9080916f4863 #45 PREEMPT(full) 112853fcebfdb93254270a7959841d2c6aa2c8bb\n[ 44.546523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 44.546523] RIP: 0010:ext4_write_inline_data+0xfe/0x100\n[ 44.546523] Code: 3c 0e 48 83 c7 48 48 89 de 5b 41 5c 41 5d 41 5e 41 5f 5d e9 e4 fa 43 01 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc 0f 0b <0f> 0b 0f 1f 44 00 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 20 49\n[ 44.546523] RSP: 0018:ffffb342008b79a8 EFLAGS: 00010216\n[ 44.546523] RAX: 0000000000000001 RBX: ffff9329c579c000 RCX: 0000010000000006\n[ 44.546523] RDX: 000000000000003c RSI: ffffb342008b79f0 RDI: ffff9329c158e738\n[ 44.546523] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000\n[ 44.546523] R10: 00007ffffffff000 R11: ffffffff9bd0d910 R12: 0000006210000000\n[ 44.546523] R13: fffffc7e4015e700 R14: 0000010000000005 R15: ffff9329c158e738\n[ 44.546523] FS: 00007f4299934740(0000) GS:ffff932a60179000(0000) knlGS:0000000000000000\n[ 44.546523] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 44.546523] CR2: 00007f4299a1ec90 CR3: 0000000002886002 CR4: 0000000000770eb0\n[ 44.546523] PKRU: 55555554\n[ 44.546523] Call Trace:\n[ 44.546523] <TASK>\n[ 44.546523] ext4_write_inline_data_end+0x126/0x2d0\n[ 44.546523] generic_perform_write+0x17e/0x270\n[ 44.546523] ext4_buffered_write_iter+0xc8/0x170\n[ 44.546523] vfs_write+0x2be/0x3e0\n[ 44.546523] __x64_sys_pwrite64+0x6d/0xc0\n[ 44.546523] do_syscall_64+0x6a/0xf0\n[ 44.546523] ? __wake_up+0x89/0xb0\n[ 44.546523] ? xas_find+0x72/0x1c0\n[ 44.546523] ? next_uptodate_folio+0x317/0x330\n[ 44.546523] ? set_pte_range+0x1a6/0x270\n[ 44.546523] ? filemap_map_pages+0x6ee/0x840\n[ 44.546523] ? ext4_setattr+0x2fa/0x750\n[ 44.546523] ? do_pte_missing+0x128/0xf70\n[ 44.546523] ? security_inode_post_setattr+0x3e/0xd0\n[ 44.546523] ? ___pte_offset_map+0x19/0x100\n[ 44.546523] ? handle_mm_fault+0x721/0xa10\n[ 44.546523] ? do_user_addr_fault+0x197/0x730\n[ 44.546523] ? do_syscall_64+0x76/0xf0\n[ 44.546523] ? arch_exit_to_user_mode_prepare+0x1e/0x60\n[ 44.546523] ? irqentry_exit_to_user_mode+0x79/0x90\n[ 44.546523] entry_SYSCALL_64_after_hwframe+0x55/0x5d\n[ 44.546523] RIP: 0033:0x7f42999c6687\n[ 44.546523] Code: 48 89 fa 4c 89 df e8 58 b3 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff\n[ 44.546523] RSP: 002b:00007ffeae4a7930 EFLAGS: 00000202 ORIG_RAX: 0000000000000012\n[ 44.546523] RAX: ffffffffffffffda RBX: 00007f4299934740 RCX: 00007f42999c6687\n[ 44.546523] RDX: 0000000000000001 RSI: 000055ea6149200f RDI: 0000000000000003\n[ 44.546523] RBP: 00007ffeae4a79a0 R08: 0000000000000000 R09: 0000000000000000\n[ 44.546523] R10: 0000010000000005 R11: 0000000000000202 R12: 0000\n---truncated---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/227cb4ca5a6502164f850d22aec3104d7888b270",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/26e09d18599da0adc543eabd300080daaeda6869",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5766da2237e539f259aa0e5f3639ae37b44ca458",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/717414a8c083c376d4a8940a1230fe0c6ed4ee00",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9d1d1c5bf4fc1af76be154d3afb2acdbd89ec7d8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cf5f319a2d8ab8238f8cf3a19463b9bff6420934",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d3dfc60efd145df5324b99a244b0b05505cde29b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e80ee0263d88d77f2fd1927f915003a7066cbb50",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-38223",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:30.987",
"lastModified": "2025-07-04T14:15:30.987",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: avoid kernel BUG for encrypted inode with unaligned file size\n\nThe generic/397 test hits a BUG_ON for the case of encrypted inode with\nunaligned file size (for example, 33K or 1K):\n\n[ 877.737811] run fstests generic/397 at 2025-01-03 12:34:40\n[ 877.875761] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 877.876130] libceph: client4614 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 877.991965] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 877.992334] libceph: client4617 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 878.017234] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 878.017594] libceph: client4620 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 878.031394] xfs_io (pid 18988) is setting deprecated v1 encryption policy; recommend upgrading to v2.\n[ 878.054528] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 878.054892] libceph: client4623 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 878.070287] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 878.070704] libceph: client4626 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 878.264586] libceph: mon0 (2)127.0.0.1:40674 session established\n[ 878.265258] libceph: client4629 fsid 19b90bca-f1ae-47a6-93dd-0b03ee637949\n[ 878.374578] -----------[ cut here ]------------\n[ 878.374586] kernel BUG at net/ceph/messenger.c:1070!\n[ 878.375150] Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[ 878.378145] CPU: 2 UID: 0 PID: 4759 Comm: kworker/2:9 Not tainted 6.13.0-rc5+ #1\n[ 878.378969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[ 878.380167] Workqueue: ceph-msgr ceph_con_workfn\n[ 878.381639] RIP: 0010:ceph_msg_data_cursor_init+0x42/0x50\n[ 878.382152] Code: 89 17 48 8b 46 70 55 48 89 47 08 c7 47 18 00 00 00 00 48 89 e5 e8 de cc ff ff 5d 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc 0f 0b <0f> 0b 0f 0b 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90\n[ 878.383928] RSP: 0018:ffffb4ffc7cbbd28 EFLAGS: 00010287\n[ 878.384447] RAX: ffffffff82bb9ac0 RBX: ffff981390c2f1f8 RCX: 0000000000000000\n[ 878.385129] RDX: 0000000000009000 RSI: ffff981288232b58 RDI: ffff981390c2f378\n[ 878.385839] RBP: ffffb4ffc7cbbe18 R08: 0000000000000000 R09: 0000000000000000\n[ 878.386539] R10: 0000000000000000 R11: 0000000000000000 R12: ffff981390c2f030\n[ 878.387203] R13: ffff981288232b58 R14: 0000000000000029 R15: 0000000000000001\n[ 878.387877] FS: 0000000000000000(0000) GS:ffff9814b7900000(0000) knlGS:0000000000000000\n[ 878.388663] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 878.389212] CR2: 00005e106a0554e0 CR3: 0000000112bf0001 CR4: 0000000000772ef0\n[ 878.389921] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 878.390620] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 878.391307] PKRU: 55555554\n[ 878.391567] Call Trace:\n[ 878.391807] <TASK>\n[ 878.392021] ? show_regs+0x71/0x90\n[ 878.392391] ? die+0x38/0xa0\n[ 878.392667] ? do_trap+0xdb/0x100\n[ 878.392981] ? do_error_trap+0x75/0xb0\n[ 878.393372] ? ceph_msg_data_cursor_init+0x42/0x50\n[ 878.393842] ? exc_invalid_op+0x53/0x80\n[ 878.394232] ? ceph_msg_data_cursor_init+0x42/0x50\n[ 878.394694] ? asm_exc_invalid_op+0x1b/0x20\n[ 878.395099] ? ceph_msg_data_cursor_init+0x42/0x50\n[ 878.395583] ? ceph_con_v2_try_read+0xd16/0x2220\n[ 878.396027] ? _raw_spin_unlock+0xe/0x40\n[ 878.396428] ? raw_spin_rq_unlock+0x10/0x40\n[ 878.396842] ? finish_task_switch.isra.0+0x97/0x310\n[ 878.397338] ? __schedule+0x44b/0x16b0\n[ 878.397738] ceph_con_workfn+0x326/0x750\n[ 878.398121] process_one_work+0x188/0x3d0\n[ 878.398522] ? __pfx_worker_thread+0x10/0x10\n[ 878.398929] worker_thread+0x2b5/0x3c0\n[ 878.399310] ? __pfx_worker_thread+0x10/0x10\n[ 878.399727] kthread+0xe1/0x120\n[ 878.400031] ? __pfx_kthread+0x10/0x10\n[ 878.400431] ret_from_fork+0x43/0x70\n[ 878.400771] ? __pfx_kthread+0x10/0x10\n[ 878.401127] ret_from_fork_asm+0x1a/0x30\n[ 878.401543] </TASK>\n[ 878.401760] Modules l\n---truncated---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/060909278cc0a91373a20726bd3d8ce085f480a9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/26725a76264b97d1ff104031b78da57f47741625",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/75583606aeef357a524cf6afd07f4b653ae48964",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-38224",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:31.110",
"lastModified": "2025-07-04T14:15:31.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: kvaser_pciefd: refine error prone echo_skb_max handling logic\n\necho_skb_max should define the supported upper limit of echo_skb[]\nallocated inside the netdevice's priv. The corresponding size value\nprovided by this driver to alloc_candev() is KVASER_PCIEFD_CAN_TX_MAX_COUNT\nwhich is 17.\n\nBut later echo_skb_max is rounded up to the nearest power of two (for the\nmax case, that would be 32) and the tx/ack indices calculated further\nduring tx/rx may exceed the upper array boundary. Kasan reported this for\nthe ack case inside kvaser_pciefd_handle_ack_packet(), though the xmit\nfunction has actually caught the same thing earlier.\n\n BUG: KASAN: slab-out-of-bounds in kvaser_pciefd_handle_ack_packet+0x2d7/0x92a drivers/net/can/kvaser_pciefd.c:1528\n Read of size 8 at addr ffff888105e4f078 by task swapper/4/0\n\n CPU: 4 UID: 0 PID: 0 Comm: swapper/4 Not tainted 6.15.0 #12 PREEMPT(voluntary)\n Call Trace:\n <IRQ>\n dump_stack_lvl lib/dump_stack.c:122\n print_report mm/kasan/report.c:521\n kasan_report mm/kasan/report.c:634\n kvaser_pciefd_handle_ack_packet drivers/net/can/kvaser_pciefd.c:1528\n kvaser_pciefd_read_packet drivers/net/can/kvaser_pciefd.c:1605\n kvaser_pciefd_read_buffer drivers/net/can/kvaser_pciefd.c:1656\n kvaser_pciefd_receive_irq drivers/net/can/kvaser_pciefd.c:1684\n kvaser_pciefd_irq_handler drivers/net/can/kvaser_pciefd.c:1733\n __handle_irq_event_percpu kernel/irq/handle.c:158\n handle_irq_event kernel/irq/handle.c:210\n handle_edge_irq kernel/irq/chip.c:833\n __common_interrupt arch/x86/kernel/irq.c:296\n common_interrupt arch/x86/kernel/irq.c:286\n </IRQ>\n\nTx max count definitely matters for kvaser_pciefd_tx_avail(), but for seq\nnumbers' generation that's not the case - we're free to calculate them as\nwould be more convenient, not taking tx max count into account. The only\ndownside is that the size of echo_skb[] should correspond to the max seq\nnumber (not tx max count), so in some situations a bit more memory would\nbe consumed than could be.\n\nThus make the size of the underlying echo_skb[] sufficient for the rounded\nmax tx value.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/54ec8b08216f3be2cc98b33633d3c8ea79749895",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a6550c9aa11e2f57f9cdaa6249cdd44d446be874",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d8a054b6e6824a8b52c3977ebd38c9583a63efac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-38225",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:31.237",
"lastModified": "2025-07-04T14:15:31.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: imx-jpeg: Cleanup after an allocation error\n\nWhen allocation failures are not cleaned up by the driver, further\nallocation errors will be false-positives, which will cause buffers to\nremain uninitialized and cause NULL pointer dereferences.\nEnsure proper cleanup of failed allocations to prevent these issues."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0ee9469f818a0b4de3c0e7aecd733c103820d181",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6d0efe7d35c75394f32ff9d0650a007642d23857",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7500bb9cf164edbb2c8117d57620227b1a4a8369",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ec26be7d6355a05552a0d0c1e73031f83aa4dc7f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-38226",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:31.367",
"lastModified": "2025-07-04T14:15:31.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vivid: Change the siize of the composing\n\nsyzkaller found a bug:\n\nBUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2608 [inline]\nBUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_buffer+0x1a9c/0x5af0 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705\nWrite of size 1440 at addr ffffc9000d0ffda0 by task vivid-000-vid-c/5304\n\nCPU: 0 UID: 0 PID: 5304 Comm: vivid-000-vid-c Not tainted 6.14.0-rc2-syzkaller-00039-g09fbf3d50205 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\n\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:489\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106\n tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2608 [inline]\n tpg_fill_plane_buffer+0x1a9c/0x5af0 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705\n vivid_fillbuff drivers/media/test-drivers/vivid/vivid-kthread-cap.c:470 [inline]\n vivid_thread_vid_cap_tick+0xf8e/0x60d0 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:629\n vivid_thread_vid_cap+0x8aa/0xf30 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:767\n kthread+0x7a9/0x920 kernel/kthread.c:464\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n </TASK>\n\nThe composition size cannot be larger than the size of fmt_cap_rect.\nSo execute v4l2_rect_map_inside() even if has_compose_cap == 0."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/00da1c767a6567e56f23dda586847586868ac064",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5d89aa42534723400fefd46e26e053b9c382b4ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/635cea4f44c1ddae208666772c164eab5a6bce39",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/89b5ab822bf69867c3951dd0eb34b0314c38966b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c56398885716d97ee9bcadb2bc9663a8c1757a34",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f6b1b0f8ba0b61d8b511df5649d57235f230c135",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f83ac8d30c43fd902af7c84c480f216157b60ef0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-38227",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.153",
"lastModified": "2025-07-04T14:15:32.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: Terminating the subsequent process of initialization failure\n\nsyzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]\n\nAfter PSI initialization fails, the si member is accessed again, resulting\nin this uaf.\n\nAfter si initialization fails, the subsequent process needs to be exited.\n\n[1]\nBUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline]\nBUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524\nRead of size 8 at addr ffff88802fa42acc by task syz.2.37/6059\n\nCPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0\nHardware name: Google Compute Engine, BIOS Google 02/12/2025\nCall Trace:\n<TASK>\n__dump_stack lib/dump_stack.c:94 [inline]\ndump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\nprint_address_description mm/kasan/report.c:408 [inline]\nprint_report+0xc3/0x670 mm/kasan/report.c:521\nkasan_report+0xd9/0x110 mm/kasan/report.c:634\nvidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78\nvidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524\nvidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194\nvidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239\ndmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973\ndvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]\ndvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537\ndvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564\ndvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]\ndvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246\n__fput+0x3ff/0xb70 fs/file_table.c:464\ntask_work_run+0x14e/0x250 kernel/task_work.c:227\nexit_task_work include/linux/task_work.h:40 [inline]\ndo_exit+0xad8/0x2d70 kernel/exit.c:938\ndo_group_exit+0xd3/0x2a0 kernel/exit.c:1087\n__do_sys_exit_group kernel/exit.c:1098 [inline]\n__se_sys_exit_group kernel/exit.c:1096 [inline]\n__x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096\nx64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f871d58d169\nCode: Unable to access opcode bytes at 0x7f871d58d13f.\nRSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169\nRDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0\nR10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003\nR13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840\n </TASK>\n\nAllocated by task 6059:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394\n kmalloc_noprof include/linux/slab.h:901 [inline]\n kzalloc_noprof include/linux/slab.h:1037 [inline]\n vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970\n vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423\n vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519\n vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194\n vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239\n dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973\n dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]\n dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537\n dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564\n dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]\n dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246\n __fput+0x3ff/0xb70 fs/file_tabl\n---truncated---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/1d5f88f053480326873115092bc116b7d14916ba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/685c18bc5a36f823ee725e85aac1303ef5f535ba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/72541cae73d0809a6416bfcd2ee6473046a0013a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7e62be1f3b241bc9faee547864bb39332955509b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9824e1732a163e005aa84e12ec439493ebd4f097",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e1d72ff111eceea6b28dccb7ca4e8f4900b11729",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f8c2483be6e8bb6c2148315b4a924c65bb442b5e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-38228",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.290",
"lastModified": "2025-07-04T14:15:32.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: imagination: fix a potential memory leak in e5010_probe()\n\nAdd video_device_release() to release the memory allocated by\nvideo_device_alloc() if something goes wrong."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2a2bd7df402decbdefd0acb64ba4e17a0a2a4117",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/609ba05b9484856b08869f827a6edee51d51b5f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fac3b9a91fa099d9bad29648127c0328d6c478c3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-38229",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.410",
"lastModified": "2025-07-04T14:15:32.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: cxusb: no longer judge rbuf when the write fails\n\nsyzbot reported a uninit-value in cxusb_i2c_xfer. [1]\n\nOnly when the write operation of usb_bulk_msg() in dvb_usb_generic_rw()\nsucceeds and rlen is greater than 0, the read operation of usb_bulk_msg()\nwill be executed to read rlen bytes of data from the dvb device into the\nrbuf.\n\nIn this case, although rlen is 1, the write operation failed which resulted\nin the dvb read operation not being executed, and ultimately variable i was\nnot initialized.\n\n[1]\nBUG: KMSAN: uninit-value in cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]\nBUG: KMSAN: uninit-value in cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196\n cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]\n cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196\n __i2c_transfer+0xe25/0x3150 drivers/i2c/i2c-core-base.c:-1\n i2c_transfer+0x317/0x4a0 drivers/i2c/i2c-core-base.c:2315\n i2c_transfer_buffer_flags+0x125/0x1e0 drivers/i2c/i2c-core-base.c:2343\n i2c_master_send include/linux/i2c.h:109 [inline]\n i2cdev_write+0x210/0x280 drivers/i2c/i2c-dev.c:183\n do_loop_readv_writev fs/read_write.c:848 [inline]\n vfs_writev+0x963/0x14e0 fs/read_write.c:1057\n do_writev+0x247/0x5c0 fs/read_write.c:1101\n __do_sys_writev fs/read_write.c:1169 [inline]\n __se_sys_writev fs/read_write.c:1166 [inline]\n __x64_sys_writev+0x98/0xe0 fs/read_write.c:1166\n x64_sys_call+0x2229/0x3c80 arch/x86/include/generated/asm/syscalls_64.h:21\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x1e0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/04354c529c8246a38ae28f713fd6bfdc028113bc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/390b864e3281802109dfe56e508396683e125653",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/41807a5f67420464ac8ee7741504f6b5decb3b7c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/73fb3b92da84637e3817580fa205d48065924e15",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/84eca597baa346f09b30accdaeca10ced3eeba2d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8b35b50b7e98d8e9a0a27257c8424448afae10de",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9bff888c92f5c25effbb876d22a793c2388c1ccc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-38230",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.550",
"lastModified": "2025-07-04T14:15:32.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: validate AG parameters in dbMount() to prevent crashes\n\nValidate db_agheight, db_agwidth, and db_agstart in dbMount to catch\ncorrupted metadata early and avoid undefined behavior in dbAllocAG.\nLimits are derived from L2LPERCTL, LPERCTL/MAXAG, and CTLTREESIZE:\n\n- agheight: 0 to L2LPERCTL/2 (0 to 5) ensures shift\n (L2LPERCTL - 2*agheight) >= 0.\n- agwidth: 1 to min(LPERCTL/MAXAG, 2^(L2LPERCTL - 2*agheight))\n ensures agperlev >= 1.\n - Ranges: 1-8 (agheight 0-3), 1-4 (agheight 4), 1 (agheight 5).\n - LPERCTL/MAXAG = 1024/128 = 8 limits leaves per AG;\n 2^(10 - 2*agheight) prevents division to 0.\n- agstart: 0 to CTLTREESIZE-1 - agwidth*(MAXAG-1) keeps ti within\n stree (size 1365).\n - Ranges: 0-1237 (agwidth 1), 0-348 (agwidth 8).\n\nUBSAN: shift-out-of-bounds in fs/jfs/jfs_dmap.c:1400:9\nshift exponent -335544310 is negative\nCPU: 0 UID: 0 PID: 5822 Comm: syz-executor130 Not tainted 6.14.0-rc5-syzkaller #0\nHardware name: Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_shift_out_of_bounds+0x3c8/0x420 lib/ubsan.c:468\n dbAllocAG+0x1087/0x10b0 fs/jfs/jfs_dmap.c:1400\n dbDiscardAG+0x352/0xa20 fs/jfs/jfs_dmap.c:1613\n jfs_ioc_trim+0x45a/0x6b0 fs/jfs/jfs_discard.c:105\n jfs_ioctl+0x2cd/0x3e0 fs/jfs/ioctl.c:131\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl+0xf5/0x170 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/37bfb464ddca87f203071b5bd562cd91ddc0b40a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b62a1e59d8716bbd2e73660743fe06acc97ed7d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2025-38231",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.683",
"lastModified": "2025-07-04T14:15:32.683",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Initialize ssc before laundromat_work to prevent NULL dereference\n\nIn nfs4_state_start_net(), laundromat_work may access nfsd_ssc through\nnfs4_laundromat -> nfsd4_ssc_expire_umount. If nfsd_ssc isn't initialized,\nthis can cause NULL pointer dereference.\n\nNormally the delayed start of laundromat_work allows sufficient time for\nnfsd_ssc initialization to complete. However, when the kernel waits too\nlong for userspace responses (e.g. in nfs4_state_start_net ->\nnfsd4_end_grace -> nfsd4_record_grace_done -> nfsd4_cld_grace_done ->\ncld_pipe_upcall -> __cld_pipe_upcall -> wait_for_completion path), the\ndelayed work may start before nfsd_ssc initialization finishes.\n\nFix this by moving nfsd_ssc initialization before starting laundromat_work."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0fccf5f01ed28725cc313a66ca1247eef911d55e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5060e1a5fef184bd11d298e3f0ee920d96a23236",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/83ac1ba8ca102ab5c0ed4351f8ac6e74ac4d5d64",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a97668ec6d73dab237cd1c15efe012a10090a4ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b31da62889e6d610114d81dc7a6edbcaa503fcf8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d622c2ee6c08147ab8c9b9e37d93b6e95d3258e0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/deaeb74ae9318252829c59a84a7d2316fc335660",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-38232",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.810",
"lastModified": "2025-07-04T14:15:32.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: fix race between nfsd registration and exports_proc\n\nAs of now nfsd calls create_proc_exports_entry() at start of init_nfsd\nand cleanup by remove_proc_entry() at last of exit_nfsd.\n\nWhich causes kernel OOPs if there is race between below 2 operations:\n(i) exportfs -r\n(ii) mount -t nfsd none /proc/fs/nfsd\n\nfor 5.4 kernel ARM64:\n\nCPU 1:\nel1_irq+0xbc/0x180\narch_counter_get_cntvct+0x14/0x18\nrunning_clock+0xc/0x18\npreempt_count_add+0x88/0x110\nprep_new_page+0xb0/0x220\nget_page_from_freelist+0x2d8/0x1778\n__alloc_pages_nodemask+0x15c/0xef0\n__vmalloc_node_range+0x28c/0x478\n__vmalloc_node_flags_caller+0x8c/0xb0\nkvmalloc_node+0x88/0xe0\nnfsd_init_net+0x6c/0x108 [nfsd]\nops_init+0x44/0x170\nregister_pernet_operations+0x114/0x270\nregister_pernet_subsys+0x34/0x50\ninit_nfsd+0xa8/0x718 [nfsd]\ndo_one_initcall+0x54/0x2e0\n\nCPU 2 :\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n\nPC is at : exports_net_open+0x50/0x68 [nfsd]\n\nCall trace:\nexports_net_open+0x50/0x68 [nfsd]\nexports_proc_open+0x2c/0x38 [nfsd]\nproc_reg_open+0xb8/0x198\ndo_dentry_open+0x1c4/0x418\nvfs_open+0x38/0x48\npath_openat+0x28c/0xf18\ndo_filp_open+0x70/0xe8\ndo_sys_open+0x154/0x248\n\nSometimes it crashes at exports_net_open() and sometimes cache_seq_next_rcu().\n\nand same is happening on latest 6.14 kernel as well:\n\n[ 0.000000] Linux version 6.14.0-rc5-next-20250304-dirty\n...\n[ 285.455918] Unable to handle kernel paging request at virtual address 00001f4800001f48\n...\n[ 285.464902] pc : cache_seq_next_rcu+0x78/0xa4\n...\n[ 285.469695] Call trace:\n[ 285.470083] cache_seq_next_rcu+0x78/0xa4 (P)\n[ 285.470488] seq_read+0xe0/0x11c\n[ 285.470675] proc_reg_read+0x9c/0xf0\n[ 285.470874] vfs_read+0xc4/0x2fc\n[ 285.471057] ksys_read+0x6c/0xf4\n[ 285.471231] __arm64_sys_read+0x1c/0x28\n[ 285.471428] invoke_syscall+0x44/0x100\n[ 285.471633] el0_svc_common.constprop.0+0x40/0xe0\n[ 285.471870] do_el0_svc_compat+0x1c/0x34\n[ 285.472073] el0_svc_compat+0x2c/0x80\n[ 285.472265] el0t_32_sync_handler+0x90/0x140\n[ 285.472473] el0t_32_sync+0x19c/0x1a0\n[ 285.472887] Code: f9400885 93407c23 937d7c27 11000421 (f86378a3)\n[ 285.473422] ---[ end trace 0000000000000000 ]---\n\nIt reproduced simply with below script:\nwhile [ 1 ]\ndo\n/exportfs -r\ndone &\n\nwhile [ 1 ]\ndo\ninsmod /nfsd.ko\nmount -t nfsd none /proc/fs/nfsd\numount /proc/fs/nfsd\nrmmod nfsd\ndone &\n\nSo exporting interfaces to user space shall be done at last and\ncleanup at first place.\n\nWith change there is no Kernel OOPs."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2029ca75cdfa6a25716a5a76b751486cce7e3822",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/327011a2bb4f7de9c72b891a96ce8d902828bddf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f7fb730cac9aafda8b9813b55d04e28a9664d17c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-38233",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:32.953",
"lastModified": "2025-07-04T14:15:32.953",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc64/ftrace: fix clobbered r15 during livepatching\n\nWhile r15 is clobbered always with PPC_FTRACE_OUT_OF_LINE, it is\nnot restored in livepatch sequence leading to not so obvious fails\nlike below:\n\n BUG: Unable to handle kernel data access on write at 0xc0000000000f9078\n Faulting instruction address: 0xc0000000018ff958\n Oops: Kernel access of bad area, sig: 11 [#1]\n ...\n NIP: c0000000018ff958 LR: c0000000018ff930 CTR: c0000000009c0790\n REGS: c00000005f2e7790 TRAP: 0300 Tainted: G K (6.14.0+)\n MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 2822880b XER: 20040000\n CFAR: c0000000008addc0 DAR: c0000000000f9078 DSISR: 0a000000 IRQMASK: 1\n GPR00: c0000000018f2584 c00000005f2e7a30 c00000000280a900 c000000017ffa488\n GPR04: 0000000000000008 0000000000000000 c0000000018f24fc 000000000000000d\n GPR08: fffffffffffe0000 000000000000000d 0000000000000000 0000000000008000\n GPR12: c0000000009c0790 c000000017ffa480 c00000005f2e7c78 c0000000000f9070\n GPR16: c00000005f2e7c90 0000000000000000 0000000000000000 0000000000000000\n GPR20: 0000000000000000 c00000005f3efa80 c00000005f2e7c60 c00000005f2e7c88\n GPR24: c00000005f2e7c60 0000000000000001 c0000000000f9078 0000000000000000\n GPR28: 00007fff97960000 c000000017ffa480 0000000000000000 c0000000000f9078\n ...\n Call Trace:\n check_heap_object+0x34/0x390 (unreliable)\n __mutex_unlock_slowpath.isra.0+0xe4/0x230\n seq_read_iter+0x430/0xa90\n proc_reg_read_iter+0xa4/0x200\n vfs_read+0x41c/0x510\n ksys_read+0xa4/0x190\n system_call_exception+0x1d0/0x440\n system_call_vectored_common+0x15c/0x2ec\n\nFix it by restoring r15 always."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/a9212bf5ca640232254b31330e86272fe4073bc9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cb5b691f8273432297611863ac142e17119279e0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-38234",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-07-04T14:15:33.087",
"lastModified": "2025-07-04T14:15:33.087",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/rt: Fix race in push_rt_task\n\nOverview\n========\nWhen a CPU chooses to call push_rt_task and picks a task to push to\nanother CPU's runqueue then it will call find_lock_lowest_rq method\nwhich would take a double lock on both CPUs' runqueues. If one of the\nlocks aren't readily available, it may lead to dropping the current\nrunqueue lock and reacquiring both the locks at once. During this window\nit is possible that the task is already migrated and is running on some\nother CPU. These cases are already handled. However, if the task is\nmigrated and has already been executed and another CPU is now trying to\nwake it up (ttwu) such that it is queued again on the runqeue\n(on_rq is 1) and also if the task was run by the same CPU, then the\ncurrent checks will pass even though the task was migrated out and is no\nlonger in the pushable tasks list.\n\nCrashes\n=======\nThis bug resulted in quite a few flavors of crashes triggering kernel\npanics with various crash signatures such as assert failures, page\nfaults, null pointer dereferences, and queue corruption errors all\ncoming from scheduler itself.\n\nSome of the crashes:\n-> kernel BUG at kernel/sched/rt.c:1616! BUG_ON(idx >= MAX_RT_PRIO)\n Call Trace:\n ? __die_body+0x1a/0x60\n ? die+0x2a/0x50\n ? do_trap+0x85/0x100\n ? pick_next_task_rt+0x6e/0x1d0\n ? do_error_trap+0x64/0xa0\n ? pick_next_task_rt+0x6e/0x1d0\n ? exc_invalid_op+0x4c/0x60\n ? pick_next_task_rt+0x6e/0x1d0\n ? asm_exc_invalid_op+0x12/0x20\n ? pick_next_task_rt+0x6e/0x1d0\n __schedule+0x5cb/0x790\n ? update_ts_time_stats+0x55/0x70\n schedule_idle+0x1e/0x40\n do_idle+0x15e/0x200\n cpu_startup_entry+0x19/0x20\n start_secondary+0x117/0x160\n secondary_startup_64_no_verify+0xb0/0xbb\n\n-> BUG: kernel NULL pointer dereference, address: 00000000000000c0\n Call Trace:\n ? __die_body+0x1a/0x60\n ? no_context+0x183/0x350\n ? __warn+0x8a/0xe0\n ? exc_page_fault+0x3d6/0x520\n ? asm_exc_page_fault+0x1e/0x30\n ? pick_next_task_rt+0xb5/0x1d0\n ? pick_next_task_rt+0x8c/0x1d0\n __schedule+0x583/0x7e0\n ? update_ts_time_stats+0x55/0x70\n schedule_idle+0x1e/0x40\n do_idle+0x15e/0x200\n cpu_startup_entry+0x19/0x20\n start_secondary+0x117/0x160\n secondary_startup_64_no_verify+0xb0/0xbb\n\n-> BUG: unable to handle page fault for address: ffff9464daea5900\n kernel BUG at kernel/sched/rt.c:1861! BUG_ON(rq->cpu != task_cpu(p))\n\n-> kernel BUG at kernel/sched/rt.c:1055! BUG_ON(!rq->nr_running)\n Call Trace:\n ? __die_body+0x1a/0x60\n ? die+0x2a/0x50\n ? do_trap+0x85/0x100\n ? dequeue_top_rt_rq+0xa2/0xb0\n ? do_error_trap+0x64/0xa0\n ? dequeue_top_rt_rq+0xa2/0xb0\n ? exc_invalid_op+0x4c/0x60\n ? dequeue_top_rt_rq+0xa2/0xb0\n ? asm_exc_invalid_op+0x12/0x20\n ? dequeue_top_rt_rq+0xa2/0xb0\n dequeue_rt_entity+0x1f/0x70\n dequeue_task_rt+0x2d/0x70\n __schedule+0x1a8/0x7e0\n ? blk_finish_plug+0x25/0x40\n schedule+0x3c/0xb0\n futex_wait_queue_me+0xb6/0x120\n futex_wait+0xd9/0x240\n do_futex+0x344/0xa90\n ? get_mm_exe_file+0x30/0x60\n ? audit_exe_compare+0x58/0x70\n ? audit_filter_rules.constprop.26+0x65e/0x1220\n __x64_sys_futex+0x148/0x1f0\n do_syscall_64+0x30/0x80\n entry_SYSCALL_64_after_hwframe+0x62/0xc7\n\n-> BUG: unable to handle page fault for address: ffff8cf3608bc2c0\n Call Trace:\n ? __die_body+0x1a/0x60\n ? no_context+0x183/0x350\n ? spurious_kernel_fault+0x171/0x1c0\n ? exc_page_fault+0x3b6/0x520\n ? plist_check_list+0x15/0x40\n ? plist_check_list+0x2e/0x40\n ? asm_exc_page_fault+0x1e/0x30\n ? _cond_resched+0x15/0x30\n ? futex_wait_queue_me+0xc8/0x120\n ? futex_wait+0xd9/0x240\n ? try_to_wake_up+0x1b8/0x490\n ? futex_wake+0x78/0x160\n ? do_futex+0xcd/0xa90\n ? plist_check_list+0x15/0x40\n ? plist_check_list+0x2e/0x40\n ? plist_del+0x6a/0xd0\n ? plist_check_list+0x15/0x40\n ? plist_check_list+0x2e/0x40\n ? dequeue_pushable_task+0x20/0x70\n ? __schedule+0x382/0x7e0\n ? asm_sysvec_reschedule_i\n---truncated---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/07ecabfbca64f4f0b6071cf96e49d162fa9d138d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/690e47d1403e90b7f2366f03b52ed3304194c793",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-46733",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-04T14:15:33.217",
"lastModified": "2025-07-04T14:15:33.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In version 4.5.0, using a specially crafted tee-supplicant binary running in REE userspace, an attacker can trigger a panic in a TA that uses the libutee Secure Storage API. Many functions in libutee, specifically those which make up the Secure Storage API, will panic if a system call returns an unexpected return code. This behavior is mandated by the TEE Internal Core API specification. However, in OP-TEE\u2019s implementation, return codes of secure storage operations are passed through unsanitized from the REE tee-supplicant, through the Linux kernel tee-driver, through the OP-TEE kernel, back to libutee. Thus, an attacker with access to REE userspace, and the ability to stop tee-supplicant and replace it with their own process (generally trivial for a root user, and depending on the way permissions are set up, potentially available even to less privileged users) can run a malicious tee-supplicant process that responds to storage requests with unexpected response codes, triggering a panic in the requesting TA. This is particularly dangerous for TAs built with `TA_FLAG_SINGLE_INSTANCE` (corresponding to `gpd.ta.singleInstance` and `TA_FLAG_INSTANCE_KEEP_ALIVE` (corresponding to `gpd.ta.keepAlive`). The behavior of these TAs may depend on memory that is preserved between sessions, and the ability of an attacker to panic the TA and reload it with a clean memory space can compromise the behavior of those TAs. A critical example of this is the optee_ftpm TA. It uses the kept alive memory to hold PCR values, which crucially must be non-resettable. An attacker who can trigger a panic in the fTPM TA can reset the PCRs, and then extend them PCRs with whatever they choose, falsifying boot measurements, accessing sealed data, and potentially more. The impact of this issue depends significantly on the behavior of affected TAs. For some, it could manifest as a denial of service, while for others, like the fTPM TA, it can result in the disclosure of sensitive data. Anyone running the fTPM TA is affected, but similar attacks may be possible on other TAs that leverage the Secure Storage API. A fix is available in commit 941a58d78c99c4754fbd4ec3079ec9e1d596af8f."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"baseScore": 7.9,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.0,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://github.com/OP-TEE/optee_os/commit/941a58d78c99c4754fbd4ec3079ec9e1d596af8f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OP-TEE/optee_os/security/advisories/GHSA-f35r-hm2m-p6c3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49600",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-04T15:15:22.277",
"lastModified": "2025-07-04T15:15:22.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in mbedtls_lms_verify allow an attacker (who can induce a hardware hash accelerator fault) to bypass LMS signature verification by reusing stale stack data, resulting in acceptance of an invalid signature. In mbedtls_lms_verify, the return values of the internal Merkle tree functions create_merkle_leaf_value and create_merkle_internal_value are not checked. These functions return an integer that indicates whether the call succeeded or not. If a failure occurs, the output buffer (Tc_candidate_root_node) may remain uninitialized, and the result of the signature verification is unpredictable. When the software implementation of SHA-256 is used, these functions will not fail. However, with hardware-accelerated hashing, an attacker could use fault injection against the accelerator to bypass verification."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.5,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-325"
}
]
}
],
"references": [
{
"url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-3.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49601",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-04T15:15:22.467",
"lastModified": "2025-07-04T15:15:22.467",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-4.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-52496",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-04T15:15:22.633",
"lastModified": "2025-07-04T15:15:22.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mbed TLS before 3.6.4 has a race condition in AESNI detection if certain compiler optimizations occur. An attacker may be able to extract an AES key from a multithreaded program, or perform a GCM forgery."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.4,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-733"
}
]
}
],
"references": [
{
"url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-52497",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-07-04T15:15:22.787",
"lastModified": "2025-07-04T15:15:22.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse functions, via untrusted PEM input."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-193"
}
]
}
],
"references": [
{
"url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-07-04T14:00:11.519894+00:00 2025-07-04T16:00:12.343601+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-07-04T13:15:25.987000+00:00 2025-07-04T15:15:22.787000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,38 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
300361 300423
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `53` Recently added CVEs: `62`
- [CVE-2025-49417](CVE-2025/CVE-2025-494xx/CVE-2025-49417.json) (`2025-07-04T12:15:31.003`) - [CVE-2025-38215](CVE-2025/CVE-2025-382xx/CVE-2025-38215.json) (`2025-07-04T14:15:29.980`)
- [CVE-2025-49418](CVE-2025/CVE-2025-494xx/CVE-2025-49418.json) (`2025-07-04T12:15:31.247`) - [CVE-2025-38216](CVE-2025/CVE-2025-382xx/CVE-2025-38216.json) (`2025-07-04T14:15:30.103`)
- [CVE-2025-49431](CVE-2025/CVE-2025-494xx/CVE-2025-49431.json) (`2025-07-04T12:15:31.537`) - [CVE-2025-38217](CVE-2025/CVE-2025-382xx/CVE-2025-38217.json) (`2025-07-04T14:15:30.227`)
- [CVE-2025-49809](CVE-2025/CVE-2025-498xx/CVE-2025-49809.json) (`2025-07-04T13:15:25.780`) - [CVE-2025-38218](CVE-2025/CVE-2025-382xx/CVE-2025-38218.json) (`2025-07-04T14:15:30.353`)
- [CVE-2025-49866](CVE-2025/CVE-2025-498xx/CVE-2025-49866.json) (`2025-07-04T12:15:31.837`) - [CVE-2025-38219](CVE-2025/CVE-2025-382xx/CVE-2025-38219.json) (`2025-07-04T14:15:30.473`)
- [CVE-2025-49867](CVE-2025/CVE-2025-498xx/CVE-2025-49867.json) (`2025-07-04T12:15:32.123`) - [CVE-2025-38220](CVE-2025/CVE-2025-382xx/CVE-2025-38220.json) (`2025-07-04T14:15:30.597`)
- [CVE-2025-49870](CVE-2025/CVE-2025-498xx/CVE-2025-49870.json) (`2025-07-04T12:15:32.383`) - [CVE-2025-38221](CVE-2025/CVE-2025-382xx/CVE-2025-38221.json) (`2025-07-04T14:15:30.723`)
- [CVE-2025-50032](CVE-2025/CVE-2025-500xx/CVE-2025-50032.json) (`2025-07-04T12:15:32.817`) - [CVE-2025-38222](CVE-2025/CVE-2025-382xx/CVE-2025-38222.json) (`2025-07-04T14:15:30.850`)
- [CVE-2025-50039](CVE-2025/CVE-2025-500xx/CVE-2025-50039.json) (`2025-07-04T12:15:33.017`) - [CVE-2025-38223](CVE-2025/CVE-2025-382xx/CVE-2025-38223.json) (`2025-07-04T14:15:30.987`)
- [CVE-2025-52718](CVE-2025/CVE-2025-527xx/CVE-2025-52718.json) (`2025-07-04T12:15:33.197`) - [CVE-2025-38224](CVE-2025/CVE-2025-382xx/CVE-2025-38224.json) (`2025-07-04T14:15:31.110`)
- [CVE-2025-52776](CVE-2025/CVE-2025-527xx/CVE-2025-52776.json) (`2025-07-04T12:15:33.370`) - [CVE-2025-38225](CVE-2025/CVE-2025-382xx/CVE-2025-38225.json) (`2025-07-04T14:15:31.237`)
- [CVE-2025-52796](CVE-2025/CVE-2025-527xx/CVE-2025-52796.json) (`2025-07-04T12:15:33.553`) - [CVE-2025-38226](CVE-2025/CVE-2025-382xx/CVE-2025-38226.json) (`2025-07-04T14:15:31.367`)
- [CVE-2025-52798](CVE-2025/CVE-2025-527xx/CVE-2025-52798.json) (`2025-07-04T12:15:33.737`) - [CVE-2025-38227](CVE-2025/CVE-2025-382xx/CVE-2025-38227.json) (`2025-07-04T14:15:32.153`)
- [CVE-2025-52805](CVE-2025/CVE-2025-528xx/CVE-2025-52805.json) (`2025-07-04T12:15:33.927`) - [CVE-2025-38228](CVE-2025/CVE-2025-382xx/CVE-2025-38228.json) (`2025-07-04T14:15:32.290`)
- [CVE-2025-52807](CVE-2025/CVE-2025-528xx/CVE-2025-52807.json) (`2025-07-04T12:15:34.107`) - [CVE-2025-38229](CVE-2025/CVE-2025-382xx/CVE-2025-38229.json) (`2025-07-04T14:15:32.410`)
- [CVE-2025-52813](CVE-2025/CVE-2025-528xx/CVE-2025-52813.json) (`2025-07-04T12:15:34.273`) - [CVE-2025-38230](CVE-2025/CVE-2025-382xx/CVE-2025-38230.json) (`2025-07-04T14:15:32.550`)
- [CVE-2025-52828](CVE-2025/CVE-2025-528xx/CVE-2025-52828.json) (`2025-07-04T12:15:34.453`) - [CVE-2025-38231](CVE-2025/CVE-2025-382xx/CVE-2025-38231.json) (`2025-07-04T14:15:32.683`)
- [CVE-2025-52830](CVE-2025/CVE-2025-528xx/CVE-2025-52830.json) (`2025-07-04T12:15:34.633`) - [CVE-2025-38232](CVE-2025/CVE-2025-382xx/CVE-2025-38232.json) (`2025-07-04T14:15:32.810`)
- [CVE-2025-52831](CVE-2025/CVE-2025-528xx/CVE-2025-52831.json) (`2025-07-04T12:15:34.820`) - [CVE-2025-38233](CVE-2025/CVE-2025-382xx/CVE-2025-38233.json) (`2025-07-04T14:15:32.953`)
- [CVE-2025-52832](CVE-2025/CVE-2025-528xx/CVE-2025-52832.json) (`2025-07-04T12:15:35.020`) - [CVE-2025-38234](CVE-2025/CVE-2025-382xx/CVE-2025-38234.json) (`2025-07-04T14:15:33.087`)
- [CVE-2025-52833](CVE-2025/CVE-2025-528xx/CVE-2025-52833.json) (`2025-07-04T12:15:35.217`) - [CVE-2025-46733](CVE-2025/CVE-2025-467xx/CVE-2025-46733.json) (`2025-07-04T14:15:33.217`)
- [CVE-2025-6056](CVE-2025/CVE-2025-60xx/CVE-2025-6056.json) (`2025-07-04T12:15:35.407`) - [CVE-2025-49600](CVE-2025/CVE-2025-496xx/CVE-2025-49600.json) (`2025-07-04T15:15:22.277`)
- [CVE-2025-6740](CVE-2025/CVE-2025-67xx/CVE-2025-6740.json) (`2025-07-04T12:15:35.570`) - [CVE-2025-49601](CVE-2025/CVE-2025-496xx/CVE-2025-49601.json) (`2025-07-04T15:15:22.467`)
- [CVE-2025-7061](CVE-2025/CVE-2025-70xx/CVE-2025-7061.json) (`2025-07-04T13:15:25.987`) - [CVE-2025-52496](CVE-2025/CVE-2025-524xx/CVE-2025-52496.json) (`2025-07-04T15:15:22.633`)
- [CVE-2025-7066](CVE-2025/CVE-2025-70xx/CVE-2025-7066.json) (`2025-07-04T12:15:35.740`) - [CVE-2025-52497](CVE-2025/CVE-2025-524xx/CVE-2025-52497.json) (`2025-07-04T15:15:22.787`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit

View File

@ -287588,7 +287588,7 @@ CVE-2025-23967,0,0,7fc0380a265ec940f2b60470b1cf9713d9094d8329ba8cde3022afd9bd781
CVE-2025-23968,0,0,955f5380954e813c7e88fece29af528205d4507019306da5a36ed360685211a7,2025-07-03T19:15:23.043000 CVE-2025-23968,0,0,955f5380954e813c7e88fece29af528205d4507019306da5a36ed360685211a7,2025-07-03T19:15:23.043000
CVE-2025-23969,0,0,487de04033365abaa60e5ffa75aa91d7c86b6db89eb8475ac28535f85fa6cbae,2025-06-06T14:06:58.193000 CVE-2025-23969,0,0,487de04033365abaa60e5ffa75aa91d7c86b6db89eb8475ac28535f85fa6cbae,2025-06-06T14:06:58.193000
CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000 CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000
CVE-2025-23970,1,1,59a2f93282d0ee816872cd9efa0e07ec38c23a282c2850aeeef1bedd7bc6d785,2025-07-04T12:15:25.697000 CVE-2025-23970,0,0,59a2f93282d0ee816872cd9efa0e07ec38c23a282c2850aeeef1bedd7bc6d785,2025-07-04T12:15:25.697000
CVE-2025-23971,0,0,b92b26502e7bf23962c464265b1f8680f1f27660b2e187da01a8acb71a6d5407,2025-06-06T14:06:58.193000 CVE-2025-23971,0,0,b92b26502e7bf23962c464265b1f8680f1f27660b2e187da01a8acb71a6d5407,2025-06-06T14:06:58.193000
CVE-2025-23972,0,0,c6feb141178185be5ee89fd0f163b49db0609e63f67bcc15dd9bfffbe8445c82,2025-07-04T09:15:25.540000 CVE-2025-23972,0,0,c6feb141178185be5ee89fd0f163b49db0609e63f67bcc15dd9bfffbe8445c82,2025-07-04T09:15:25.540000
CVE-2025-23973,0,0,b03f07955cb4b8a1b76e7d2c342eec64764547fed2e7c9db7f01a8a71cd682f4,2025-06-30T18:38:48.477000 CVE-2025-23973,0,0,b03f07955cb4b8a1b76e7d2c342eec64764547fed2e7c9db7f01a8a71cd682f4,2025-06-30T18:38:48.477000
@ -288310,14 +288310,14 @@ CVE-2025-24768,0,0,9189c2bd9d601f25f78d69a9ed75ee394b9e6a5a348dad3498cc8567cf03a
CVE-2025-24769,0,0,0f0fa0d60cf6c9c4c0c230cdf830a34c536e6201ae02e40d3e4e2d57e844d855,2025-06-30T18:38:48.477000 CVE-2025-24769,0,0,0f0fa0d60cf6c9c4c0c230cdf830a34c536e6201ae02e40d3e4e2d57e844d855,2025-06-30T18:38:48.477000
CVE-2025-2477,0,0,3686d026975337c8b88c9fe51616f10734ea4310f92df921905ea60f68804787,2025-03-22T07:15:24.780000 CVE-2025-2477,0,0,3686d026975337c8b88c9fe51616f10734ea4310f92df921905ea60f68804787,2025-03-22T07:15:24.780000
CVE-2025-24770,0,0,fdf52f6ec826aca9cec8dc178d0c6ac549801c2a9257299df2336712d666c437,2025-06-12T16:06:47.857000 CVE-2025-24770,0,0,fdf52f6ec826aca9cec8dc178d0c6ac549801c2a9257299df2336712d666c437,2025-06-12T16:06:47.857000
CVE-2025-24771,1,1,2178434632344a0dfbf1153604eb1f570747a536200c910c821033b4f5abaa07,2025-07-04T12:15:26.320000 CVE-2025-24771,0,0,2178434632344a0dfbf1153604eb1f570747a536200c910c821033b4f5abaa07,2025-07-04T12:15:26.320000
CVE-2025-24772,0,0,547afdd5349c8fcce2c64d6c10c715e5d3569a1830eade75c5bf4072200b32a0,2025-06-06T14:06:58.193000 CVE-2025-24772,0,0,547afdd5349c8fcce2c64d6c10c715e5d3569a1830eade75c5bf4072200b32a0,2025-06-06T14:06:58.193000
CVE-2025-24773,0,0,b249e5165b2867fb7b2f87de8edfe0070c6d22c19362fd6848e57861d099e364,2025-06-17T20:50:23.507000 CVE-2025-24773,0,0,b249e5165b2867fb7b2f87de8edfe0070c6d22c19362fd6848e57861d099e364,2025-06-17T20:50:23.507000
CVE-2025-24774,0,0,ed8ed015edd881dc0d20b6cd243fbd5f243c70baa478f754d8e8dfb85effe02d,2025-06-30T18:38:48.477000 CVE-2025-24774,0,0,ed8ed015edd881dc0d20b6cd243fbd5f243c70baa478f754d8e8dfb85effe02d,2025-06-30T18:38:48.477000
CVE-2025-24776,0,0,c9ddd5a50b6ab340b7f808209038fd5f4594e33d9ce5f72a4815066c12e3c3b8,2025-06-06T14:06:58.193000 CVE-2025-24776,0,0,c9ddd5a50b6ab340b7f808209038fd5f4594e33d9ce5f72a4815066c12e3c3b8,2025-06-06T14:06:58.193000
CVE-2025-24778,0,0,882f4200212085da2b27c56d01fef020fd88d760c8f828c4b6e08199c67ae033,2025-06-06T14:06:58.193000 CVE-2025-24778,0,0,882f4200212085da2b27c56d01fef020fd88d760c8f828c4b6e08199c67ae033,2025-06-06T14:06:58.193000
CVE-2025-2478,0,0,1f250b1c3a01cc2aeb8f8a30a3c88313a7c6df2af4f8c1676f1452abfadd344c,2025-03-22T07:15:24.963000 CVE-2025-2478,0,0,1f250b1c3a01cc2aeb8f8a30a3c88313a7c6df2af4f8c1676f1452abfadd344c,2025-03-22T07:15:24.963000
CVE-2025-24780,1,1,ebe3598a5946fdd4e080c78a1b70d45ee262abdb1c994d9eac190306a81112ee,2025-07-04T12:15:26.500000 CVE-2025-24780,0,0,ebe3598a5946fdd4e080c78a1b70d45ee262abdb1c994d9eac190306a81112ee,2025-07-04T12:15:26.500000
CVE-2025-24781,0,0,ea0dd1f1efc338a8190531ba4028569aeff4169f4687c401bac25279a2c35633,2025-02-03T15:15:30.410000 CVE-2025-24781,0,0,ea0dd1f1efc338a8190531ba4028569aeff4169f4687c401bac25279a2c35633,2025-02-03T15:15:30.410000
CVE-2025-24782,0,0,8c372ce8320f821beaf5305dedc64260459e1c67813cc3a8d8e478a94bd72f81,2025-03-10T18:30:35.687000 CVE-2025-24782,0,0,8c372ce8320f821beaf5305dedc64260459e1c67813cc3a8d8e478a94bd72f81,2025-03-10T18:30:35.687000
CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000 CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000
@ -290713,18 +290713,18 @@ CVE-2025-28963,0,0,492635525da6d93121db7df236cc641283bff0fcc38e699d41e719d56125a
CVE-2025-28964,0,0,5941c6471c783811f736b1cd6a2de0d6e846c0f5ab5d7f88d39ac0e5c46376df,2025-06-06T14:06:58.193000 CVE-2025-28964,0,0,5941c6471c783811f736b1cd6a2de0d6e846c0f5ab5d7f88d39ac0e5c46376df,2025-06-06T14:06:58.193000
CVE-2025-28966,0,0,a9a888da79337c47e1f2f230b623b8e1e6b96aab7deecf98c76f3f9f345b2049,2025-06-06T14:06:58.193000 CVE-2025-28966,0,0,a9a888da79337c47e1f2f230b623b8e1e6b96aab7deecf98c76f3f9f345b2049,2025-06-06T14:06:58.193000
CVE-2025-28967,0,0,8d61b8faed1e495539244f436a0e941cc255d5cbfc4f6a09c60b49cdc064b470,2025-07-04T09:15:30.760000 CVE-2025-28967,0,0,8d61b8faed1e495539244f436a0e941cc255d5cbfc4f6a09c60b49cdc064b470,2025-07-04T09:15:30.760000
CVE-2025-28968,1,1,fd76809ab4dcb3e9bc05d6ff19e038c7eca60e1a5650d3cf1775d09ef79f8195,2025-07-04T12:15:26.693000 CVE-2025-28968,0,0,fd76809ab4dcb3e9bc05d6ff19e038c7eca60e1a5650d3cf1775d09ef79f8195,2025-07-04T12:15:26.693000
CVE-2025-28969,0,0,d8571d342ae6a1e70e2ed662cacad663e51e62993ea4923fe828b9719d25c322,2025-07-04T09:15:31.183000 CVE-2025-28969,0,0,d8571d342ae6a1e70e2ed662cacad663e51e62993ea4923fe828b9719d25c322,2025-07-04T09:15:31.183000
CVE-2025-28970,0,0,92881b56e6fe23586d7f4f080215a9212037d5cb3eec1d1c40819fe922f76f18,2025-06-30T18:38:48.477000 CVE-2025-28970,0,0,92881b56e6fe23586d7f4f080215a9212037d5cb3eec1d1c40819fe922f76f18,2025-06-30T18:38:48.477000
CVE-2025-28971,0,0,416d7bdfcc223a43beb11fd2a19095bda9448dc204067b8031e0e2ad965308a5,2025-07-04T09:15:31.507000 CVE-2025-28971,0,0,416d7bdfcc223a43beb11fd2a19095bda9448dc204067b8031e0e2ad965308a5,2025-07-04T09:15:31.507000
CVE-2025-28972,0,0,ceb2fdbef9f785f49da61607523e4567ff2674a64e5cbd6022403b56031ab79d,2025-06-17T20:50:23.507000 CVE-2025-28972,0,0,ceb2fdbef9f785f49da61607523e4567ff2674a64e5cbd6022403b56031ab79d,2025-06-17T20:50:23.507000
CVE-2025-28974,0,0,e17e6dc9b84000fcffa09ada9585e56145630617cef399b7f12d810b2629175f,2025-06-06T14:06:58.193000 CVE-2025-28974,0,0,e17e6dc9b84000fcffa09ada9585e56145630617cef399b7f12d810b2629175f,2025-06-06T14:06:58.193000
CVE-2025-28976,1,1,22e7dbe143e737814b2e460fcae43f33870f7644bbbdb9bffcd5ef93b708e320,2025-07-04T12:15:26.877000 CVE-2025-28976,0,0,22e7dbe143e737814b2e460fcae43f33870f7644bbbdb9bffcd5ef93b708e320,2025-07-04T12:15:26.877000
CVE-2025-28978,1,1,8e5294569f562f5d0eddc4883ca6df9d51a17e7844261283486cce162feef8df,2025-07-04T12:15:27.053000 CVE-2025-28978,0,0,8e5294569f562f5d0eddc4883ca6df9d51a17e7844261283486cce162feef8df,2025-07-04T12:15:27.053000
CVE-2025-2898,0,0,47f67442cb55ba411e4669d13ef4529f1239e4e6ba72061becfb6f7e592e31cd,2025-05-16T20:02:07.950000 CVE-2025-2898,0,0,47f67442cb55ba411e4669d13ef4529f1239e4e6ba72061becfb6f7e592e31cd,2025-05-16T20:02:07.950000
CVE-2025-28980,1,1,fde1f61614e6028537af6e46d192741322aaba45c13bf42a32a7537f008c3a9d,2025-07-04T12:15:27.233000 CVE-2025-28980,0,0,fde1f61614e6028537af6e46d192741322aaba45c13bf42a32a7537f008c3a9d,2025-07-04T12:15:27.233000
CVE-2025-28981,0,0,bb036b80f7f84e8c41aa9257be84aaa70ba5720599d544c5ddd5af62806b9e7e,2025-06-06T14:06:58.193000 CVE-2025-28981,0,0,bb036b80f7f84e8c41aa9257be84aaa70ba5720599d544c5ddd5af62806b9e7e,2025-06-06T14:06:58.193000
CVE-2025-28983,1,1,03c3e13191b5cb31d374bf8938f40593b5ab3d4d1343d8b276771adc3a5ba2a8,2025-07-04T12:15:27.437000 CVE-2025-28983,0,0,03c3e13191b5cb31d374bf8938f40593b5ab3d4d1343d8b276771adc3a5ba2a8,2025-07-04T12:15:27.437000
CVE-2025-28984,0,0,9ef7f986d96117439d40b90e2fda225b43bc8fa4b7f4173f4395b7739bf2f93b,2025-06-06T14:06:58.193000 CVE-2025-28984,0,0,9ef7f986d96117439d40b90e2fda225b43bc8fa4b7f4173f4395b7739bf2f93b,2025-06-06T14:06:58.193000
CVE-2025-28985,0,0,9bc036525a100347f01ae377d4a458e90eef123681201c669ca0c05249f59f10,2025-06-06T14:06:58.193000 CVE-2025-28985,0,0,9bc036525a100347f01ae377d4a458e90eef123681201c669ca0c05249f59f10,2025-06-06T14:06:58.193000
CVE-2025-28986,0,0,1361618036e60c533ef72231d02393dbc213b1b36c2bad113d5bda9efbecbc7b,2025-06-06T14:06:58.193000 CVE-2025-28986,0,0,1361618036e60c533ef72231d02393dbc213b1b36c2bad113d5bda9efbecbc7b,2025-06-06T14:06:58.193000
@ -291944,7 +291944,7 @@ CVE-2025-30929,0,0,c88b9e1679ed61da4510f8138d576badebf813a72006d5c21c8fe44a2d3c4
CVE-2025-30930,0,0,9bf542b9de63233fd9f5d85ed07f76a70f9c52a5e16db28223227969773c9c4a,2025-06-06T14:06:58.193000 CVE-2025-30930,0,0,9bf542b9de63233fd9f5d85ed07f76a70f9c52a5e16db28223227969773c9c4a,2025-06-06T14:06:58.193000
CVE-2025-30931,0,0,b875c8d500ba8afd6309c2581a84310affe8927efa1570fe516c4e65530e3e61,2025-06-06T14:06:58.193000 CVE-2025-30931,0,0,b875c8d500ba8afd6309c2581a84310affe8927efa1570fe516c4e65530e3e61,2025-06-06T14:06:58.193000
CVE-2025-30932,0,0,bd2f98f1d0e502b0ec1e90cccecfa714cd49fae8e66f1ef0acebbfeeed36e7dd,2025-06-06T14:06:58.193000 CVE-2025-30932,0,0,bd2f98f1d0e502b0ec1e90cccecfa714cd49fae8e66f1ef0acebbfeeed36e7dd,2025-06-06T14:06:58.193000
CVE-2025-30933,1,1,b8102a08bceb254e9e86735e9879c7000378bb4947b03abb30a0f6ee840c7ad8,2025-07-04T12:15:27.607000 CVE-2025-30933,0,0,b8102a08bceb254e9e86735e9879c7000378bb4947b03abb30a0f6ee840c7ad8,2025-07-04T12:15:27.607000
CVE-2025-30934,0,0,bd66b04ba09878dacf97f7932735e787201c499a30fbfa68898a4b22f0dd9db1,2025-06-06T14:06:58.193000 CVE-2025-30934,0,0,bd66b04ba09878dacf97f7932735e787201c499a30fbfa68898a4b22f0dd9db1,2025-06-06T14:06:58.193000
CVE-2025-30935,0,0,ca186eaa73e189cf659341c581c52f39f9d6173e5f6605fee0e7c4491aea4555,2025-06-06T14:06:58.193000 CVE-2025-30935,0,0,ca186eaa73e189cf659341c581c52f39f9d6173e5f6605fee0e7c4491aea4555,2025-06-06T14:06:58.193000
CVE-2025-30937,0,0,c800cece02855df665103857cea1e01b14dbddbab68399fc5858bde566e29ad2,2025-06-06T14:06:58.193000 CVE-2025-30937,0,0,c800cece02855df665103857cea1e01b14dbddbab68399fc5858bde566e29ad2,2025-06-06T14:06:58.193000
@ -292043,7 +292043,7 @@ CVE-2025-31033,0,0,840a89b6a6fca121cfba44c8138c52066a8fe2d84b54cf8217e967669e52c
CVE-2025-31034,0,0,00045c692d736174347a15996f2644c271311b493b2650b7c9934fd5c24aaef7,2025-04-09T20:02:41.860000 CVE-2025-31034,0,0,00045c692d736174347a15996f2644c271311b493b2650b7c9934fd5c24aaef7,2025-04-09T20:02:41.860000
CVE-2025-31035,0,0,5c760e02fcbaee44a22a24ae8d34d9e90e3913b6f5837b6cb83b1fc705e4819e,2025-04-09T20:02:41.860000 CVE-2025-31035,0,0,5c760e02fcbaee44a22a24ae8d34d9e90e3913b6f5837b6cb83b1fc705e4819e,2025-04-09T20:02:41.860000
CVE-2025-31036,0,0,62cc9af3a9e12c32332fdab0e5c5a83ab6b53958493b4efe680877f6a1c84c8b,2025-04-09T20:02:41.860000 CVE-2025-31036,0,0,62cc9af3a9e12c32332fdab0e5c5a83ab6b53958493b4efe680877f6a1c84c8b,2025-04-09T20:02:41.860000
CVE-2025-31037,1,1,7963ad0be448052df9d3d81b17be197e12c5d3d1b4487b35c8312e5772961c7f,2025-07-04T12:15:27.790000 CVE-2025-31037,0,0,7963ad0be448052df9d3d81b17be197e12c5d3d1b4487b35c8312e5772961c7f,2025-07-04T12:15:27.790000
CVE-2025-31038,0,0,7b5afc8e5d375ec9301ab6b724560141888b47309d5f5f2d9937b8782c078587,2025-04-09T20:02:41.860000 CVE-2025-31038,0,0,7b5afc8e5d375ec9301ab6b724560141888b47309d5f5f2d9937b8782c078587,2025-04-09T20:02:41.860000
CVE-2025-31039,0,0,3e71e4693b497f566796572ee06eac544c71385131a6aad7b4db8dd95cd81f04,2025-06-12T16:06:47.857000 CVE-2025-31039,0,0,3e71e4693b497f566796572ee06eac544c71385131a6aad7b4db8dd95cd81f04,2025-06-12T16:06:47.857000
CVE-2025-3104,0,0,7baf3ae0deb4ba68c845a43b1ae9db1bf794c9bf7b07685fd4c21f525945dae6,2025-04-16T13:25:37.340000 CVE-2025-3104,0,0,7baf3ae0deb4ba68c845a43b1ae9db1bf794c9bf7b07685fd4c21f525945dae6,2025-04-16T13:25:37.340000
@ -293114,7 +293114,7 @@ CVE-2025-32293,0,0,9a78105b18f8a0c6c5de1f8fe7dabe6d94082dabce45b1c06d974558f6494
CVE-2025-32294,0,0,9398a189e417d8f1d02011e09df57d4ffe10a67d2827545633f1e29d8a0f8f0c,2025-05-23T15:54:42.643000 CVE-2025-32294,0,0,9398a189e417d8f1d02011e09df57d4ffe10a67d2827545633f1e29d8a0f8f0c,2025-05-23T15:54:42.643000
CVE-2025-32295,0,0,53c433306ea7dc97c36184a382b23df1b7d58def930436bb6fff2c7acee5a45e,2025-05-19T13:35:50.497000 CVE-2025-32295,0,0,53c433306ea7dc97c36184a382b23df1b7d58def930436bb6fff2c7acee5a45e,2025-05-19T13:35:50.497000
CVE-2025-32296,0,0,55e4b32b240a3fefbe017324691d07e50cbce68d67ba40dfedaf61401ab7943b,2025-05-19T13:35:50.497000 CVE-2025-32296,0,0,55e4b32b240a3fefbe017324691d07e50cbce68d67ba40dfedaf61401ab7943b,2025-05-19T13:35:50.497000
CVE-2025-32297,1,1,7864874790b44bc86971a82eba0475cfc424132e681c73bfdc11da628e805147,2025-07-04T12:15:27.980000 CVE-2025-32297,0,0,7864874790b44bc86971a82eba0475cfc424132e681c73bfdc11da628e805147,2025-07-04T12:15:27.980000
CVE-2025-32298,0,0,302f959d43cad911fa63ec1c874fdce4574abad03c10b91ff72248209ba9352a,2025-06-30T18:38:48.477000 CVE-2025-32298,0,0,302f959d43cad911fa63ec1c874fdce4574abad03c10b91ff72248209ba9352a,2025-06-30T18:38:48.477000
CVE-2025-32299,0,0,49c4147c6d2449192d55c98739bc9eec8c1be87420b29ae76c69f17ee126a9c1,2025-05-19T13:35:50.497000 CVE-2025-32299,0,0,49c4147c6d2449192d55c98739bc9eec8c1be87420b29ae76c69f17ee126a9c1,2025-05-19T13:35:50.497000
CVE-2025-3230,0,0,d3629a3e2161163bd15af1432474f4fcf2513cb10a5452b9803677814dc453de,2025-05-30T16:31:03.107000 CVE-2025-3230,0,0,d3629a3e2161163bd15af1432474f4fcf2513cb10a5452b9803677814dc453de,2025-05-30T16:31:03.107000
@ -293127,7 +293127,7 @@ CVE-2025-32308,0,0,2b7bec71af2d8aeb794f4d157dfc61ad4810b98ac960b587b7920f453cf78
CVE-2025-32309,0,0,72e524edceb2da5dc017c83bf8ab60e46c6fe45eb184ab0349a1ba415921a900,2025-05-23T15:54:42.643000 CVE-2025-32309,0,0,72e524edceb2da5dc017c83bf8ab60e46c6fe45eb184ab0349a1ba415921a900,2025-05-23T15:54:42.643000
CVE-2025-3231,0,0,7fe259e10bdefff2f7d2cc360ec09abf1ea1f8d9711a4276861c2a354dc3b16e,2025-06-05T05:15:23.977000 CVE-2025-3231,0,0,7fe259e10bdefff2f7d2cc360ec09abf1ea1f8d9711a4276861c2a354dc3b16e,2025-06-05T05:15:23.977000
CVE-2025-32310,0,0,c3b2568a49d7a011e3cbc9748557e58f0519995b3a6735845f843c0d6b6482d9,2025-05-19T13:35:50.497000 CVE-2025-32310,0,0,c3b2568a49d7a011e3cbc9748557e58f0519995b3a6735845f843c0d6b6482d9,2025-05-19T13:35:50.497000
CVE-2025-32311,1,1,66902e9308b8ff4ed8b5285e97c96281e1ccb8dede092a58a49a65bd3fc68a1a,2025-07-04T12:15:28.163000 CVE-2025-32311,0,0,66902e9308b8ff4ed8b5285e97c96281e1ccb8dede092a58a49a65bd3fc68a1a,2025-07-04T12:15:28.163000
CVE-2025-3234,0,0,70e8f52beb03455c50e84ca367316ec0117a47001407b94db1600acd985ca8fa,2025-06-16T12:32:18.840000 CVE-2025-3234,0,0,70e8f52beb03455c50e84ca367316ec0117a47001407b94db1600acd985ca8fa,2025-06-16T12:32:18.840000
CVE-2025-3235,0,0,bf02e56a9b2acdd9197c016e355d3cdfc496d77110cbd9f5fcadcef4a0003d66,2025-05-16T15:43:09.640000 CVE-2025-3235,0,0,bf02e56a9b2acdd9197c016e355d3cdfc496d77110cbd9f5fcadcef4a0003d66,2025-05-16T15:43:09.640000
CVE-2025-32352,0,0,14a2251916c9246fc3d185746736b75fd36a375e4aafcddd19d832e612b92a9a,2025-04-07T17:15:37.147000 CVE-2025-32352,0,0,14a2251916c9246fc3d185746736b75fd36a375e4aafcddd19d832e612b92a9a,2025-04-07T17:15:37.147000
@ -294798,13 +294798,70 @@ CVE-2025-38173,0,0,08731523179cb799e2a4113c4ef77bca1b93441f06e50936252e763ad3448
CVE-2025-38174,0,0,53a3c9dd9ce1ec8953cc61fd4aae35565f1e3a756f2c47cb0e4065d2908e9a78,2025-07-04T11:15:51.283000 CVE-2025-38174,0,0,53a3c9dd9ce1ec8953cc61fd4aae35565f1e3a756f2c47cb0e4065d2908e9a78,2025-07-04T11:15:51.283000
CVE-2025-38175,0,0,5f50123915645cd66f3e27a556e629641b60ee389607f24a58fe01e82d4bc2a4,2025-07-04T11:15:51.420000 CVE-2025-38175,0,0,5f50123915645cd66f3e27a556e629641b60ee389607f24a58fe01e82d4bc2a4,2025-07-04T11:15:51.420000
CVE-2025-38176,0,0,1d76865b3abcccf11009f7e60898387d9095aa3651a6c61a1f0472558a222c04,2025-07-04T11:15:51.543000 CVE-2025-38176,0,0,1d76865b3abcccf11009f7e60898387d9095aa3651a6c61a1f0472558a222c04,2025-07-04T11:15:51.543000
CVE-2025-38177,1,1,ce355b67eb26bef076b6442ea21fdee9dec2f5cf3d36e312374ee949d4b76257,2025-07-04T13:15:24.033000 CVE-2025-38177,0,0,ce355b67eb26bef076b6442ea21fdee9dec2f5cf3d36e312374ee949d4b76257,2025-07-04T13:15:24.033000
CVE-2025-38178,1,1,be5499b810171df03cf9a07c4cbd7183911c3b7c6c9e0d76a7d1bcf153c607e9,2025-07-04T14:15:24.233000
CVE-2025-38179,1,1,e91fc6b85ea6f601d39075c871692cdbfba43b9c5edbc87510dcad1442c425f1,2025-07-04T14:15:24.553000
CVE-2025-3818,0,0,3c16ac735bef611f4f7a003d7e8df6e629fdba89dc0e50dd09818ffaf2dc408d,2025-05-29T14:15:36.833000 CVE-2025-3818,0,0,3c16ac735bef611f4f7a003d7e8df6e629fdba89dc0e50dd09818ffaf2dc408d,2025-05-29T14:15:36.833000
CVE-2025-38180,1,1,97264d8d7d4ba8e2d16f12fb41cc5bccd6380cff1253cf06c5c6588456b4a30b,2025-07-04T14:15:24.700000
CVE-2025-38181,1,1,6e5d98ea7db15121bf63ee0fac0973cfb37fee34d392384fc37ba1e020adaddd,2025-07-04T14:15:24.860000
CVE-2025-38182,1,1,645dce2b56e79329d9508cc1101b519ea4b0a1319a035763544f88f99dde49d1,2025-07-04T14:15:24.990000
CVE-2025-38183,1,1,dd70d64a358e8cbf06ba6111ac22d691e6fe5faf4ac64a6d6fec17e38511d2b4,2025-07-04T14:15:25.113000
CVE-2025-38184,1,1,74d43ff4aeffebc68f080d8c1bcc6fad5985b95f9f104f0ec209f73f927b7a55,2025-07-04T14:15:25.237000
CVE-2025-38185,1,1,379cded96a7182ec8b6f301fbcbbf036690d54a6d958e2987db368970254de54,2025-07-04T14:15:25.377000
CVE-2025-38186,1,1,e7f7bb06bde8c3c39bba04fb7d943890284c5dc6fbd8b2e93c2a3282d53beeb3,2025-07-04T14:15:25.520000
CVE-2025-38187,1,1,5f699f54c3aadc4a96d61a1b3b97a0f876038750bcd748c04d4bd75ab5e0ddb6,2025-07-04T14:15:25.640000
CVE-2025-38188,1,1,b1ff0967352bc6b75afa90db9ce06254f2ec8251c5fd4cc1a5400d89770c7bdc,2025-07-04T14:15:25.760000
CVE-2025-38189,1,1,1db4b1c9f42287d13797cb1043d1ab3f1fd82206af0567b8c05387a2febcc4df,2025-07-04T14:15:25.883000
CVE-2025-3819,0,0,316fcf62ccd5dbea2c470e70addfcde222849a1bd463811716c3a6eeedb126a1,2025-05-14T13:23:57.713000 CVE-2025-3819,0,0,316fcf62ccd5dbea2c470e70addfcde222849a1bd463811716c3a6eeedb126a1,2025-05-14T13:23:57.713000
CVE-2025-38190,1,1,bef8b6fbe6a883d68db774c773c26d63eb3f2244166f97e4befcee7da1cb29d0,2025-07-04T14:15:26.017000
CVE-2025-38191,1,1,e58bbb55f0b3a71c5cb4ed4c62edd220873100a4fbab909266764b840b05a181,2025-07-04T14:15:26.157000
CVE-2025-38192,1,1,722265ba50c1b743fd6728bd2f1703c2c6d1128a46008de366508ad678002e64,2025-07-04T14:15:26.280000
CVE-2025-38193,1,1,c67ffcb4e86419b8e2bf850baf78c3511d81644cbf63930238760e9e37a936b6,2025-07-04T14:15:26.403000
CVE-2025-38194,1,1,e527df85298929753a0c85c707e774e40037b666e9932783550aa16d9543c6f6,2025-07-04T14:15:26.530000
CVE-2025-38195,1,1,e795b61752b1a3c381805c356fe9af0166f1292e2a0211a5ca107e8d10b6ac9b,2025-07-04T14:15:26.667000
CVE-2025-38196,1,1,c7b6eaef9ceb13c190ea508c5fe76c1023a684fa25666921939f76f5fe075eee,2025-07-04T14:15:26.787000
CVE-2025-38197,1,1,b02a4689483128a59c73468472e6e8ae70d23525c19d6b646019be857c621bc1,2025-07-04T14:15:26.913000
CVE-2025-38198,1,1,9146c4f3d61aa5d5d923ad61379718e2f1768cbc139238828111576e3d001491,2025-07-04T14:15:27.040000
CVE-2025-38199,1,1,cd6e3edf1524a93e5b3f1d2c0f81cd12c6ef88fc4714a7f06d80e245635767e1,2025-07-04T14:15:27.707000
CVE-2025-3820,0,0,34e78ee07c727e4b7e6e73a0185d4c76251684a3fdeed8adc4204415923e2fbd,2025-04-21T14:23:45.950000 CVE-2025-3820,0,0,34e78ee07c727e4b7e6e73a0185d4c76251684a3fdeed8adc4204415923e2fbd,2025-04-21T14:23:45.950000
CVE-2025-38200,1,1,1887b6471f5bbc34945f09bcdc69d22a113df8c6aea6a706b0a6cdd524d3397f,2025-07-04T14:15:27.877000
CVE-2025-38201,1,1,35b6a501a4bf8e7a55552f0bdf7ab923a289e697ab7f390b47eb5ecdd1328518,2025-07-04T14:15:28
CVE-2025-38202,1,1,22be81bf1dee15e2876171885bcb56452ff813db32fbe51822eecc652860e825,2025-07-04T14:15:28.117000
CVE-2025-38203,1,1,11b7c6356a70cadd2c736a11cadc02458d3f4fe5e14a5d47ce14685a01256539,2025-07-04T14:15:28.247000
CVE-2025-38204,1,1,edb76c4a8a61e323e569966e7609a7674fcc868cc33a4c3686eed3832d01614a,2025-07-04T14:15:28.383000
CVE-2025-38205,1,1,228c6e8ea1a896634b141ad8a5013c5fbde9b5920667a804707d18c947ac0284,2025-07-04T14:15:28.540000
CVE-2025-38206,1,1,d04c3e2e2ba4dd24197df4037c9aa2f7fbb51cd1acfa0e5ddd01e6c2dba1c34d,2025-07-04T14:15:28.703000
CVE-2025-38207,1,1,cde6353b96e41d064d0e742eee3a654f014e522cf7963284ceb8e0bb2b39c903,2025-07-04T14:15:28.823000
CVE-2025-38208,1,1,56445b0b177e92b0822355fccacaefbdbf290cac6a92b931975f01d0a984b6e1,2025-07-04T14:15:28.950000
CVE-2025-38209,1,1,0087e645fb3be16c85cb3825cd07573131c3c2032f75fc5d4e498d37f67d718c,2025-07-04T14:15:29.080000
CVE-2025-3821,0,0,3699df16ba4e38d23bcfa11d0ecd5e203afe55655765d9ea2321ebbc5147167b,2025-04-24T15:43:30.220000 CVE-2025-3821,0,0,3699df16ba4e38d23bcfa11d0ecd5e203afe55655765d9ea2321ebbc5147167b,2025-04-24T15:43:30.220000
CVE-2025-38210,1,1,40a0e2ecd85b8c02de8a0f89f65a359e8f5d5f0b9c0e0419c98231e298b59b52,2025-07-04T14:15:29.207000
CVE-2025-38211,1,1,0f62c3e6002d17ba2dc03a63b5e15cbf9f625db1f839db8950af5570627495c0,2025-07-04T14:15:29.337000
CVE-2025-38212,1,1,54609e55dc2912bd146e01f6c79e915886ab67b5a017b56c6ad8ea8de06fdccd,2025-07-04T14:15:29.473000
CVE-2025-38213,1,1,df8f353ec5a00156ab9a2fff1ddf4355060d97b15733bf7934acb28f53ce430c,2025-07-04T14:15:29.710000
CVE-2025-38214,1,1,da7d94bacf49b6f2a242a8d7da5c5e70c9e35c7a13df56cc2dff77c086ae7af9,2025-07-04T14:15:29.843000
CVE-2025-38215,1,1,7a39b0dd1643f9da92bfa96045f470f171415855d2210b0f5be6a682523b8077,2025-07-04T14:15:29.980000
CVE-2025-38216,1,1,f13be5f0b2e0003ddeefc8fae8bd67fbf64051d6a0ee007d86f77f0d8212f13c,2025-07-04T14:15:30.103000
CVE-2025-38217,1,1,e332d143e1bc78df14c9ebc5cffbcb67ed760be175ff68c893ab27ee217f74ba,2025-07-04T14:15:30.227000
CVE-2025-38218,1,1,14196dcf58cd11b0eda2f115b7eaa6b85a0ae0ea5230988c9e93b2f968cf34f9,2025-07-04T14:15:30.353000
CVE-2025-38219,1,1,aed5ee7381f26a0130b284c096a67a36e82ef7934250662d564ece39bcc62a9a,2025-07-04T14:15:30.473000
CVE-2025-3822,0,0,7790a01e24287d8b249506db0d133ebb2d3ce7360cb94da0889d65e764ec0507,2025-04-24T15:40:04.663000 CVE-2025-3822,0,0,7790a01e24287d8b249506db0d133ebb2d3ce7360cb94da0889d65e764ec0507,2025-04-24T15:40:04.663000
CVE-2025-38220,1,1,e6764701e6f59933b569148c0921b4d38642cd6cbe906bc0489af4c26ee95eac,2025-07-04T14:15:30.597000
CVE-2025-38221,1,1,aae650f3072a94fbd5846395ec7469cb0255ed121318a4eeb949d739bb98bce8,2025-07-04T14:15:30.723000
CVE-2025-38222,1,1,814bf08005a96ef6825f9c4e0686a123814f55dca64dcf5f5c984fe5a893247f,2025-07-04T14:15:30.850000
CVE-2025-38223,1,1,043d16b61d1467b29b84defdca890f91a604a326362a721bdb0fcec6a52ea9f2,2025-07-04T14:15:30.987000
CVE-2025-38224,1,1,a5e73c28c76ed93e3d4986d5a8ed1538bcc5cb3e8241b1666496bc78bb999ca6,2025-07-04T14:15:31.110000
CVE-2025-38225,1,1,d59e95324a889eeb51f2aa2901a093441412481231a8c454e486d9139fa3b587,2025-07-04T14:15:31.237000
CVE-2025-38226,1,1,b0590a19664c34e49bc85552383cf0465fd8d272423cc51c69d14e55ce3ebb97,2025-07-04T14:15:31.367000
CVE-2025-38227,1,1,86b8f3380e72adcb247b4b389d036a991474aa6fb0b897882f7d344dfaa72843,2025-07-04T14:15:32.153000
CVE-2025-38228,1,1,1c6e392629d50da71bc3ff1e44f01ed1ab4ec6be5edf1dd45457fff759f54bf5,2025-07-04T14:15:32.290000
CVE-2025-38229,1,1,4f6f33a13f63bcb33b8777003a240ac6067a1a3e3bcbe1784fa4da76d7f89c16,2025-07-04T14:15:32.410000
CVE-2025-3823,0,0,f978abbb7fa2709632f1f6fe745ffcaa6b81e025b2c8e5749491f7b8db352dc6,2025-04-30T17:38:51.467000 CVE-2025-3823,0,0,f978abbb7fa2709632f1f6fe745ffcaa6b81e025b2c8e5749491f7b8db352dc6,2025-04-30T17:38:51.467000
CVE-2025-38230,1,1,0ab5862db77df71e21d44c9398b95504fcf50c30f5c89c0a058d46a370cbb023,2025-07-04T14:15:32.550000
CVE-2025-38231,1,1,c951206a630c3cacf3c4fc38390ddd21f4e289b76ecb9d793e849ca52168b708,2025-07-04T14:15:32.683000
CVE-2025-38232,1,1,b446111677a15eef3d5a51e04c9eea515113cb574d43b2169fb423609b26ee44,2025-07-04T14:15:32.810000
CVE-2025-38233,1,1,afdffe290ca80c9a789387ca12cd1e81c7c6ebe83b7e4cb392ce6d0adb1e21f3,2025-07-04T14:15:32.953000
CVE-2025-38234,1,1,829e151d3722969e4296c72d092f8f462985b592d44984b22f3bb0cb4dc82826,2025-07-04T14:15:33.087000
CVE-2025-3824,0,0,4042020909e5223dbce6d2958e1aacca8166710222023563345f997e50394c09,2025-04-30T17:36:04.970000 CVE-2025-3824,0,0,4042020909e5223dbce6d2958e1aacca8166710222023563345f997e50394c09,2025-04-30T17:36:04.970000
CVE-2025-38240,0,0,117d76f4b128d7e0799c3952cf9e021270b3a89841576592d72d8a875350efe5,2025-04-21T14:23:45.950000 CVE-2025-38240,0,0,117d76f4b128d7e0799c3952cf9e021270b3a89841576592d72d8a875350efe5,2025-04-21T14:23:45.950000
CVE-2025-3825,0,0,f32d1d72467b4949b7a1ca6e34d7286cd27354f39fac3d30ab70022243e0cd52,2025-04-30T17:33:52.383000 CVE-2025-3825,0,0,f32d1d72467b4949b7a1ca6e34d7286cd27354f39fac3d30ab70022243e0cd52,2025-04-30T17:33:52.383000
@ -295055,7 +295112,7 @@ CVE-2025-39481,0,0,ffc38075b9c9e137d0a9f220b07f654268d9b6b192ff077aaa96738d747f3
CVE-2025-39482,0,0,f44ca390a511cc4fa9864ad222a12fd65c81c88e214777e055d5294de44cc742,2025-06-06T21:54:00.823000 CVE-2025-39482,0,0,f44ca390a511cc4fa9864ad222a12fd65c81c88e214777e055d5294de44cc742,2025-06-06T21:54:00.823000
CVE-2025-39485,0,0,70335b3403cfdaaf341612abdd2f1cd24b67724d9af1078263285d5edb296bf1,2025-05-23T15:54:42.643000 CVE-2025-39485,0,0,70335b3403cfdaaf341612abdd2f1cd24b67724d9af1078263285d5edb296bf1,2025-05-23T15:54:42.643000
CVE-2025-39486,0,0,1a5bf0d54b393953a2981b7d722be529e2899f1eb7efd4bc047395019cabf8ac,2025-06-17T20:50:23.507000 CVE-2025-39486,0,0,1a5bf0d54b393953a2981b7d722be529e2899f1eb7efd4bc047395019cabf8ac,2025-06-17T20:50:23.507000
CVE-2025-39487,1,1,061fbb607f28d5a0bb8e103f5d48bb8717076e158984d2e348743368d7e0f4f5,2025-07-04T12:15:28.353000 CVE-2025-39487,0,0,061fbb607f28d5a0bb8e103f5d48bb8717076e158984d2e348743368d7e0f4f5,2025-07-04T12:15:28.353000
CVE-2025-39488,0,0,632999481930c08854f29c3aac16c1691ab347c034a3ff2179fc0cb8b58cda1c,2025-06-30T18:38:48.477000 CVE-2025-39488,0,0,632999481930c08854f29c3aac16c1691ab347c034a3ff2179fc0cb8b58cda1c,2025-06-30T18:38:48.477000
CVE-2025-39489,0,0,b80eceb8e17f53f167eb1f01a46351e47168a0eeeb436f1c1624f43d9e9a40e7,2025-05-23T15:54:42.643000 CVE-2025-39489,0,0,b80eceb8e17f53f167eb1f01a46351e47168a0eeeb436f1c1624f43d9e9a40e7,2025-05-23T15:54:42.643000
CVE-2025-3949,0,0,168e2abe66849b76f108d2275699dc7aa3f34d482497d50c4cedde8b889e7a83,2025-05-12T17:32:32.760000 CVE-2025-3949,0,0,168e2abe66849b76f108d2275699dc7aa3f34d482497d50c4cedde8b889e7a83,2025-05-12T17:32:32.760000
@ -295943,7 +296000,7 @@ CVE-2025-4412,0,0,8c8c59397117a84a167d36fb79f68c5cd99b79261327a1fb082cf24faee6cc
CVE-2025-4413,0,0,61cf4ae74dd1877b470f2b4f5c2f8b7d6825e0d478eed1e554284b17cfa549ed,2025-06-18T13:46:52.973000 CVE-2025-4413,0,0,61cf4ae74dd1877b470f2b4f5c2f8b7d6825e0d478eed1e554284b17cfa549ed,2025-06-18T13:46:52.973000
CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44980,2025-05-14T13:05:17.200000 CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44980,2025-05-14T13:05:17.200000
CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000 CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000
CVE-2025-4414,1,1,221c6e0a0804453fe8b27029d24cb5280cb8f036dd1aabda2d76a914ac2e058b,2025-07-04T12:15:32.617000 CVE-2025-4414,0,0,221c6e0a0804453fe8b27029d24cb5280cb8f036dd1aabda2d76a914ac2e058b,2025-07-04T12:15:32.617000
CVE-2025-44141,0,0,1b640fec5b67675dd6c48e39ace9ed93416eeec7d96ebdef4175bdaef84aa0ca,2025-07-01T16:03:07.920000 CVE-2025-44141,0,0,1b640fec5b67675dd6c48e39ace9ed93416eeec7d96ebdef4175bdaef84aa0ca,2025-07-01T16:03:07.920000
CVE-2025-44148,0,0,440749a71814d76edeed70dd30fc58f3e0b75eaee931968ee8c88b7d1e24e11d,2025-06-09T18:04:33.580000 CVE-2025-44148,0,0,440749a71814d76edeed70dd30fc58f3e0b75eaee931968ee8c88b7d1e24e11d,2025-06-09T18:04:33.580000
CVE-2025-4415,0,0,14ae76cc14cb7c5f3c4c963406f20e07ac9834ebdb3d6a3c4d84f73bfd11e915,2025-05-21T20:24:58.133000 CVE-2025-4415,0,0,14ae76cc14cb7c5f3c4c963406f20e07ac9834ebdb3d6a3c4d84f73bfd11e915,2025-05-21T20:24:58.133000
@ -296702,6 +296759,7 @@ CVE-2025-46729,0,0,3d8d59d25190133ac6496709f02425f4d1111f3c931af4f4025cae2f29ca9
CVE-2025-4673,0,0,8ebe6f381de46cbcd176f9bf2be0da1445d7f3d9c7d4ce0c61d2293f68e7bb9b,2025-06-12T16:06:20.180000 CVE-2025-4673,0,0,8ebe6f381de46cbcd176f9bf2be0da1445d7f3d9c7d4ce0c61d2293f68e7bb9b,2025-06-12T16:06:20.180000
CVE-2025-46730,0,0,b778d0b5827610b109aca84c60c7db8a5c07cd79e4727d7833dbfa430226054a,2025-05-05T20:54:19.760000 CVE-2025-46730,0,0,b778d0b5827610b109aca84c60c7db8a5c07cd79e4727d7833dbfa430226054a,2025-05-05T20:54:19.760000
CVE-2025-46731,0,0,740ae6cdf8e49828e45e818d257c44d2898d4000cadd73cc7ec4d28341cdaef9,2025-05-05T20:54:19.760000 CVE-2025-46731,0,0,740ae6cdf8e49828e45e818d257c44d2898d4000cadd73cc7ec4d28341cdaef9,2025-05-05T20:54:19.760000
CVE-2025-46733,1,1,099537ce8d3fb7414dfb64880f3e8a4c253f103bb593c65ae3a0fb43bfd03c07,2025-07-04T14:15:33.217000
CVE-2025-46734,0,0,27cdefb7b43f54c218843044d524287f654bbf79b65207f62aa51f5ae27b4d71,2025-05-05T20:54:19.760000 CVE-2025-46734,0,0,27cdefb7b43f54c218843044d524287f654bbf79b65207f62aa51f5ae27b4d71,2025-05-05T20:54:19.760000
CVE-2025-46735,0,0,2150630835f1e409644bdb468cff4c89fbabadc89939c20bcdd0b4d1b651714f,2025-05-07T14:13:20.483000 CVE-2025-46735,0,0,2150630835f1e409644bdb468cff4c89fbabadc89939c20bcdd0b4d1b651714f,2025-05-07T14:13:20.483000
CVE-2025-46736,0,0,8694e287f5d10d35b9cac8cd30430efa86a726280e0c4502e53d2236462dc452,2025-05-07T14:13:20.483000 CVE-2025-46736,0,0,8694e287f5d10d35b9cac8cd30430efa86a726280e0c4502e53d2236462dc452,2025-05-07T14:13:20.483000
@ -297169,7 +297227,7 @@ CVE-2025-47475,0,0,419116b80f7fe9386a9aac3c0836858ef647ac252eac4b1ff08d67e0a3375
CVE-2025-47476,0,0,f06946c9db65910277eefdd02a4e277fdae7c5884111c0fe22a4a0e5abb63365,2025-05-08T14:39:18.800000 CVE-2025-47476,0,0,f06946c9db65910277eefdd02a4e277fdae7c5884111c0fe22a4a0e5abb63365,2025-05-08T14:39:18.800000
CVE-2025-47477,0,0,77da2db11e5826e5ac8b7646c2ab3c2664e4f15f6b958d535ab609737d59cbfd,2025-06-12T16:06:47.857000 CVE-2025-47477,0,0,77da2db11e5826e5ac8b7646c2ab3c2664e4f15f6b958d535ab609737d59cbfd,2025-06-12T16:06:47.857000
CVE-2025-47478,0,0,e6d6adb3b1616923ef0638df6a5bba4a6a66b2f12e5e8ad860cddbc43d60dfda,2025-05-23T15:54:42.643000 CVE-2025-47478,0,0,e6d6adb3b1616923ef0638df6a5bba4a6a66b2f12e5e8ad860cddbc43d60dfda,2025-05-23T15:54:42.643000
CVE-2025-47479,1,1,615afe1b3b815594c76d8b7f5cd63272f49df020e558275a50ea30eeafa0e272,2025-07-04T12:15:28.530000 CVE-2025-47479,0,0,615afe1b3b815594c76d8b7f5cd63272f49df020e558275a50ea30eeafa0e272,2025-07-04T12:15:28.530000
CVE-2025-4748,0,0,d72b1fc830074b164b8acb25ed3eaab3cb637a77bda96fbcf4a4f78a30586787,2025-07-04T10:15:23.127000 CVE-2025-4748,0,0,d72b1fc830074b164b8acb25ed3eaab3cb637a77bda96fbcf4a4f78a30586787,2025-07-04T10:15:23.127000
CVE-2025-47480,0,0,ef5cc5737d0e088e76573f050c6e079a8e6e4769a34e7600bd175867d6608ec8,2025-05-08T14:39:18.800000 CVE-2025-47480,0,0,ef5cc5737d0e088e76573f050c6e079a8e6e4769a34e7600bd175867d6608ec8,2025-05-08T14:39:18.800000
CVE-2025-47481,0,0,9dd0d7411f22176e27723210f288403628c90f1234e60ae0d0856344023dd406,2025-05-08T14:39:18.800000 CVE-2025-47481,0,0,9dd0d7411f22176e27723210f288403628c90f1234e60ae0d0856344023dd406,2025-05-08T14:39:18.800000
@ -297258,7 +297316,7 @@ CVE-2025-47561,0,0,8b050526c8237fe36193e74cf309358734a02806bb21757e1cf72a029c892
CVE-2025-47562,0,0,879496304ffa94481070c08ba70f4beeb80850bcaa0cd491262f65c2fe9f8f35,2025-05-19T13:35:50.497000 CVE-2025-47562,0,0,879496304ffa94481070c08ba70f4beeb80850bcaa0cd491262f65c2fe9f8f35,2025-05-19T13:35:50.497000
CVE-2025-47563,0,0,72acd05048e66bf43174d423048963fa4336cfd5d05a950e28ccf6a586953f28,2025-05-19T13:35:50.497000 CVE-2025-47563,0,0,72acd05048e66bf43174d423048963fa4336cfd5d05a950e28ccf6a586953f28,2025-05-19T13:35:50.497000
CVE-2025-47564,0,0,758c7c233976a079425cfa725a742dd6e7231873de27eacf12a1e47dc13257f8,2025-05-19T13:35:50.497000 CVE-2025-47564,0,0,758c7c233976a079425cfa725a742dd6e7231873de27eacf12a1e47dc13257f8,2025-05-19T13:35:50.497000
CVE-2025-47565,1,1,8b16b5c755075c3dcc98667be5e0b1272b5f8108f52b520047a7220b1bb94e13,2025-07-04T12:15:28.720000 CVE-2025-47565,0,0,8b16b5c755075c3dcc98667be5e0b1272b5f8108f52b520047a7220b1bb94e13,2025-07-04T12:15:28.720000
CVE-2025-47567,0,0,8bd59bb6ff8c472a7ea16c76eaaa9fb8be8e5bf93dec95aa6197eaff663abf08,2025-05-19T13:35:50.497000 CVE-2025-47567,0,0,8bd59bb6ff8c472a7ea16c76eaaa9fb8be8e5bf93dec95aa6197eaff663abf08,2025-05-19T13:35:50.497000
CVE-2025-47568,0,0,816122bf6ee3258a91c70b57c27a64864503daf9f011fa2dfdbf1808df01ccc4,2025-05-23T15:54:42.643000 CVE-2025-47568,0,0,816122bf6ee3258a91c70b57c27a64864503daf9f011fa2dfdbf1808df01ccc4,2025-05-23T15:54:42.643000
CVE-2025-4757,0,0,aff32a5dd8531f1cf16b47f2eaa3e2f3dcb4fa067452c943f1a1e24c22fb61c9,2025-05-27T19:49:21.437000 CVE-2025-4757,0,0,aff32a5dd8531f1cf16b47f2eaa3e2f3dcb4fa067452c943f1a1e24c22fb61c9,2025-05-27T19:49:21.437000
@ -297317,14 +297375,14 @@ CVE-2025-47623,0,0,adb1ced070dea01b2e40fc59b84823c3de3af7a1cdf4dc4cba34ff48b6ead
CVE-2025-47624,0,0,3dbfa0dab0132de797c9a5cab8ee76ac7a93263d3ebb72f7a44909996daa6ae3,2025-05-12T20:13:02.450000 CVE-2025-47624,0,0,3dbfa0dab0132de797c9a5cab8ee76ac7a93263d3ebb72f7a44909996daa6ae3,2025-05-12T20:13:02.450000
CVE-2025-47625,0,0,b879c66726c7cc8f91a62e5cada6922da2027387107c601a854ac60f809d11a1,2025-05-12T20:12:01.663000 CVE-2025-47625,0,0,b879c66726c7cc8f91a62e5cada6922da2027387107c601a854ac60f809d11a1,2025-05-12T20:12:01.663000
CVE-2025-47626,0,0,bf88148a7c502f96131b60b77588d57b9b40344b978f3b708b521e2614a36d54,2025-05-12T20:11:39.513000 CVE-2025-47626,0,0,bf88148a7c502f96131b60b77588d57b9b40344b978f3b708b521e2614a36d54,2025-05-12T20:11:39.513000
CVE-2025-47627,1,1,5fd600955760d79ff9ca897e818c88517f566fac41c0fc13577245730938bb0c,2025-07-04T12:15:28.917000 CVE-2025-47627,0,0,5fd600955760d79ff9ca897e818c88517f566fac41c0fc13577245730938bb0c,2025-07-04T12:15:28.917000
CVE-2025-47628,0,0,3a352204d5e4cc12d5ce2e2e1ea3da85e25e0eb47c6bbea20c8b5b637fab879d,2025-05-12T20:11:13.080000 CVE-2025-47628,0,0,3a352204d5e4cc12d5ce2e2e1ea3da85e25e0eb47c6bbea20c8b5b637fab879d,2025-05-12T20:11:13.080000
CVE-2025-47629,0,0,68608bf59b09b45aca1dd6b501b7a877b54d1b0c440b69b9904797f74442993a,2025-05-12T20:31:08.413000 CVE-2025-47629,0,0,68608bf59b09b45aca1dd6b501b7a877b54d1b0c440b69b9904797f74442993a,2025-05-12T20:31:08.413000
CVE-2025-47630,0,0,f790609ceecba739ddd28929a03ce3e7133470ecda92675205e840ef8b22ebf4,2025-05-12T20:00:07.693000 CVE-2025-47630,0,0,f790609ceecba739ddd28929a03ce3e7133470ecda92675205e840ef8b22ebf4,2025-05-12T20:00:07.693000
CVE-2025-47631,0,0,12034c51ff11737e86761439c9b9dd9575d84000baabff3044b7eb2f26d9fba4,2025-05-23T15:54:42.643000 CVE-2025-47631,0,0,12034c51ff11737e86761439c9b9dd9575d84000baabff3044b7eb2f26d9fba4,2025-05-23T15:54:42.643000
CVE-2025-47632,0,0,ee2719cb952cde93b033c00cf78ab6f3291285f0dd8209ef8af4b77a88946ad6,2025-05-12T19:59:39.963000 CVE-2025-47632,0,0,ee2719cb952cde93b033c00cf78ab6f3291285f0dd8209ef8af4b77a88946ad6,2025-05-12T19:59:39.963000
CVE-2025-47633,0,0,fe0fc967b6a437fc51271e1790c541fcb665c108db49d6bb16969242bddb37dd,2025-05-12T19:58:40.697000 CVE-2025-47633,0,0,fe0fc967b6a437fc51271e1790c541fcb665c108db49d6bb16969242bddb37dd,2025-05-12T19:58:40.697000
CVE-2025-47634,1,1,c6b1d110661276605da1933fb0ab64363540b5164dca315fb3a12b7eca92052e,2025-07-04T12:15:29.090000 CVE-2025-47634,0,0,c6b1d110661276605da1933fb0ab64363540b5164dca315fb3a12b7eca92052e,2025-07-04T12:15:29.090000
CVE-2025-47635,0,0,2d332eb90b47618ac710d319d79594887a0d45990abd9224e46e68d15f534de4,2025-05-12T19:56:54.593000 CVE-2025-47635,0,0,2d332eb90b47618ac710d319d79594887a0d45990abd9224e46e68d15f534de4,2025-05-12T19:56:54.593000
CVE-2025-47636,0,0,ec0e283d6103bb393c29402697250981cce8cea83f07c93c3c7a0090b2e210ae,2025-05-08T14:39:09.683000 CVE-2025-47636,0,0,ec0e283d6103bb393c29402697250981cce8cea83f07c93c3c7a0090b2e210ae,2025-05-08T14:39:09.683000
CVE-2025-47637,0,0,57e63b481c7b92bcd190b336ab47b8c4dd17f9a48948c3115cee252776f48397,2025-05-23T15:54:42.643000 CVE-2025-47637,0,0,57e63b481c7b92bcd190b336ab47b8c4dd17f9a48948c3115cee252776f48397,2025-05-23T15:54:42.643000
@ -297654,7 +297712,7 @@ CVE-2025-48147,0,0,d66fc5f0d4a515039630f4bce27a90f7dd008308f73336ecb1c7033f2767d
CVE-2025-4815,0,0,31cc1cd9ba179e2e20111ed224a5d1f55b5f28081bf7ef82d4c48c2315ce9fb6,2025-05-28T17:08:54.983000 CVE-2025-4815,0,0,31cc1cd9ba179e2e20111ed224a5d1f55b5f28081bf7ef82d4c48c2315ce9fb6,2025-05-28T17:08:54.983000
CVE-2025-4816,0,0,1d7865e0cbbb0c318cb8ea40d3a767abd03ec76e1a6022bd94025fd37d41588b,2025-05-28T00:59:43.940000 CVE-2025-4816,0,0,1d7865e0cbbb0c318cb8ea40d3a767abd03ec76e1a6022bd94025fd37d41588b,2025-05-28T00:59:43.940000
CVE-2025-4817,0,0,f265475ef28de63b3868387a0ba8131291fd27201dee770829df62b575e6a51c,2025-05-28T00:59:22.280000 CVE-2025-4817,0,0,f265475ef28de63b3868387a0ba8131291fd27201dee770829df62b575e6a51c,2025-05-28T00:59:22.280000
CVE-2025-48172,1,1,7bc50b9f72948fc8edcf450c1cff239f4b362a5df806a1747f0d966fd88cd60a,2025-07-04T13:15:25.453000 CVE-2025-48172,0,0,7bc50b9f72948fc8edcf450c1cff239f4b362a5df806a1747f0d966fd88cd60a,2025-07-04T13:15:25.453000
CVE-2025-48174,0,0,c3e8083f71af16819d1dd271b42b6299c82ce55401fe37929ced2b9ea25ef1fa,2025-06-04T20:02:37.147000 CVE-2025-48174,0,0,c3e8083f71af16819d1dd271b42b6299c82ce55401fe37929ced2b9ea25ef1fa,2025-06-04T20:02:37.147000
CVE-2025-48175,0,0,c27d60fa36a5115b45f4438bfaf90b1bca9400541c8b0eefea9c65d281f833e1,2025-06-27T15:21:28.030000 CVE-2025-48175,0,0,c27d60fa36a5115b45f4438bfaf90b1bca9400541c8b0eefea9c65d281f833e1,2025-06-27T15:21:28.030000
CVE-2025-4818,0,0,46d731a7fb69ff2dcbbabe2b3a403a7f0fce04438dcb8f5cef1cb1fefa0dfdd7,2025-05-28T00:58:53.250000 CVE-2025-4818,0,0,46d731a7fb69ff2dcbbabe2b3a403a7f0fce04438dcb8f5cef1cb1fefa0dfdd7,2025-05-28T00:58:53.250000
@ -297673,7 +297731,7 @@ CVE-2025-48207,0,0,76c33189882fc278de738df7a6b1dc2c788c6db5fb8f29781ff8867125eb0
CVE-2025-4821,0,0,92d368bfa18cafd9d05ab7b7ed7a6b97809179bd232f0c3ad9a1c2953edd3a1d,2025-06-23T20:16:59.783000 CVE-2025-4821,0,0,92d368bfa18cafd9d05ab7b7ed7a6b97809179bd232f0c3ad9a1c2953edd3a1d,2025-06-23T20:16:59.783000
CVE-2025-48219,0,0,98450c06dbf29b24b552934a30418d25f24643ea5ccfd103ca30ed143612ddbc,2025-05-19T13:35:20.460000 CVE-2025-48219,0,0,98450c06dbf29b24b552934a30418d25f24643ea5ccfd103ca30ed143612ddbc,2025-05-19T13:35:20.460000
CVE-2025-4823,0,0,283f31f86f82bdb204520c6735b8d24ab48777f5f8963f659a2cf1ed36292c4c,2025-05-23T15:48:37.327000 CVE-2025-4823,0,0,283f31f86f82bdb204520c6735b8d24ab48777f5f8963f659a2cf1ed36292c4c,2025-05-23T15:48:37.327000
CVE-2025-48231,1,1,3243a1c08fbdb148b972cc684caa08dbcbdf7095ea97e5fc007d873d265138f7,2025-07-04T12:15:29.280000 CVE-2025-48231,0,0,3243a1c08fbdb148b972cc684caa08dbcbdf7095ea97e5fc007d873d265138f7,2025-07-04T12:15:29.280000
CVE-2025-48232,0,0,80ff2e8338291ebd304eb653c59213914ff7845248a459b3e90f05de1679bb9a,2025-05-21T20:25:33.823000 CVE-2025-48232,0,0,80ff2e8338291ebd304eb653c59213914ff7845248a459b3e90f05de1679bb9a,2025-05-21T20:25:33.823000
CVE-2025-48233,0,0,a70aa48121179191c73aeba86b3a3e5f6d9ae6b94ea09863a6836bdeb088521a,2025-05-21T20:25:33.823000 CVE-2025-48233,0,0,a70aa48121179191c73aeba86b3a3e5f6d9ae6b94ea09863a6836bdeb088521a,2025-05-21T20:25:33.823000
CVE-2025-48234,0,0,de1834686011353e4f79735587df8299d0afcaa9c087afc26be22ac4627cd62a,2025-05-21T20:25:33.823000 CVE-2025-48234,0,0,de1834686011353e4f79735587df8299d0afcaa9c087afc26be22ac4627cd62a,2025-05-21T20:25:33.823000
@ -298063,7 +298121,7 @@ CVE-2025-49067,0,0,691f1062539c729cb34ba7b80fbff1950eab310a0c7af6dba9c9e83b1bdcd
CVE-2025-49068,0,0,3797c73d2b9edaa67883a9553985689bdbba75f4cce7b860c4953ec6ac0de3ac,2025-06-06T14:06:58.193000 CVE-2025-49068,0,0,3797c73d2b9edaa67883a9553985689bdbba75f4cce7b860c4953ec6ac0de3ac,2025-06-06T14:06:58.193000
CVE-2025-49069,0,0,85c17ca27d4707197d4656ead7a2d4a3e357783b382cc504f2810ab6c0682e62,2025-06-04T14:54:33.783000 CVE-2025-49069,0,0,85c17ca27d4707197d4656ead7a2d4a3e357783b382cc504f2810ab6c0682e62,2025-06-04T14:54:33.783000
CVE-2025-4907,0,0,faa33c63c7cecd77dfa79228df8feba1d9b9297d2893ae52af491eb90f07f770,2025-05-21T17:33:11.603000 CVE-2025-4907,0,0,faa33c63c7cecd77dfa79228df8feba1d9b9297d2893ae52af491eb90f07f770,2025-05-21T17:33:11.603000
CVE-2025-49070,1,1,7ae7d50e458d36d3a7e6b09e87ecdde59e9658fdc5445d514d8d9a3f75528809,2025-07-04T12:15:29.460000 CVE-2025-49070,0,0,7ae7d50e458d36d3a7e6b09e87ecdde59e9658fdc5445d514d8d9a3f75528809,2025-07-04T12:15:29.460000
CVE-2025-49071,0,0,d7a0ea69c2b4bf7e36f0a3ae852834b6bd341eece32f276513a046bcc4ecf024,2025-06-17T20:50:23.507000 CVE-2025-49071,0,0,d7a0ea69c2b4bf7e36f0a3ae852834b6bd341eece32f276513a046bcc4ecf024,2025-06-17T20:50:23.507000
CVE-2025-49072,0,0,cc91acb325984d61f014d985d75bbf7e0e9082962c9e96f3405c74646c593528,2025-06-06T14:06:58.193000 CVE-2025-49072,0,0,cc91acb325984d61f014d985d75bbf7e0e9082962c9e96f3405c74646c593528,2025-06-06T14:06:58.193000
CVE-2025-49073,0,0,1520b38b23f181db334ec4a13a2dd7df7cacf51643f5e8d527931755cb4ee618,2025-06-06T14:06:58.193000 CVE-2025-49073,0,0,1520b38b23f181db334ec4a13a2dd7df7cacf51643f5e8d527931755cb4ee618,2025-06-06T14:06:58.193000
@ -298186,9 +298244,9 @@ CVE-2025-49241,0,0,2f8ca8f8925b1656c1a0c236c2adb9bdd822c30cbb9a4e4329769edc63780
CVE-2025-49242,0,0,bfc4a3cd1ebb15c16b40a39a81f90dfba810f74df400953fdc841286fa11ae74,2025-06-06T14:06:58.193000 CVE-2025-49242,0,0,bfc4a3cd1ebb15c16b40a39a81f90dfba810f74df400953fdc841286fa11ae74,2025-06-06T14:06:58.193000
CVE-2025-49243,0,0,be422389f0f23c085e3118430a7e87786f59ff770e2372311a2fd00743ac9058,2025-06-06T14:06:58.193000 CVE-2025-49243,0,0,be422389f0f23c085e3118430a7e87786f59ff770e2372311a2fd00743ac9058,2025-06-06T14:06:58.193000
CVE-2025-49244,0,0,9c68afdf7b0277569dede9f63158f2c34887b825bb13712e05b1b911771e3db4,2025-06-06T14:06:58.193000 CVE-2025-49244,0,0,9c68afdf7b0277569dede9f63158f2c34887b825bb13712e05b1b911771e3db4,2025-06-06T14:06:58.193000
CVE-2025-49245,1,1,e39137fcd71ab8c192d7933bfd51df0dc79cfaf8504f4fdfc77de39d5c489b0b,2025-07-04T12:15:29.677000 CVE-2025-49245,0,0,e39137fcd71ab8c192d7933bfd51df0dc79cfaf8504f4fdfc77de39d5c489b0b,2025-07-04T12:15:29.677000
CVE-2025-49246,0,0,c4f00883a12b7639ec4f097be449bb342bd0c987bc06f581d137de0d958bd000,2025-06-06T14:06:58.193000 CVE-2025-49246,0,0,c4f00883a12b7639ec4f097be449bb342bd0c987bc06f581d137de0d958bd000,2025-06-06T14:06:58.193000
CVE-2025-49247,1,1,b1bdd2f3c645ad431aff3fa0a24e20768434d57f6918defadb9b3cd77eeb0578,2025-07-04T12:15:29.970000 CVE-2025-49247,0,0,b1bdd2f3c645ad431aff3fa0a24e20768434d57f6918defadb9b3cd77eeb0578,2025-07-04T12:15:29.970000
CVE-2025-49248,0,0,db1641a9d43ab4f081dc759f5beaf5cd220fbde11ca36fb8965e1fb35e92f72f,2025-06-06T14:06:58.193000 CVE-2025-49248,0,0,db1641a9d43ab4f081dc759f5beaf5cd220fbde11ca36fb8965e1fb35e92f72f,2025-06-06T14:06:58.193000
CVE-2025-4925,0,0,c7c7b57edd485a39535f310e5e884e623df880c83d50cc9504511597c6a8f4a8,2025-05-21T12:58:28.507000 CVE-2025-4925,0,0,c7c7b57edd485a39535f310e5e884e623df880c83d50cc9504511597c6a8f4a8,2025-05-21T12:58:28.507000
CVE-2025-49250,0,0,427d3d2370ad4ed43da6ad5bd181602d6f79f8a5d6eb3d4e04409b35d996f102,2025-06-06T14:06:58.193000 CVE-2025-49250,0,0,427d3d2370ad4ed43da6ad5bd181602d6f79f8a5d6eb3d4e04409b35d996f102,2025-06-06T14:06:58.193000
@ -298214,7 +298272,7 @@ CVE-2025-4927,0,0,2750a792f3319584debfa65553b14ad85f4e2aa32076ab9798f492c480349e
CVE-2025-49270,0,0,e8f873097abcb2d7ec34af1f5af5f329365db5f98f8d71b00b026f39e6c86d90,2025-06-06T14:06:58.193000 CVE-2025-49270,0,0,e8f873097abcb2d7ec34af1f5af5f329365db5f98f8d71b00b026f39e6c86d90,2025-06-06T14:06:58.193000
CVE-2025-49272,0,0,0223ce7855dd053f73ca5207582b78d94265515445b553316bae9fb5bbe6c2c5,2025-06-06T14:06:58.193000 CVE-2025-49272,0,0,0223ce7855dd053f73ca5207582b78d94265515445b553316bae9fb5bbe6c2c5,2025-06-06T14:06:58.193000
CVE-2025-49273,0,0,453f97c5e2432cf4d96c04a3f9b9508448408e0f16b514e0f12be518fd3ced92,2025-06-06T14:06:58.193000 CVE-2025-49273,0,0,453f97c5e2432cf4d96c04a3f9b9508448408e0f16b514e0f12be518fd3ced92,2025-06-06T14:06:58.193000
CVE-2025-49274,1,1,c47e98615623d0b3436894750cda778b58b9503b58501b40792db0a27599711d,2025-07-04T12:15:30.150000 CVE-2025-49274,0,0,c47e98615623d0b3436894750cda778b58b9503b58501b40792db0a27599711d,2025-07-04T12:15:30.150000
CVE-2025-49275,0,0,dbab4602ee2f48cdaade21f33ea2a245a178ba294a7989698a181ee14d8135b3,2025-06-12T16:06:47.857000 CVE-2025-49275,0,0,dbab4602ee2f48cdaade21f33ea2a245a178ba294a7989698a181ee14d8135b3,2025-06-12T16:06:47.857000
CVE-2025-49276,0,0,ce1935cbdacf71ebc0f030671ca560d22889db5010511583b5cc0037d4678785,2025-06-12T16:06:47.857000 CVE-2025-49276,0,0,ce1935cbdacf71ebc0f030671ca560d22889db5010511583b5cc0037d4678785,2025-06-12T16:06:47.857000
CVE-2025-49277,0,0,f9f318632f85b97a9b391fd3b791134d0b2f9f4c1eb90fe4741410b755d21d1c,2025-06-12T16:06:47.857000 CVE-2025-49277,0,0,f9f318632f85b97a9b391fd3b791134d0b2f9f4c1eb90fe4741410b755d21d1c,2025-06-12T16:06:47.857000
@ -298244,8 +298302,8 @@ CVE-2025-49298,0,0,073584eaa855bb4ff156a1a6719d633957fe08f33dad454fd79ef7434ddc1
CVE-2025-49299,0,0,9b2bf1000ca705203f3e6ae9b05fdf6cc3eab72aeb70dc1a3fe97834f5f25dda,2025-06-06T14:06:58.193000 CVE-2025-49299,0,0,9b2bf1000ca705203f3e6ae9b05fdf6cc3eab72aeb70dc1a3fe97834f5f25dda,2025-06-06T14:06:58.193000
CVE-2025-4930,0,0,1d8aea9f3773d4505d618710791bd7bfa563ad02d1fc1ea6085e41b2b87bbf2c,2025-05-21T17:43:31.997000 CVE-2025-4930,0,0,1d8aea9f3773d4505d618710791bd7bfa563ad02d1fc1ea6085e41b2b87bbf2c,2025-05-21T17:43:31.997000
CVE-2025-49301,0,0,86cb4f8acdf19a6599b96dfb9cc403588373b414144be21a67c9f2d273770a3e,2025-06-06T14:06:58.193000 CVE-2025-49301,0,0,86cb4f8acdf19a6599b96dfb9cc403588373b414144be21a67c9f2d273770a3e,2025-06-06T14:06:58.193000
CVE-2025-49302,1,1,2f67239e8605e5ccc5ba142f478b1f40065b33de8990d6382abc6df657a0fb9d,2025-07-04T12:15:30.387000 CVE-2025-49302,0,0,2f67239e8605e5ccc5ba142f478b1f40065b33de8990d6382abc6df657a0fb9d,2025-07-04T12:15:30.387000
CVE-2025-49303,1,1,93007861c40bdf680e0dbf24c3725448af6a1ff061fbc7c0fed7029dd36064d6,2025-07-04T12:15:30.623000 CVE-2025-49303,0,0,93007861c40bdf680e0dbf24c3725448af6a1ff061fbc7c0fed7029dd36064d6,2025-07-04T12:15:30.623000
CVE-2025-49304,0,0,71574b6a3f2d73836fc1fa830da690db23390a1ed2f0b605e183be288fb555fe,2025-06-06T14:06:58.193000 CVE-2025-49304,0,0,71574b6a3f2d73836fc1fa830da690db23390a1ed2f0b605e183be288fb555fe,2025-06-06T14:06:58.193000
CVE-2025-49305,0,0,01c7b04cb3780a2d125e224028e4607a8e9e800f0ca0370b769c30081e8a05f4,2025-06-06T14:06:58.193000 CVE-2025-49305,0,0,01c7b04cb3780a2d125e224028e4607a8e9e800f0ca0370b769c30081e8a05f4,2025-06-06T14:06:58.193000
CVE-2025-49306,0,0,dad0197fc4ad72912c31a8ac6d742d8be718822a2959e5494bcbb0cd92699791,2025-06-06T14:06:58.193000 CVE-2025-49306,0,0,dad0197fc4ad72912c31a8ac6d742d8be718822a2959e5494bcbb0cd92699791,2025-06-06T14:06:58.193000
@ -298288,11 +298346,11 @@ CVE-2025-49385,0,0,08b6abe46012b430a7b2b7a4e0a93650ba4b318c27af93fa16b24ebb9ac04
CVE-2025-4939,0,0,5ec31620a920403386badd8ed8c9ad70156a6e4853cf1462dcd01754dc60b7d3,2025-05-28T01:32:20.263000 CVE-2025-4939,0,0,5ec31620a920403386badd8ed8c9ad70156a6e4853cf1462dcd01754dc60b7d3,2025-05-28T01:32:20.263000
CVE-2025-4940,0,0,260d8b62a32cfda7d1f9cdbe4bba3d30912c7644fed6c87e919fb1700ed93983,2025-06-12T16:24:13.067000 CVE-2025-4940,0,0,260d8b62a32cfda7d1f9cdbe4bba3d30912c7644fed6c87e919fb1700ed93983,2025-06-12T16:24:13.067000
CVE-2025-4941,0,0,7ee6643b2dca5855a4c8910cf9fb3433ecd0901f54d071fbb7ffd69250830b9c,2025-05-28T01:31:03.773000 CVE-2025-4941,0,0,7ee6643b2dca5855a4c8910cf9fb3433ecd0901f54d071fbb7ffd69250830b9c,2025-05-28T01:31:03.773000
CVE-2025-49414,1,1,60cdf774051915c43d1804468ca2c61ae601825c8fd0140045a8877ebe17331d,2025-07-04T12:15:30.817000 CVE-2025-49414,0,0,60cdf774051915c43d1804468ca2c61ae601825c8fd0140045a8877ebe17331d,2025-07-04T12:15:30.817000
CVE-2025-49415,0,0,68566d7977c1215376be0012202fa62cf118a6497fd62b530424bc30f9fa3712,2025-06-17T20:50:23.507000 CVE-2025-49415,0,0,68566d7977c1215376be0012202fa62cf118a6497fd62b530424bc30f9fa3712,2025-06-17T20:50:23.507000
CVE-2025-49416,0,0,1aaf23a00d8c1d182bdcea4548893a2f9639f93e1cd838fc6136c3fcfd778515,2025-06-30T18:38:48.477000 CVE-2025-49416,0,0,1aaf23a00d8c1d182bdcea4548893a2f9639f93e1cd838fc6136c3fcfd778515,2025-06-30T18:38:48.477000
CVE-2025-49417,1,1,786668c696a6bca05cacb4babee705d702e23efd7cb3aeedd544c421f5735f94,2025-07-04T12:15:31.003000 CVE-2025-49417,0,0,786668c696a6bca05cacb4babee705d702e23efd7cb3aeedd544c421f5735f94,2025-07-04T12:15:31.003000
CVE-2025-49418,1,1,2645c7c6dc863ee61bc37103a133e3dc2753df8ba7b7e230450a02147812232e,2025-07-04T12:15:31.247000 CVE-2025-49418,0,0,2645c7c6dc863ee61bc37103a133e3dc2753df8ba7b7e230450a02147812232e,2025-07-04T12:15:31.247000
CVE-2025-49419,0,0,85038d062ad76809afc89d292d3481b55710d3abc066574e74740256fb04fd24,2025-06-06T14:06:58.193000 CVE-2025-49419,0,0,85038d062ad76809afc89d292d3481b55710d3abc066574e74740256fb04fd24,2025-06-06T14:06:58.193000
CVE-2025-49421,0,0,44f56b132253671d91321e10d79bc87df372212fcb6d1bb27ad166d07a72fc32,2025-06-06T14:06:58.193000 CVE-2025-49421,0,0,44f56b132253671d91321e10d79bc87df372212fcb6d1bb27ad166d07a72fc32,2025-06-06T14:06:58.193000
CVE-2025-49423,0,0,ac6ee00f85c55473ab88bbe3e5c40945dd96a0fec218aa704824bc0b0ffc740b,2025-06-30T18:38:48.477000 CVE-2025-49423,0,0,ac6ee00f85c55473ab88bbe3e5c40945dd96a0fec218aa704824bc0b0ffc740b,2025-06-30T18:38:48.477000
@ -298300,7 +298358,7 @@ CVE-2025-49425,0,0,e1fe97c376de5a4e19ac419b1615599b7ee42807d954ef5670e99aa67f018
CVE-2025-49427,0,0,fc8aa2cea4178b9be9c92854da4245673ac0828517420b90ee0d5a6af5e8695b,2025-06-06T14:06:58.193000 CVE-2025-49427,0,0,fc8aa2cea4178b9be9c92854da4245673ac0828517420b90ee0d5a6af5e8695b,2025-06-06T14:06:58.193000
CVE-2025-49429,0,0,72e428471408646b43b87d752d84f4119c531c2054284b1fa2ca291913599aae,2025-06-06T14:06:58.193000 CVE-2025-49429,0,0,72e428471408646b43b87d752d84f4119c531c2054284b1fa2ca291913599aae,2025-06-06T14:06:58.193000
CVE-2025-4943,0,0,4340407097d641a732a3d64a65d30b42dd912a533e30289b536536d0a1b67ff5,2025-06-04T18:31:24.923000 CVE-2025-4943,0,0,4340407097d641a732a3d64a65d30b42dd912a533e30289b536536d0a1b67ff5,2025-06-04T18:31:24.923000
CVE-2025-49431,1,1,e253dbe816eeb412a544244e797f17b31f15a388687846ac846f9db942e5ad75,2025-07-04T12:15:31.537000 CVE-2025-49431,0,0,e253dbe816eeb412a544244e797f17b31f15a388687846ac846f9db942e5ad75,2025-07-04T12:15:31.537000
CVE-2025-49435,0,0,3d125ae356818fb0441581cec3fec2e504fbe1aa0a55596b773f33955c684bbc,2025-06-06T14:06:58.193000 CVE-2025-49435,0,0,3d125ae356818fb0441581cec3fec2e504fbe1aa0a55596b773f33955c684bbc,2025-06-06T14:06:58.193000
CVE-2025-49439,0,0,2ce45d011a214293b10c77cabcaa7af3e67891d083356380452c41e41d5e5922,2025-06-06T14:06:58.193000 CVE-2025-49439,0,0,2ce45d011a214293b10c77cabcaa7af3e67891d083356380452c41e41d5e5922,2025-06-06T14:06:58.193000
CVE-2025-4944,0,0,9a1f50eb597824061a4527d790f3f67b01a7246be2339b95cef835a527892fed,2025-05-30T16:31:03.107000 CVE-2025-4944,0,0,9a1f50eb597824061a4527d790f3f67b01a7246be2339b95cef835a527892fed,2025-05-30T16:31:03.107000
@ -298376,6 +298434,8 @@ CVE-2025-49596,0,0,914f35572c3497727ef5bfdff2cd9e17d27812703e06d7a6c3496156238c7
CVE-2025-49597,0,0,31430be1a672877ef5712ae64cc63468a339d903aeb2a4d86bb312578783d5a4,2025-06-16T12:32:18.840000 CVE-2025-49597,0,0,31430be1a672877ef5712ae64cc63468a339d903aeb2a4d86bb312578783d5a4,2025-06-16T12:32:18.840000
CVE-2025-49598,0,0,388fe7ea425620c97395f0a980692153036c5ee134fd73303c8f32af7dfdea32,2025-06-16T12:32:18.840000 CVE-2025-49598,0,0,388fe7ea425620c97395f0a980692153036c5ee134fd73303c8f32af7dfdea32,2025-06-16T12:32:18.840000
CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000 CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000
CVE-2025-49600,1,1,1d2f6d5e845401a19b933de9552b50e729ccc1b4f338fa02dea949d62b02295a,2025-07-04T15:15:22.277000
CVE-2025-49601,1,1,7e706c165d483c31879c70a25db3bbb19a8580c0e3a424c207a2c26dcaec975f,2025-07-04T15:15:22.467000
CVE-2025-49603,0,0,2c83b1b54b9e0ccac544fcbf8853e5ac6560c220daeb26018469e7c8d54de886,2025-06-26T21:15:28.150000 CVE-2025-49603,0,0,2c83b1b54b9e0ccac544fcbf8853e5ac6560c220daeb26018469e7c8d54de886,2025-06-26T21:15:28.150000
CVE-2025-49618,0,0,f1455d4ea650a1824a1f6e9148811ffca7d30862fe9903c99db1aade82405c9a,2025-07-03T15:13:53.147000 CVE-2025-49618,0,0,f1455d4ea650a1824a1f6e9148811ffca7d30862fe9903c99db1aade82405c9a,2025-07-03T15:13:53.147000
CVE-2025-49619,0,0,34a674efa79bca2e7a9fcbbfc8a71e4ddf39896b0ede59561baed790959985f3,2025-06-17T21:15:40.087000 CVE-2025-49619,0,0,34a674efa79bca2e7a9fcbbfc8a71e4ddf39896b0ede59561baed790959985f3,2025-06-17T21:15:40.087000
@ -298414,7 +298474,7 @@ CVE-2025-49795,0,0,4c770467268ebf148fa0f28383caf66af5bf08e634296e0cb4c455afa6e9b
CVE-2025-49796,0,0,c3ae5367828207e03498fac8ae67ddfb08b0af4ece3b2500316915ff59e84375,2025-06-17T20:50:23.507000 CVE-2025-49796,0,0,c3ae5367828207e03498fac8ae67ddfb08b0af4ece3b2500316915ff59e84375,2025-06-17T20:50:23.507000
CVE-2025-49797,0,0,13aa17d1b7e46eec0802f65578a147baeb08c4d0e59385ea616f044fa893e802,2025-06-26T18:57:43.670000 CVE-2025-49797,0,0,13aa17d1b7e46eec0802f65578a147baeb08c4d0e59385ea616f044fa893e802,2025-06-26T18:57:43.670000
CVE-2025-4980,0,0,b34e85986066032f97fe34d8a927fed77ce8edee3293780d83eab3188141a736,2025-06-12T16:21:08.950000 CVE-2025-4980,0,0,b34e85986066032f97fe34d8a927fed77ce8edee3293780d83eab3188141a736,2025-06-12T16:21:08.950000
CVE-2025-49809,1,1,05afb440f9c7e95a0582db292249f7fda06194ff2df4cf4832f725380720feff,2025-07-04T13:15:25.780000 CVE-2025-49809,0,0,05afb440f9c7e95a0582db292249f7fda06194ff2df4cf4832f725380720feff,2025-07-04T13:15:25.780000
CVE-2025-4981,0,0,f5c12859221db84c36da0cdc2f5b3b0d709a62c17786be42789bf52dcdf30cf8,2025-06-23T20:16:40.143000 CVE-2025-4981,0,0,f5c12859221db84c36da0cdc2f5b3b0d709a62c17786be42789bf52dcdf30cf8,2025-06-23T20:16:40.143000
CVE-2025-49814,0,0,cd4c594b4458e6b3d192baa2131b995abe59dca872f59a22339c83ab6246bc09,2025-06-12T03:15:25.863000 CVE-2025-49814,0,0,cd4c594b4458e6b3d192baa2131b995abe59dca872f59a22339c83ab6246bc09,2025-06-12T03:15:25.863000
CVE-2025-49815,0,0,ab5c799920620d5e4f9d9b43a2af946d17b69db748ce4d8b6a328cb8d7b9eff6,2025-06-12T03:15:25.930000 CVE-2025-49815,0,0,ab5c799920620d5e4f9d9b43a2af946d17b69db748ce4d8b6a328cb8d7b9eff6,2025-06-12T03:15:25.930000
@ -298455,11 +298515,11 @@ CVE-2025-49862,0,0,c57d66f3360ff94a32aaae18a3136ddf56ba33f516839a4fbea6b0b4838ae
CVE-2025-49863,0,0,33d363d611f4a23538284642c2f354c246bfbe9c2d607879460ff587d1582933,2025-06-17T20:50:23.507000 CVE-2025-49863,0,0,33d363d611f4a23538284642c2f354c246bfbe9c2d607879460ff587d1582933,2025-06-17T20:50:23.507000
CVE-2025-49864,0,0,f4d99355cbde1325d5c5300e8f3976185ab97a4efc2f71fc969c06fce2650686,2025-06-17T20:50:23.507000 CVE-2025-49864,0,0,f4d99355cbde1325d5c5300e8f3976185ab97a4efc2f71fc969c06fce2650686,2025-06-17T20:50:23.507000
CVE-2025-49865,0,0,fd43c315c334cbed70e22444f01a5755f065bda6205cd6f49d0a663c04f8ee07,2025-06-17T20:50:23.507000 CVE-2025-49865,0,0,fd43c315c334cbed70e22444f01a5755f065bda6205cd6f49d0a663c04f8ee07,2025-06-17T20:50:23.507000
CVE-2025-49866,1,1,b350816897525b3daf8b1f1673dd78348544d07013e8e08eda9af8473a7acdcc,2025-07-04T12:15:31.837000 CVE-2025-49866,0,0,b350816897525b3daf8b1f1673dd78348544d07013e8e08eda9af8473a7acdcc,2025-07-04T12:15:31.837000
CVE-2025-49867,1,1,ec3b7607695f8885600cdf84b37ac68402a02edd0126abde3b148f43f70a70f5,2025-07-04T12:15:32.123000 CVE-2025-49867,0,0,ec3b7607695f8885600cdf84b37ac68402a02edd0126abde3b148f43f70a70f5,2025-07-04T12:15:32.123000
CVE-2025-49868,0,0,1efdc8ec75b3e93c0086b5dec13caab2556f551947c6bb31bb9fd73281ac625e,2025-06-17T20:50:23.507000 CVE-2025-49868,0,0,1efdc8ec75b3e93c0086b5dec13caab2556f551947c6bb31bb9fd73281ac625e,2025-06-17T20:50:23.507000
CVE-2025-4987,0,0,c7c39e2e9c9954a29f9a19f48f2a034a7ab3e4a411a4b09beb0620c0b311c40d,2025-06-16T12:32:18.840000 CVE-2025-4987,0,0,c7c39e2e9c9954a29f9a19f48f2a034a7ab3e4a411a4b09beb0620c0b311c40d,2025-06-16T12:32:18.840000
CVE-2025-49870,1,1,d81b36f65b58f1c31d759bbd68f95a6eebf457a9f9031d33f968153b54761b87,2025-07-04T12:15:32.383000 CVE-2025-49870,0,0,d81b36f65b58f1c31d759bbd68f95a6eebf457a9f9031d33f968153b54761b87,2025-07-04T12:15:32.383000
CVE-2025-49871,0,0,b46953d51d788141ab3b29c3c372f0efdf374585e34a46f34bab62d6d8b0c39f,2025-06-17T20:50:23.507000 CVE-2025-49871,0,0,b46953d51d788141ab3b29c3c372f0efdf374585e34a46f34bab62d6d8b0c39f,2025-06-17T20:50:23.507000
CVE-2025-49872,0,0,3b72d42b2f95e19a70f5df8c35477b8cc592ccd1ae421a64f8ff4f702c32e028,2025-06-17T20:50:23.507000 CVE-2025-49872,0,0,3b72d42b2f95e19a70f5df8c35477b8cc592ccd1ae421a64f8ff4f702c32e028,2025-06-17T20:50:23.507000
CVE-2025-49873,0,0,ec0de8a610b7b1335f676701fcd5309b682b4282a02b7518b9d450a5cd7317bf,2025-06-23T20:16:40.143000 CVE-2025-49873,0,0,ec0de8a610b7b1335f676701fcd5309b682b4282a02b7518b9d450a5cd7317bf,2025-06-23T20:16:40.143000
@ -298541,14 +298601,14 @@ CVE-2025-50026,0,0,f144377a6f3d80f4679b8641c9c0cf5283150c7cdc5692c46bc7601017fea
CVE-2025-50027,0,0,6d7cc969637ed42e324eaa862533467ea52c1e0dcbe8b9f9f16b161f19fbe49f,2025-06-23T20:16:40.143000 CVE-2025-50027,0,0,6d7cc969637ed42e324eaa862533467ea52c1e0dcbe8b9f9f16b161f19fbe49f,2025-06-23T20:16:40.143000
CVE-2025-5003,0,0,8e5e1d9761ca938d3fd35aea708db39277e66b20b656a3195e150358582db8aa,2025-05-28T01:24:21.800000 CVE-2025-5003,0,0,8e5e1d9761ca938d3fd35aea708db39277e66b20b656a3195e150358582db8aa,2025-05-28T01:24:21.800000
CVE-2025-50030,0,0,89bfbe4c17c851c202dba786fd8437943f46e427786a04cec8555b668cc43104,2025-06-23T20:16:40.143000 CVE-2025-50030,0,0,89bfbe4c17c851c202dba786fd8437943f46e427786a04cec8555b668cc43104,2025-06-23T20:16:40.143000
CVE-2025-50032,1,1,f2b8ebd1853122087a4329fc29fa60de8945ec9e5c2b66574ef8258e10666cac,2025-07-04T12:15:32.817000 CVE-2025-50032,0,0,f2b8ebd1853122087a4329fc29fa60de8945ec9e5c2b66574ef8258e10666cac,2025-07-04T12:15:32.817000
CVE-2025-50033,0,0,2738b34f7e3c15101342ce0f4e2a966f0b068e0dd660f08772c609a1813c9d56,2025-06-23T20:16:40.143000 CVE-2025-50033,0,0,2738b34f7e3c15101342ce0f4e2a966f0b068e0dd660f08772c609a1813c9d56,2025-06-23T20:16:40.143000
CVE-2025-50034,0,0,addb1cfbd7b325cad895eda16871ef70e873e2a759ed635201cbacff36d11441,2025-06-23T20:16:40.143000 CVE-2025-50034,0,0,addb1cfbd7b325cad895eda16871ef70e873e2a759ed635201cbacff36d11441,2025-06-23T20:16:40.143000
CVE-2025-50035,0,0,259a0180bffb3f46d0c16152cae0b4746fb5fd8600268a21ccf1f39e35a84572,2025-06-23T20:16:40.143000 CVE-2025-50035,0,0,259a0180bffb3f46d0c16152cae0b4746fb5fd8600268a21ccf1f39e35a84572,2025-06-23T20:16:40.143000
CVE-2025-50036,0,0,6cdfbb31e33212ff818c6e01f46a41907a59eb679342cccab7098fc2c14bec41,2025-06-23T20:16:40.143000 CVE-2025-50036,0,0,6cdfbb31e33212ff818c6e01f46a41907a59eb679342cccab7098fc2c14bec41,2025-06-23T20:16:40.143000
CVE-2025-50037,0,0,89aa41c8daf5e7e3a3bb662a9aa347d31a83ddd9aca499e045972bb3f7e60819,2025-06-23T20:16:40.143000 CVE-2025-50037,0,0,89aa41c8daf5e7e3a3bb662a9aa347d31a83ddd9aca499e045972bb3f7e60819,2025-06-23T20:16:40.143000
CVE-2025-50038,0,0,dada3ffbdfd0a70280f428f92e0331fd06f7702c8363d1ad8ff6393fedeb24ea,2025-06-23T20:16:40.143000 CVE-2025-50038,0,0,dada3ffbdfd0a70280f428f92e0331fd06f7702c8363d1ad8ff6393fedeb24ea,2025-06-23T20:16:40.143000
CVE-2025-50039,1,1,627e4f971518e2a4a7e66b01b8d8f3e461856f53f2cdb9e26a54c64ed0afed9d,2025-07-04T12:15:33.017000 CVE-2025-50039,0,0,627e4f971518e2a4a7e66b01b8d8f3e461856f53f2cdb9e26a54c64ed0afed9d,2025-07-04T12:15:33.017000
CVE-2025-5004,0,0,d7fd9b6c8114c9ac860c14fa88897684c73b2b8251dca41c12cda3a8ce9d421c,2025-05-28T01:20:50.517000 CVE-2025-5004,0,0,d7fd9b6c8114c9ac860c14fa88897684c73b2b8251dca41c12cda3a8ce9d421c,2025-05-28T01:20:50.517000
CVE-2025-50041,0,0,75f6e6278f11856523198053842ec1e104e24492e82d9d573f3f8a4e0971895e,2025-06-23T20:16:40.143000 CVE-2025-50041,0,0,75f6e6278f11856523198053842ec1e104e24492e82d9d573f3f8a4e0971895e,2025-06-23T20:16:40.143000
CVE-2025-50042,0,0,6a00085703c918228f1e392cb0cedde720e1f4f0c99bb957112e06c0e32bb773,2025-06-23T20:16:40.143000 CVE-2025-50042,0,0,6a00085703c918228f1e392cb0cedde720e1f4f0c99bb957112e06c0e32bb773,2025-06-23T20:16:40.143000
@ -298824,6 +298884,8 @@ CVE-2025-52487,0,0,7cd2bd74a4137e25655cda69485a3b65bad2829b1fa25c7a60a65991a011a
CVE-2025-52488,0,0,ca6b051d0da46d813959bb70c94307ecd22ce69e425b14627b87b7e8b19e660f,2025-06-23T20:16:21.633000 CVE-2025-52488,0,0,ca6b051d0da46d813959bb70c94307ecd22ce69e425b14627b87b7e8b19e660f,2025-06-23T20:16:21.633000
CVE-2025-5249,0,0,ed726cc2a905d079d3cf80f621868a312481896aae378521d98a1a546311541b,2025-06-24T15:55:43.913000 CVE-2025-5249,0,0,ed726cc2a905d079d3cf80f621868a312481896aae378521d98a1a546311541b,2025-06-24T15:55:43.913000
CVE-2025-52491,0,0,99c966bc69ba38206055f8764fa30ca2e2a41c8a1159f64533a7a568f1fc2e2c,2025-07-03T15:14:12.767000 CVE-2025-52491,0,0,99c966bc69ba38206055f8764fa30ca2e2a41c8a1159f64533a7a568f1fc2e2c,2025-07-03T15:14:12.767000
CVE-2025-52496,1,1,4cee518fde3e25c80f1351a75e210d5d21e0998bdf7348eaa3f0e008bde2b841,2025-07-04T15:15:22.633000
CVE-2025-52497,1,1,d6f8f28097d84977174cc14a8c767c7f5e958c1efaad80a86bc0ff509071c220,2025-07-04T15:15:22.787000
CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000 CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000
CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000 CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000
CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000 CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000
@ -298871,7 +298933,7 @@ CVE-2025-52711,0,0,89905531ab9ffc8f95c007eebb988a86cafda84726fa0a1e8a67963e52646
CVE-2025-52713,0,0,dd903bf26897039ff2663d3fa53844a1463ba8229d49746f6dc30423c84667ea,2025-06-23T20:16:40.143000 CVE-2025-52713,0,0,dd903bf26897039ff2663d3fa53844a1463ba8229d49746f6dc30423c84667ea,2025-06-23T20:16:40.143000
CVE-2025-52715,0,0,a4815f001b2ab15993c3ab0dbb5671632e88731698b4eae1f2c32fc42830020f,2025-06-23T20:16:40.143000 CVE-2025-52715,0,0,a4815f001b2ab15993c3ab0dbb5671632e88731698b4eae1f2c32fc42830020f,2025-06-23T20:16:40.143000
CVE-2025-52717,0,0,08af7c95982a241bd309ceada869c66b69693c4ab91aa3522e39aca35fad1aa4,2025-06-30T18:38:48.477000 CVE-2025-52717,0,0,08af7c95982a241bd309ceada869c66b69693c4ab91aa3522e39aca35fad1aa4,2025-06-30T18:38:48.477000
CVE-2025-52718,1,1,a314fc7a063fdcd9a0ae380b3722118b5756e1a878728075980056b6b2244223,2025-07-04T12:15:33.197000 CVE-2025-52718,0,0,a314fc7a063fdcd9a0ae380b3722118b5756e1a878728075980056b6b2244223,2025-07-04T12:15:33.197000
CVE-2025-52719,0,0,5255f49aee70f7be6419c1cdeb90569664f1a4ea7bb1bbf43ecce1b8104ccab6,2025-06-23T20:16:40.143000 CVE-2025-52719,0,0,5255f49aee70f7be6419c1cdeb90569664f1a4ea7bb1bbf43ecce1b8104ccab6,2025-06-23T20:16:40.143000
CVE-2025-5272,0,0,b1d0c7e19ac36597fb989e72bcee09751441797b45636fb052ca12e726df56d9,2025-06-11T12:15:28.840000 CVE-2025-5272,0,0,b1d0c7e19ac36597fb989e72bcee09751441797b45636fb052ca12e726df56d9,2025-06-11T12:15:28.840000
CVE-2025-52722,0,0,67080dc3c7ae0b1e5a6c40b4728875a6c5c039edd8a9b90988e8ed70e1b52abb,2025-06-30T18:38:48.477000 CVE-2025-52722,0,0,67080dc3c7ae0b1e5a6c40b4728875a6c5c039edd8a9b90988e8ed70e1b52abb,2025-06-30T18:38:48.477000
@ -298888,7 +298950,7 @@ CVE-2025-5276,0,0,39d67915dab7ad2300f3ccd3a288fcee1075e32b914c45ad140eb6b7725be5
CVE-2025-5277,0,0,ba5aa3a145e9e2e34ac18c63e7fe60e94ac49ba4d7121cc0bc36eebe3309abbf,2025-05-28T15:01:30.720000 CVE-2025-5277,0,0,ba5aa3a145e9e2e34ac18c63e7fe60e94ac49ba4d7121cc0bc36eebe3309abbf,2025-05-28T15:01:30.720000
CVE-2025-52772,0,0,deb02b2d983c296f8b89a2559d4d4f189f1c6c676131c9feadcc246a08a5cc14,2025-06-23T20:16:40.143000 CVE-2025-52772,0,0,deb02b2d983c296f8b89a2559d4d4f189f1c6c676131c9feadcc246a08a5cc14,2025-06-23T20:16:40.143000
CVE-2025-52774,0,0,de771a5b10a99171a6970cc2eda061e856ddfde2b5144a0771c7c0ff4baad63d,2025-06-30T18:38:48.477000 CVE-2025-52774,0,0,de771a5b10a99171a6970cc2eda061e856ddfde2b5144a0771c7c0ff4baad63d,2025-06-30T18:38:48.477000
CVE-2025-52776,1,1,ccd61e3d4e9a841186d0d8174e5e05d107b436e4c2d43ad98da3139a85d68fa0,2025-07-04T12:15:33.370000 CVE-2025-52776,0,0,ccd61e3d4e9a841186d0d8174e5e05d107b436e4c2d43ad98da3139a85d68fa0,2025-07-04T12:15:33.370000
CVE-2025-52778,0,0,9edf1af608066a282b94a63bd066e5d09838f79b8a975aaf7daa048d884d03d6,2025-06-30T18:38:48.477000 CVE-2025-52778,0,0,9edf1af608066a282b94a63bd066e5d09838f79b8a975aaf7daa048d884d03d6,2025-06-30T18:38:48.477000
CVE-2025-5278,0,0,1a1d872b476a4e1ede71f599ba5ea7954cfb91958da7bd7ccf42fc9ce864efd1,2025-05-29T18:15:24.290000 CVE-2025-5278,0,0,1a1d872b476a4e1ede71f599ba5ea7954cfb91958da7bd7ccf42fc9ce864efd1,2025-05-29T18:15:24.290000
CVE-2025-52780,0,0,beda9d0e83d0e69352f6224f37e355d5bbb032dccdf392d8666399c5db09bf24,2025-06-23T20:16:40.143000 CVE-2025-52780,0,0,beda9d0e83d0e69352f6224f37e355d5bbb032dccdf392d8666399c5db09bf24,2025-06-23T20:16:40.143000
@ -298904,20 +298966,20 @@ CVE-2025-52792,0,0,54a43e5c19c532f6b49f3b5ecdc987ba818c53d017f06190cee2cbed041fe
CVE-2025-52793,0,0,1cecd933b153bc60d3b7b2eddac537905bfaa72ae4b2b195599beb64ec31374e,2025-06-23T20:16:40.143000 CVE-2025-52793,0,0,1cecd933b153bc60d3b7b2eddac537905bfaa72ae4b2b195599beb64ec31374e,2025-06-23T20:16:40.143000
CVE-2025-52794,0,0,502cc6110b8b76b562cb28e051a1f9b818d5407c3da5396bd730f9e6d63ac1d5,2025-06-23T20:16:40.143000 CVE-2025-52794,0,0,502cc6110b8b76b562cb28e051a1f9b818d5407c3da5396bd730f9e6d63ac1d5,2025-06-23T20:16:40.143000
CVE-2025-52795,0,0,11006411d1510cee1a98b263384d48fe90a25a6ec4d2d4cab3514b4f857e57ac,2025-06-23T20:16:40.143000 CVE-2025-52795,0,0,11006411d1510cee1a98b263384d48fe90a25a6ec4d2d4cab3514b4f857e57ac,2025-06-23T20:16:40.143000
CVE-2025-52796,1,1,25fc1e9c6e634083b1eb608c31100e28f7e72daff78c1a732e91959ec628e270,2025-07-04T12:15:33.553000 CVE-2025-52796,0,0,25fc1e9c6e634083b1eb608c31100e28f7e72daff78c1a732e91959ec628e270,2025-07-04T12:15:33.553000
CVE-2025-52798,1,1,643140ecbd7cd15d9b588c9498359b9a77446ce57111dba13602912a7e3d5b95,2025-07-04T12:15:33.737000 CVE-2025-52798,0,0,643140ecbd7cd15d9b588c9498359b9a77446ce57111dba13602912a7e3d5b95,2025-07-04T12:15:33.737000
CVE-2025-52799,0,0,f5028a24c09763007e3eed281487ce93df81ad20935db161b5fa934774a40839,2025-06-30T18:38:48.477000 CVE-2025-52799,0,0,f5028a24c09763007e3eed281487ce93df81ad20935db161b5fa934774a40839,2025-06-30T18:38:48.477000
CVE-2025-5280,0,0,3c6af0d30a51ecb706066ad212af1114fdaaf7f2415af1fe946985167145905d,2025-05-29T15:50:31.610000 CVE-2025-5280,0,0,3c6af0d30a51ecb706066ad212af1114fdaaf7f2415af1fe946985167145905d,2025-05-29T15:50:31.610000
CVE-2025-52802,0,0,3bbd213c305ded541c93d6153b658373bf8ce9d75ca7fde959b797d174cbb307,2025-06-23T20:16:40.143000 CVE-2025-52802,0,0,3bbd213c305ded541c93d6153b658373bf8ce9d75ca7fde959b797d174cbb307,2025-06-23T20:16:40.143000
CVE-2025-52805,1,1,63f698b157cadb312d9d1075d582f16ef63c04bbe38b6939a0eec708774f9365,2025-07-04T12:15:33.927000 CVE-2025-52805,0,0,63f698b157cadb312d9d1075d582f16ef63c04bbe38b6939a0eec708774f9365,2025-07-04T12:15:33.927000
CVE-2025-52807,1,1,059cd16f2ea6a9d24d0fe162b829d3eebf3af0ca661385dbe5201903bd168cff,2025-07-04T12:15:34.107000 CVE-2025-52807,0,0,059cd16f2ea6a9d24d0fe162b829d3eebf3af0ca661385dbe5201903bd168cff,2025-07-04T12:15:34.107000
CVE-2025-52808,0,0,264722595e6ba27b9065f53ef1252aed986d07a4d8107331608224f4bdea61d1,2025-06-30T18:38:48.477000 CVE-2025-52808,0,0,264722595e6ba27b9065f53ef1252aed986d07a4d8107331608224f4bdea61d1,2025-06-30T18:38:48.477000
CVE-2025-52809,0,0,e0db976f97863e8b90579de6742f8b0830cbc45669f6a22ccaa6edaf8948051e,2025-06-30T18:38:48.477000 CVE-2025-52809,0,0,e0db976f97863e8b90579de6742f8b0830cbc45669f6a22ccaa6edaf8948051e,2025-06-30T18:38:48.477000
CVE-2025-5281,0,0,4065baa6ec2536bda486e7298d71ac521380ba5a3be043da1b14156c61e3ebd6,2025-05-29T15:50:25.993000 CVE-2025-5281,0,0,4065baa6ec2536bda486e7298d71ac521380ba5a3be043da1b14156c61e3ebd6,2025-05-29T15:50:25.993000
CVE-2025-52810,0,0,3ef536ab5644db36bed36f9f57e290b83410a91ac339a870d244108bfe704521,2025-06-30T18:38:48.477000 CVE-2025-52810,0,0,3ef536ab5644db36bed36f9f57e290b83410a91ac339a870d244108bfe704521,2025-06-30T18:38:48.477000
CVE-2025-52811,0,0,88916380a5b0bf5d3138e345d9114c8701bf92cb923bb701ee3b1bf810fcd1e0,2025-06-30T18:38:48.477000 CVE-2025-52811,0,0,88916380a5b0bf5d3138e345d9114c8701bf92cb923bb701ee3b1bf810fcd1e0,2025-06-30T18:38:48.477000
CVE-2025-52812,0,0,274d283096e469aed47f3651aad592ca1448ad0aa62da5d9be96fd2940c87f44,2025-06-30T18:38:48.477000 CVE-2025-52812,0,0,274d283096e469aed47f3651aad592ca1448ad0aa62da5d9be96fd2940c87f44,2025-06-30T18:38:48.477000
CVE-2025-52813,1,1,dde41392f77fce1e2a3ba3c76acc57662ba5d3c903ec3cddcbec6948c8ae5391,2025-07-04T12:15:34.273000 CVE-2025-52813,0,0,dde41392f77fce1e2a3ba3c76acc57662ba5d3c903ec3cddcbec6948c8ae5391,2025-07-04T12:15:34.273000
CVE-2025-52814,0,0,0a76fdcb4f9e75be4fd6067991977c8b2d3f3bdbefb4834fd89147a28bc228a9,2025-06-30T18:38:48.477000 CVE-2025-52814,0,0,0a76fdcb4f9e75be4fd6067991977c8b2d3f3bdbefb4834fd89147a28bc228a9,2025-06-30T18:38:48.477000
CVE-2025-52815,0,0,bc3563b624fe1c8b3289253b3da2640993d4da80643a79037cfd83540c6801f7,2025-06-30T18:38:48.477000 CVE-2025-52815,0,0,bc3563b624fe1c8b3289253b3da2640993d4da80643a79037cfd83540c6801f7,2025-06-30T18:38:48.477000
CVE-2025-52816,0,0,1ab5f421dd6d696ffb70bb9546b130cafcd20ab37ee5b0a097c172047fbf32f4,2025-06-30T18:38:48.477000 CVE-2025-52816,0,0,1ab5f421dd6d696ffb70bb9546b130cafcd20ab37ee5b0a097c172047fbf32f4,2025-06-30T18:38:48.477000
@ -298930,13 +298992,13 @@ CVE-2025-52824,0,0,351dd92df1183307d0df204ba321726dfa0b44797469f8905fc2dab11c0d1
CVE-2025-52825,0,0,bfd2129b50cd02ba73ac261df6839665ee9fca96e334d577f196302dba30baad,2025-06-23T20:16:40.143000 CVE-2025-52825,0,0,bfd2129b50cd02ba73ac261df6839665ee9fca96e334d577f196302dba30baad,2025-06-23T20:16:40.143000
CVE-2025-52826,0,0,72a9fee291a4fc6694768e97deb03a4bc851d55f8966b2a155247b9d28a512d1,2025-06-30T18:38:48.477000 CVE-2025-52826,0,0,72a9fee291a4fc6694768e97deb03a4bc851d55f8966b2a155247b9d28a512d1,2025-06-30T18:38:48.477000
CVE-2025-52827,0,0,04da4f456c5a4f30ec7c35209b7acc7cd69257169d05a3aac291d93074f0d62b,2025-06-30T18:38:48.477000 CVE-2025-52827,0,0,04da4f456c5a4f30ec7c35209b7acc7cd69257169d05a3aac291d93074f0d62b,2025-06-30T18:38:48.477000
CVE-2025-52828,1,1,15706c71903314a3f5444d7d5d6f747d3b6ec006ac04112a3766969957a1f2a5,2025-07-04T12:15:34.453000 CVE-2025-52828,0,0,15706c71903314a3f5444d7d5d6f747d3b6ec006ac04112a3766969957a1f2a5,2025-07-04T12:15:34.453000
CVE-2025-52829,0,0,eb4d964acfddba9bd78da4c0fddfa106090ce982a7436b16afafa186380d210d,2025-06-30T18:38:48.477000 CVE-2025-52829,0,0,eb4d964acfddba9bd78da4c0fddfa106090ce982a7436b16afafa186380d210d,2025-06-30T18:38:48.477000
CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3ab,2025-05-31T23:15:20.553000 CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3ab,2025-05-31T23:15:20.553000
CVE-2025-52830,1,1,0f46ab6c79c04268e6ea0632491c2f4811315223593905ab872a3e3ccc0e233f,2025-07-04T12:15:34.633000 CVE-2025-52830,0,0,0f46ab6c79c04268e6ea0632491c2f4811315223593905ab872a3e3ccc0e233f,2025-07-04T12:15:34.633000
CVE-2025-52831,1,1,e323e4cc0d3ea824c55871b7d92c864a965f5fc4fd4721407406e6428446513a,2025-07-04T12:15:34.820000 CVE-2025-52831,0,0,e323e4cc0d3ea824c55871b7d92c864a965f5fc4fd4721407406e6428446513a,2025-07-04T12:15:34.820000
CVE-2025-52832,1,1,d1461caf95abbb2c3e733fba4a31e8a760fc76390759324484316ec2489eb855,2025-07-04T12:15:35.020000 CVE-2025-52832,0,0,d1461caf95abbb2c3e733fba4a31e8a760fc76390759324484316ec2489eb855,2025-07-04T12:15:35.020000
CVE-2025-52833,1,1,2efb7206948dae64151d221b1fd24685f064032677da9adb3cd09bb99d379cb2,2025-07-04T12:15:35.217000 CVE-2025-52833,0,0,2efb7206948dae64151d221b1fd24685f064032677da9adb3cd09bb99d379cb2,2025-07-04T12:15:35.217000
CVE-2025-52834,0,0,4ca40346c1caeb484e6b4cab253e3c17da1f917f108bf85aa6fe3c08b7cc103c,2025-06-30T18:38:48.477000 CVE-2025-52834,0,0,4ca40346c1caeb484e6b4cab253e3c17da1f917f108bf85aa6fe3c08b7cc103c,2025-06-30T18:38:48.477000
CVE-2025-52841,0,0,f8e068a9006278a5834628f113e54a0f795a1f7457963e2ccbe9ba5790bb87d4,2025-07-03T15:13:53.147000 CVE-2025-52841,0,0,f8e068a9006278a5834628f113e54a0f795a1f7457963e2ccbe9ba5790bb87d4,2025-07-03T15:13:53.147000
CVE-2025-52842,0,0,9056d2ba3d41df43ac19f2a8f2245769713a77a20a1ae420dd61d6d62d2c7561,2025-07-03T15:13:53.147000 CVE-2025-52842,0,0,9056d2ba3d41df43ac19f2a8f2245769713a77a20a1ae420dd61d6d62d2c7561,2025-07-03T15:13:53.147000
@ -299742,7 +299804,7 @@ CVE-2025-6041,0,0,f1590bc7f430e44e26265ed5472774b979ce04156432a94e9a184078db1536
CVE-2025-6050,0,0,67e03dde344620698f5a7773057ca524136abcdd721ce9bc82366b3da1039da8,2025-06-17T20:50:23.507000 CVE-2025-6050,0,0,67e03dde344620698f5a7773057ca524136abcdd721ce9bc82366b3da1039da8,2025-06-17T20:50:23.507000
CVE-2025-6052,0,0,f7b8f6bed96346c732cfe3c58915aaa99b04704580ca581c3769d9ac03c1036c,2025-06-16T12:32:18.840000 CVE-2025-6052,0,0,f7b8f6bed96346c732cfe3c58915aaa99b04704580ca581c3769d9ac03c1036c,2025-06-16T12:32:18.840000
CVE-2025-6055,0,0,a1414c05d6a8565eece9cbd85c74aae5128e8846318652e194e65bb36ec8b3a2,2025-06-16T12:32:18.840000 CVE-2025-6055,0,0,a1414c05d6a8565eece9cbd85c74aae5128e8846318652e194e65bb36ec8b3a2,2025-06-16T12:32:18.840000
CVE-2025-6056,1,1,6e2b54c90bf9a14e675e0a469c1983bded7ab2e36e44712169fd3edcc9d2ea8d,2025-07-04T12:15:35.407000 CVE-2025-6056,0,0,6e2b54c90bf9a14e675e0a469c1983bded7ab2e36e44712169fd3edcc9d2ea8d,2025-07-04T12:15:35.407000
CVE-2025-6059,0,0,84d0ce35ead1515ece8397572c27c6a293b39d090719f8fde70ea6fa5e96acd4,2025-06-16T12:32:18.840000 CVE-2025-6059,0,0,84d0ce35ead1515ece8397572c27c6a293b39d090719f8fde70ea6fa5e96acd4,2025-06-16T12:32:18.840000
CVE-2025-6061,0,0,1e4ad2c51e11b85a0411cc0ba0a247fef015fe294ab3ff30c502f60f1836c736,2025-06-16T12:32:18.840000 CVE-2025-6061,0,0,1e4ad2c51e11b85a0411cc0ba0a247fef015fe294ab3ff30c502f60f1836c736,2025-06-16T12:32:18.840000
CVE-2025-6062,0,0,5bf9e4ece70cbb53a8f33b39f23213ffcbb9e338a70925ebae7177b4c0441131,2025-06-16T12:32:18.840000 CVE-2025-6062,0,0,5bf9e4ece70cbb53a8f33b39f23213ffcbb9e338a70925ebae7177b4c0441131,2025-06-16T12:32:18.840000
@ -300206,7 +300268,7 @@ CVE-2025-6735,0,0,8734d70a00401da0ff9abed01b375db63bfe1b857ecd09eeb97e4130c9f85b
CVE-2025-6736,0,0,25903f9d1406c60f622962611fc5443a5d32d3cdb912833a9ad0899ef2f7c32d,2025-06-30T18:38:48.477000 CVE-2025-6736,0,0,25903f9d1406c60f622962611fc5443a5d32d3cdb912833a9ad0899ef2f7c32d,2025-06-30T18:38:48.477000
CVE-2025-6738,0,0,3259930ec98b59546eeaeace9fb84641bae60a8fe1ea462b5fb5b4147d4fd671,2025-06-30T18:38:48.477000 CVE-2025-6738,0,0,3259930ec98b59546eeaeace9fb84641bae60a8fe1ea462b5fb5b4147d4fd671,2025-06-30T18:38:48.477000
CVE-2025-6739,0,0,42e8587a0ef9a977f682fe5bf2e7b84bea08b757c7154d8e297f8504442d9547,2025-07-04T03:15:22.740000 CVE-2025-6739,0,0,42e8587a0ef9a977f682fe5bf2e7b84bea08b757c7154d8e297f8504442d9547,2025-07-04T03:15:22.740000
CVE-2025-6740,1,1,4df025ce77d1adfe2573d12dc431280049a6a66b06d7c4a694ba8dc72df73175,2025-07-04T12:15:35.570000 CVE-2025-6740,0,0,4df025ce77d1adfe2573d12dc431280049a6a66b06d7c4a694ba8dc72df73175,2025-07-04T12:15:35.570000
CVE-2025-6748,0,0,7f8f18ce472108822cda61d00f4ec9b1169d30c9d958ea970ce7bf174900b6ff,2025-06-30T18:38:48.477000 CVE-2025-6748,0,0,7f8f18ce472108822cda61d00f4ec9b1169d30c9d958ea970ce7bf174900b6ff,2025-06-30T18:38:48.477000
CVE-2025-6749,0,0,d1c491f56475f9982f91a0af7dbfe7ca7d1db32da1110cdac506d65ba7fc1676,2025-06-30T18:38:48.477000 CVE-2025-6749,0,0,d1c491f56475f9982f91a0af7dbfe7ca7d1db32da1110cdac506d65ba7fc1676,2025-06-30T18:38:48.477000
CVE-2025-6750,0,0,f1b454f50a80614e8eea516f2449d507837abfd24769c351c9d643bb9f9983b5,2025-07-01T17:44:05.567000 CVE-2025-6750,0,0,f1b454f50a80614e8eea516f2449d507837abfd24769c351c9d643bb9f9983b5,2025-07-01T17:44:05.567000
@ -300358,5 +300420,5 @@ CVE-2025-6963,0,0,1850847a61a91cf087d068ba6686d6003da6219f5068f201b00a459270304a
CVE-2025-7046,0,0,bfc3f75a19ddf4c011fa35d5d7e3dba1ee0500cd88145609200c5475efeafb9e,2025-07-04T03:15:23.743000 CVE-2025-7046,0,0,bfc3f75a19ddf4c011fa35d5d7e3dba1ee0500cd88145609200c5475efeafb9e,2025-07-04T03:15:23.743000
CVE-2025-7053,0,0,7c553631a1754842980c905e7a5036f2578e53e5fdd6a16c5f10c740b90f1d52,2025-07-04T03:15:23.917000 CVE-2025-7053,0,0,7c553631a1754842980c905e7a5036f2578e53e5fdd6a16c5f10c740b90f1d52,2025-07-04T03:15:23.917000
CVE-2025-7060,0,0,91da01898395bdf026b99c0a46900d94a8a4f57665e6550c84b17fbf8659b9cf,2025-07-04T11:15:51.683000 CVE-2025-7060,0,0,91da01898395bdf026b99c0a46900d94a8a4f57665e6550c84b17fbf8659b9cf,2025-07-04T11:15:51.683000
CVE-2025-7061,1,1,15674a6a6cc800d5a0b5940feb3e192f9e740b04c9aff814dfdb24e1d8ce91ae,2025-07-04T13:15:25.987000 CVE-2025-7061,0,0,15674a6a6cc800d5a0b5940feb3e192f9e740b04c9aff814dfdb24e1d8ce91ae,2025-07-04T13:15:25.987000
CVE-2025-7066,1,1,998f6b55a42342a8b0f4fda5076c6090356f0a52d1edd36c9bb39b315048f315,2025-07-04T12:15:35.740000 CVE-2025-7066,0,0,998f6b55a42342a8b0f4fda5076c6090356f0a52d1edd36c9bb39b315048f315,2025-07-04T12:15:35.740000

Can't render this file because it is too large.