WID-SEC-W-2025-2392

Vulnerability from csaf_certbund - Published: 2025-10-22 22:00 - Updated: 2026-01-21 23:00
Summary
Internet Systems Consortium BIND: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: BIND (Berkeley Internet Name Domain) ist ein Open-Source-Softwarepaket, das einen Domain-Name-System-Server implementiert.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Internet Systems Consortium BIND ausnutzen, um Dateien zu manipulieren und um einen Denial-of-Service-Zustand zu verursachen.
Betroffene Betriebssysteme: - Sonstiges - UNIX - Windows
References
https://wid.cert-bund.de/.well-known/csaf/white/2… self
https://wid.cert-bund.de/portal/wid/securityadvis… self
https://seclists.org/oss-sec/2025/q4/68 external
https://kb.isc.org/docs/cve-2025-40778 external
https://kb.isc.org/docs/cve-2025-40780 external
https://kb.isc.org/docs/cve-2025-8677 external
https://lists.debian.org/debian-security-announce… external
https://gist.github.com/N3mes1s/f76b4a606308937b0… external
https://lists.opensuse.org/archives/list/security… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://lists.debian.org/debian-lts-announce/2025… external
https://access.redhat.com/errata/RHSA-2025:19793 external
https://access.redhat.com/errata/RHSA-2025:19835 external
https://alas.aws.amazon.com/AL2/ALAS2-2025-3054.html external
https://errata.build.resf.org/RLSA-2025:19793 external
https://linux.oracle.com/errata/ELSA-2025-19835.html external
https://linux.oracle.com/errata/ELSA-2025-19793.html external
https://lists.suse.com/pipermail/sle-security-upd… external
https://access.redhat.com/errata/RHSA-2025:19912 external
https://linux.oracle.com/errata/ELSA-2025-19912.html external
https://errata.build.resf.org/RLSA-2025:19835 external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://linux.oracle.com/errata/ELSA-2025-19950.html external
https://linux.oracle.com/errata/ELSA-2025-19951.html external
https://access.redhat.com/errata/RHSA-2025:21034 external
https://ubuntu.com/security/notices/USN-7836-2 external
https://access.redhat.com/errata/RHSA-2025:21111 external
https://access.redhat.com/errata/RHSA-2025:21110 external
https://lists.suse.com/pipermail/sle-security-upd… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://access.redhat.com/errata/RHSA-2025:21736 external
https://access.redhat.com/errata/RHSA-2025:21735 external
https://access.redhat.com/errata/RHSA-2025:21741 external
https://access.redhat.com/errata/RHSA-2025:21740 external
https://access.redhat.com/errata/RHSA-2025:21817 external
https://access.redhat.com/errata/RHSA-2025:21889 external
https://access.redhat.com/errata/RHSA-2025:21887 external
https://errata.build.resf.org/RLSA-2025:21034 external
https://errata.build.resf.org/RLSA-2025:21110 external
https://access.redhat.com/errata/RHSA-2025:21994 external
https://my.f5.com/manage/s/article/K000157948 external
https://access.redhat.com/errata/RHSA-2025:21939 external
https://lists.suse.com/pipermail/sle-security-upd… external
https://linux.oracle.com/errata/ELSA-2025-21110.html external
https://access.redhat.com/errata/RHSA-2025:22168 external
https://access.redhat.com/errata/RHSA-2025:22205 external
https://linux.oracle.com/errata/ELSA-2025-21111.html external
https://linux.oracle.com/errata/ELSA-2025-21034.html external
https://www.ibm.com/support/pages/node/7253912 external
https://alas.aws.amazon.com/AL2/ALAS2-2025-3093.html external
https://access.redhat.com/errata/RHSA-2025:23414 external
https://linux.oracle.com/errata/ELSA-2025-22205.html external
https://access.redhat.com/errata/RHSA-2026:0316 external
https://access.redhat.com/errata/RHSA-2026:0420 external
https://access.redhat.com/errata/RHSA-2026:0332 external
https://access.redhat.com/errata/RHSA-2026:0326 external
https://lists.opensuse.org/archives/list/security… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://access.redhat.com/errata/RHSA-2026:0934 external
https://access.redhat.com/errata/RHSA-2026:0950 external

{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "BIND (Berkeley Internet Name Domain) ist ein Open-Source-Softwarepaket, das einen Domain-Name-System-Server implementiert.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Internet Systems Consortium BIND ausnutzen, um Dateien zu manipulieren und um einen Denial-of-Service-Zustand zu verursachen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2025-2392 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2392.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2025-2392 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2392"
      },
      {
        "category": "external",
        "summary": "OSS Security Mailing List vom 2025-10-22",
        "url": "https://seclists.org/oss-sec/2025/q4/68"
      },
      {
        "category": "external",
        "summary": "BIND Security Advisory vom 2025-10-22",
        "url": "https://kb.isc.org/docs/cve-2025-40778"
      },
      {
        "category": "external",
        "summary": "BIND Security Advisory vom 2025-10-22",
        "url": "https://kb.isc.org/docs/cve-2025-40780"
      },
      {
        "category": "external",
        "summary": "BIND Security Advisory vom 2025-10-22",
        "url": "https://kb.isc.org/docs/cve-2025-8677"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-6033 vom 2025-10-23",
        "url": "https://lists.debian.org/debian-security-announce/2025/msg00199.html"
      },
      {
        "category": "external",
        "summary": "PoC auf GitHub vom 2025-10-26",
        "url": "https://gist.github.com/N3mes1s/f76b4a606308937b0806a5256bc1f918"
      },
      {
        "category": "external",
        "summary": "openSUSE Security Update OPENSUSE-SU-2025:15659-1 vom 2025-10-24",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVMJ3GPYMYQXXIAR22WNZEH5GSYVP7NB/"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2025-10C407DA27 vom 2025-10-24",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-10c407da27"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2025-5A73E9E251 vom 2025-10-24",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-5a73e9e251"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2025-66FB3FA6B0 vom 2025-10-24",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-66fb3fa6b0"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2025-92566203FD vom 2025-10-24",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-92566203fd"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:3903-1 vom 2025-10-31",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023133.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-4364 vom 2025-11-04",
        "url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00007.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19793 vom 2025-11-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:19793"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19835 vom 2025-11-06",
        "url": "https://access.redhat.com/errata/RHSA-2025:19835"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2025-3054 vom 2025-11-05",
        "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3054.html"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:19793 vom 2025-11-06",
        "url": "https://errata.build.resf.org/RLSA-2025:19793"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-19835 vom 2025-11-06",
        "url": "https://linux.oracle.com/errata/ELSA-2025-19835.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-19793 vom 2025-11-06",
        "url": "https://linux.oracle.com/errata/ELSA-2025-19793.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:3976-1 vom 2025-11-06",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023172.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:19912 vom 2025-11-07",
        "url": "https://access.redhat.com/errata/RHSA-2025:19912"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-19912 vom 2025-11-07",
        "url": "https://linux.oracle.com/errata/ELSA-2025-19912.html"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:19835 vom 2025-11-07",
        "url": "https://errata.build.resf.org/RLSA-2025:19835"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2025-B68F7F541D vom 2025-11-07",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-b68f7f541d"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2025-D9F9394ECD vom 2025-11-07",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-d9f9394ecd"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-19950 vom 2025-11-10",
        "url": "https://linux.oracle.com/errata/ELSA-2025-19950.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-19951 vom 2025-11-10",
        "url": "https://linux.oracle.com/errata/ELSA-2025-19951.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21034 vom 2025-11-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:21034"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7836-2 vom 2025-11-12",
        "url": "https://ubuntu.com/security/notices/USN-7836-2"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21111 vom 2025-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2025:21111"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21110 vom 2025-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2025:21110"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:4107-1 vom 2025-11-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023290.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:4110-1 vom 2025-11-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023287.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:4108-1 vom 2025-11-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023289.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:4109-1 vom 2025-11-14",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023288.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21736 vom 2025-11-19",
        "url": "https://access.redhat.com/errata/RHSA-2025:21736"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21735 vom 2025-11-19",
        "url": "https://access.redhat.com/errata/RHSA-2025:21735"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21741 vom 2025-11-19",
        "url": "https://access.redhat.com/errata/RHSA-2025:21741"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21740 vom 2025-11-19",
        "url": "https://access.redhat.com/errata/RHSA-2025:21740"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21817 vom 2025-11-20",
        "url": "https://access.redhat.com/errata/RHSA-2025:21817"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21889 vom 2025-11-20",
        "url": "https://access.redhat.com/errata/RHSA-2025:21889"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21887 vom 2025-11-20",
        "url": "https://access.redhat.com/errata/RHSA-2025:21887"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:21034 vom 2025-11-21",
        "url": "https://errata.build.resf.org/RLSA-2025:21034"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:21110 vom 2025-11-21",
        "url": "https://errata.build.resf.org/RLSA-2025:21110"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21994 vom 2025-11-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:21994"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K000157948 vom 2025-11-24",
        "url": "https://my.f5.com/manage/s/article/K000157948"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:21939 vom 2025-11-24",
        "url": "https://access.redhat.com/errata/RHSA-2025:21939"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:4222-1 vom 2025-11-25",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023353.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-21110 vom 2025-11-26",
        "url": "https://linux.oracle.com/errata/ELSA-2025-21110.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:22168 vom 2025-11-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:22168"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:22205 vom 2025-11-26",
        "url": "https://access.redhat.com/errata/RHSA-2025:22205"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-21111 vom 2025-11-27",
        "url": "https://linux.oracle.com/errata/ELSA-2025-21111.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-21034 vom 2025-12-03",
        "url": "https://linux.oracle.com/errata/ELSA-2025-21034.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7253912 vom 2025-12-05",
        "url": "https://www.ibm.com/support/pages/node/7253912"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2025-3093 vom 2025-12-08",
        "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3093.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:23414 vom 2025-12-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:23414"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-22205 vom 2026-01-07",
        "url": "https://linux.oracle.com/errata/ELSA-2025-22205.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0316 vom 2026-01-15",
        "url": "https://access.redhat.com/errata/RHSA-2026:0316"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0420 vom 2026-01-14",
        "url": "https://access.redhat.com/errata/RHSA-2026:0420"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0332 vom 2026-01-15",
        "url": "https://access.redhat.com/errata/RHSA-2026:0332"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0326 vom 2026-01-15",
        "url": "https://access.redhat.com/errata/RHSA-2026:0326"
      },
      {
        "category": "external",
        "summary": "openSUSE Security Update OPENSUSE-SU-2026:20039-1 vom 2026-01-17",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7V4BXWYDTRMC6YIY2DYXN7EDFRYPFGL5/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2026:20085-1 vom 2026-01-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023814.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0934 vom 2026-01-22",
        "url": "https://access.redhat.com/errata/RHSA-2026:0934"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:0950 vom 2026-01-22",
        "url": "https://access.redhat.com/errata/RHSA-2026:0950"
      }
    ],
    "source_lang": "en-US",
    "title": "Internet Systems Consortium BIND: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2026-01-21T23:00:00.000+00:00",
      "generator": {
        "date": "2026-01-22T08:56:12.471+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.5.0"
        }
      },
      "id": "WID-SEC-W-2025-2392",
      "initial_release_date": "2025-10-22T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2025-10-22T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-10-23T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2025-10-26T23:00:00.000+00:00",
          "number": "3",
          "summary": "CVSS 3.1 korrigiert, PoC aufgenommen"
        },
        {
          "date": "2025-11-02T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-11-04T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2025-11-05T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat, Amazon und Rocky Enterprise Software Foundation aufgenommen"
        },
        {
          "date": "2025-11-06T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Oracle Linux, SUSE und Red Hat aufgenommen"
        },
        {
          "date": "2025-11-09T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-11-10T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-11-11T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-11-12T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
        },
        {
          "date": "2025-11-16T23:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-11-18T23:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-11-19T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-11-20T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-11-23T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
        },
        {
          "date": "2025-11-24T23:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Red Hat und F5 aufgenommen"
        },
        {
          "date": "2025-11-25T23:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von SUSE, Oracle Linux und Red Hat aufgenommen"
        },
        {
          "date": "2025-11-26T23:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-11-27T23:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-12-03T23:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-12-07T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-12-08T23:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-12-16T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2026-01-06T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2026-01-14T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2026-01-15T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2026-01-18T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von openSUSE aufgenommen"
        },
        {
          "date": "2026-01-20T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2026-01-21T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "30"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "F5 BIG-IP",
            "product": {
              "name": "F5 BIG-IP",
              "product_id": "T038870",
              "product_identification_helper": {
                "cpe": "cpe:/a:f5:big-ip:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "F5"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM QRadar SIEM",
            "product": {
              "name": "IBM QRadar SIEM",
              "product_id": "T021415",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:qradar_siem:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c9.18.41",
                "product": {
                  "name": "Internet Systems Consortium BIND \u003c9.18.41",
                  "product_id": "T048067"
                }
              },
              {
                "category": "product_version",
                "name": "9.18.41",
                "product": {
                  "name": "Internet Systems Consortium BIND 9.18.41",
                  "product_id": "T048067-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:isc:bind:9.18.41"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c9.20.15",
                "product": {
                  "name": "Internet Systems Consortium BIND \u003c9.20.15",
                  "product_id": "T048068"
                }
              },
              {
                "category": "product_version",
                "name": "9.20.15",
                "product": {
                  "name": "Internet Systems Consortium BIND 9.20.15",
                  "product_id": "T048068-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:isc:bind:9.20.15"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c9.21.14",
                "product": {
                  "name": "Internet Systems Consortium BIND \u003c9.21.14",
                  "product_id": "T048069"
                }
              },
              {
                "category": "product_version",
                "name": "9.21.14",
                "product": {
                  "name": "Internet Systems Consortium BIND 9.21.14",
                  "product_id": "T048069-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:isc:bind:9.21.14"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Supported Preview Edition \u003c9.18.41-S1",
                "product": {
                  "name": "Internet Systems Consortium BIND Supported Preview Edition \u003c9.18.41-S1",
                  "product_id": "T048070"
                }
              },
              {
                "category": "product_version",
                "name": "Supported Preview Edition 9.18.41-S1",
                "product": {
                  "name": "Internet Systems Consortium BIND Supported Preview Edition 9.18.41-S1",
                  "product_id": "T048070-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:isc:bind:supported_preview_edition__9.18.41-s1"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Supported Preview Edition \u003c9.20.15-S1",
                "product": {
                  "name": "Internet Systems Consortium BIND Supported Preview Edition \u003c9.20.15-S1",
                  "product_id": "T048071"
                }
              },
              {
                "category": "product_version",
                "name": "Supported Preview Edition 9.20.15-S1",
                "product": {
                  "name": "Internet Systems Consortium BIND Supported Preview Edition 9.20.15-S1",
                  "product_id": "T048071-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:isc:bind:supported_preview_edition__9.20.15-s1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "BIND"
          }
        ],
        "category": "vendor",
        "name": "Internet Systems Consortium"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "RESF Rocky Linux",
            "product": {
              "name": "RESF Rocky Linux",
              "product_id": "T032255",
              "product_identification_helper": {
                "cpe": "cpe:/o:resf:rocky_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "RESF"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "SUSE openSUSE",
            "product": {
              "name": "SUSE openSUSE",
              "product_id": "T027843",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:opensuse:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-40778",
      "product_status": {
        "known_affected": [
          "T048071",
          "T048070",
          "67646",
          "T004914",
          "T032255",
          "T038870",
          "74185",
          "2951",
          "T002207",
          "T000126",
          "T021415",
          "T027843",
          "T048069",
          "T048068",
          "398363",
          "T048067"
        ]
      },
      "release_date": "2025-10-22T22:00:00.000+00:00",
      "title": "CVE-2025-40778"
    },
    {
      "cve": "CVE-2025-40780",
      "product_status": {
        "known_affected": [
          "T048071",
          "T048070",
          "67646",
          "T004914",
          "T032255",
          "T038870",
          "74185",
          "2951",
          "T002207",
          "T000126",
          "T021415",
          "T027843",
          "T048069",
          "T048068",
          "398363",
          "T048067"
        ]
      },
      "release_date": "2025-10-22T22:00:00.000+00:00",
      "title": "CVE-2025-40780"
    },
    {
      "cve": "CVE-2025-8677",
      "product_status": {
        "known_affected": [
          "T048071",
          "T048070",
          "67646",
          "T004914",
          "T032255",
          "T038870",
          "74185",
          "2951",
          "T002207",
          "T000126",
          "T021415",
          "T027843",
          "T048069",
          "T048068",
          "398363",
          "T048067"
        ]
      },
      "release_date": "2025-10-22T22:00:00.000+00:00",
      "title": "CVE-2025-8677"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…