Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-48661 (GCVE-0-2022-48661)
Vulnerability from cvelistv5 – Published: 2024-04-28 13:01 – Updated: 2025-05-04 08:20
VLAI?
EPSS
Title
gpio: mockup: Fix potential resource leakage when register a chip
Summary
In the Linux kernel, the following vulnerability has been resolved:
gpio: mockup: Fix potential resource leakage when register a chip
If creation of software node fails, the locally allocated string
array is left unfreed. Free it on error path.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
6fda593f3082ef1aa783ac13e89f673fd69a2cb6 , < 9b26723e058faaf11b532fb4aa16d6849d581790
(git)
Affected: 6fda593f3082ef1aa783ac13e89f673fd69a2cb6 , < 41f857033c44442a27f591fda8d986e7c9e42872 (git) Affected: 6fda593f3082ef1aa783ac13e89f673fd69a2cb6 , < 02743c4091ccfb246f5cdbbe3f44b152d5d12933 (git) |
||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:17:55.725Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-48661",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-10T15:46:01.735910Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-11T17:33:55.266Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/gpio/gpio-mockup.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "9b26723e058faaf11b532fb4aa16d6849d581790",
"status": "affected",
"version": "6fda593f3082ef1aa783ac13e89f673fd69a2cb6",
"versionType": "git"
},
{
"lessThan": "41f857033c44442a27f591fda8d986e7c9e42872",
"status": "affected",
"version": "6fda593f3082ef1aa783ac13e89f673fd69a2cb6",
"versionType": "git"
},
{
"lessThan": "02743c4091ccfb246f5cdbbe3f44b152d5d12933",
"status": "affected",
"version": "6fda593f3082ef1aa783ac13e89f673fd69a2cb6",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/gpio/gpio-mockup.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.15"
},
{
"lessThan": "5.15",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.71",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.19.*",
"status": "unaffected",
"version": "5.19.12",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.71",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.19.12",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0",
"versionStartIncluding": "5.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: mockup: Fix potential resource leakage when register a chip\n\nIf creation of software node fails, the locally allocated string\narray is left unfreed. Free it on error path."
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T08:20:47.064Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790"
},
{
"url": "https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872"
},
{
"url": "https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933"
}
],
"title": "gpio: mockup: Fix potential resource leakage when register a chip",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2022-48661",
"datePublished": "2024-04-28T13:01:26.940Z",
"dateReserved": "2024-02-25T13:44:28.319Z",
"dateUpdated": "2025-05-04T08:20:47.064Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.15\", \"versionEndExcluding\": \"5.15.71\", \"matchCriteriaId\": \"CA574867-6574-44D7-B365-96D57A9704AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.16\", \"versionEndExcluding\": \"5.19.12\", \"matchCriteriaId\": \"03B0F56B-C5CC-4E81-BB51-D07D569DE4CA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ngpio: mockup: Fix potential resource leakage when register a chip\\n\\nIf creation of software node fails, the locally allocated string\\narray is left unfreed. Free it on error path.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: gpio: maqueta: corrige una posible fuga de recursos al registrar un chip. Si falla la creaci\\u00f3n del nodo de software, la matriz de cadenas asignada localmente queda sin liberar. Lib\\u00e9relo en la ruta de error.\"}]",
"id": "CVE-2022-48661",
"lastModified": "2024-11-21T07:33:43.400",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2024-04-28T13:15:07.897",
"references": "[{\"url\": \"https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-404\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-48661\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-04-28T13:15:07.897\",\"lastModified\":\"2024-11-21T07:33:43.400\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ngpio: mockup: Fix potential resource leakage when register a chip\\n\\nIf creation of software node fails, the locally allocated string\\narray is left unfreed. Free it on error path.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: gpio: maqueta: corrige una posible fuga de recursos al registrar un chip. Si falla la creaci\u00f3n del nodo de software, la matriz de cadenas asignada localmente queda sin liberar. Lib\u00e9relo en la ruta de error.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-404\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15\",\"versionEndExcluding\":\"5.15.71\",\"matchCriteriaId\":\"CA574867-6574-44D7-B365-96D57A9704AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"5.19.12\",\"matchCriteriaId\":\"03B0F56B-C5CC-4E81-BB51-D07D569DE4CA\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T15:17:55.725Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48661\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:46:01.735910Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:19.621Z\"}}], \"cna\": {\"title\": \"gpio: mockup: Fix potential resource leakage when register a chip\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6fda593f3082ef1aa783ac13e89f673fd69a2cb6\", \"lessThan\": \"9b26723e058faaf11b532fb4aa16d6849d581790\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6fda593f3082ef1aa783ac13e89f673fd69a2cb6\", \"lessThan\": \"41f857033c44442a27f591fda8d986e7c9e42872\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6fda593f3082ef1aa783ac13e89f673fd69a2cb6\", \"lessThan\": \"02743c4091ccfb246f5cdbbe3f44b152d5d12933\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/gpio/gpio-mockup.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.15\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.15\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.15.71\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"5.19.12\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.19.*\"}, {\"status\": \"unaffected\", \"version\": \"6.0\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/gpio/gpio-mockup.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790\"}, {\"url\": \"https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872\"}, {\"url\": \"https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ngpio: mockup: Fix potential resource leakage when register a chip\\n\\nIf creation of software node fails, the locally allocated string\\narray is left unfreed. Free it on error path.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.71\", \"versionStartIncluding\": \"5.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.19.12\", \"versionStartIncluding\": \"5.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.0\", \"versionStartIncluding\": \"5.15\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T08:20:47.064Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-48661\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T08:20:47.064Z\", \"dateReserved\": \"2024-02-25T13:44:28.319Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-04-28T13:01:26.940Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
WID-SEC-W-2024-0984
Vulnerability from csaf_certbund - Published: 2024-04-28 22:00 - Updated: 2025-06-04 22:00Summary
Linux Kernel: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff: Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuführen oder einen nicht spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme: - UNIX
References
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren oder einen nicht spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0984 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0984.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0984 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0984"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4226-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4235-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LIMMCWFWYJUMJTABZZ7ZEYXOOVE5BZY7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4242-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4234-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/B6RMLGICBLD3BNXSBS7J23W3GCEJMFJA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4256-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/34BVCDIDBQSXQ6Y3TVDGD4FSZ7N3D3LI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09",
"url": "https://ubuntu.com/security/notices/USN-7144-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4266-1 vom 2024-12-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RRJRAM3LFR4MNOHCFB2XIOS6OJUDNUPE/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4263-1 vom 2024-12-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4264-1 vom 2024-12-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SZPUHL7SUZ57L3OJFO25IHYVDJ76ONGC/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7194-1"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042655-CVE-2023-52646-3ebb@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042800-CVE-2022-48658-4c9c@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042800-CVE-2022-48659-8ccb@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042800-CVE-2022-48660-4fb8@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042800-CVE-2022-48661-1b6c@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042801-CVE-2022-48662-3a84@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042801-CVE-2022-48663-397d@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042801-CVE-2022-48664-d281@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042801-CVE-2022-48665-527d@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042801-CVE-2022-48666-4916@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042802-CVE-2022-48667-0aa2@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042802-CVE-2022-48668-3790@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042844-CVE-2024-26927-3374@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042849-CVE-2024-26928-e543@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042851-CVE-2022-48631-cab6@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042854-CVE-2022-48632-465f@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042854-CVE-2022-48633-f726@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042854-CVE-2022-48634-af99@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042854-CVE-2022-48635-6286@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042855-CVE-2022-48636-52a7@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042855-CVE-2022-48637-d149@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042855-CVE-2022-48638-e1bd@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042855-CVE-2022-48639-be80@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042855-CVE-2022-48640-feee@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042856-CVE-2022-48641-531f@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042856-CVE-2022-48642-b65b@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042856-CVE-2022-48643-7d4b@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042856-CVE-2022-48644-757e@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042857-CVE-2022-48645-2325@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042857-CVE-2022-48646-35f2@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042857-CVE-2022-48647-4a4d@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042857-CVE-2022-48648-eaf8@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042858-CVE-2022-48649-82c3@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042858-CVE-2022-48650-c4f0@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042858-CVE-2022-48651-ac9e@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042858-CVE-2022-48652-438f@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042858-CVE-2022-48653-b6e7@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042859-CVE-2022-48654-e107@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042859-CVE-2022-48655-5feb@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042859-CVE-2022-48656-1d7a@gregkh/T/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcements vom 2024-04-28",
"url": "https://lore.kernel.org/linux-cve-announce/2024042859-CVE-2022-48657-d23e@gregkh/T/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1648-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018524.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1644-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018528.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1643-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018529.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1647-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018525.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1641-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1642-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018530.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1646-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018526.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1645-1 vom 2024-05-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018527.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1650-1 vom 2024-05-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1659-1 vom 2024-05-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018538.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1679-1 vom 2024-05-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018544.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1695-1 vom 2024-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1677-1 vom 2024-05-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018543.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1680-1 vom 2024-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1683-1 vom 2024-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018545.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1682-1 vom 2024-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1696-1 vom 2024-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1685-1 vom 2024-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018553.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1686-1 vom 2024-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1692-1 vom 2024-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1694-1 vom 2024-05-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018550.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1707-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018563.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1709-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1705-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018565.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1706-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018564.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1708-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018562.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1730-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1739-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1731-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018574.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1711-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018571.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1740-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1732-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018573.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1726-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018577.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1719-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018568.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1729-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018576.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1723-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1648-2 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018572.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1720-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018567.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1736-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018583.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1713-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018569.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1735-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018582.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1738-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018581.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1712-1 vom 2024-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018570.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1749-1 vom 2024-05-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018587.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1746-1 vom 2024-05-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018588.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1750-1 vom 2024-05-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018586.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1757-1 vom 2024-05-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018593.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1753-1 vom 2024-05-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1759-1 vom 2024-05-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1760-1 vom 2024-05-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018591.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1742-1 vom 2024-05-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018590.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1751-1 vom 2024-05-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1748-1 vom 2024-05-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018589.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1870-1 vom 2024-05-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018634.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5703 vom 2024-06-02",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00113.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6817-1 vom 2024-06-08",
"url": "https://ubuntu.com/security/notices/USN-6817-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6816-1 vom 2024-06-08",
"url": "https://ubuntu.com/security/notices/USN-6816-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1983-1 vom 2024-06-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018700.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6817-2 vom 2024-06-11",
"url": "https://ubuntu.com/security/notices/USN-6817-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2008-1 vom 2024-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018706.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2011-1 vom 2024-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018710.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6817-3 vom 2024-06-14",
"url": "https://ubuntu.com/security/notices/USN-6817-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2101-1 vom 2024-06-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2092-1 vom 2024-06-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018765.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2100-1 vom 2024-06-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018761.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2148-1 vom 2024-06-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018789.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2130-1 vom 2024-06-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2120-1 vom 2024-06-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2162-1 vom 2024-06-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2135-1 vom 2024-06-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018783.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2163-1 vom 2024-06-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2121-1 vom 2024-06-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2139-1 vom 2024-06-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2184-1 vom 2024-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018807.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2185-1 vom 2024-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018809.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2189-1 vom 2024-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018811.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2209-1 vom 2024-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018822.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2190-1 vom 2024-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018819.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2208-1 vom 2024-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018823.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2207-1 vom 2024-06-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018824.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3843 vom 2024-06-27",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-022 vom 2024-07-03",
"url": "https://www.dell.com/support/kbdoc/de-de/000226633/dsa-2024-022-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6878-1 vom 2024-07-04",
"url": "https://ubuntu.com/security/notices/USN-6878-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2335-1 vom 2024-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018882.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2337-1 vom 2024-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2360-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018907.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2344-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2373-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2343-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018893.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2357-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018899.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2381-1 vom 2024-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018916.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2382-1 vom 2024-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6893-1 vom 2024-07-11",
"url": "https://ubuntu.com/security/notices/USN-6893-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2448-1 vom 2024-07-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018945.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2473-1 vom 2024-07-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2447-1 vom 2024-07-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018946.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2472-1 vom 2024-07-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2446-1 vom 2024-07-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018947.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6893-2 vom 2024-07-16",
"url": "https://ubuntu.com/security/notices/USN-6893-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2558-1 vom 2024-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6893-3 vom 2024-07-23",
"url": "https://ubuntu.com/security/notices/USN-6893-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6918-1 vom 2024-07-26",
"url": "https://ubuntu.com/security/notices/USN-6918-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6924-1 vom 2024-07-29",
"url": "https://ubuntu.com/security/notices/USN-6924-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6924-2 vom 2024-07-30",
"url": "https://ubuntu.com/security/notices/USN-6924-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2722-1 vom 2024-08-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019090.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2751-1 vom 2024-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019098.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2740-1 vom 2024-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2755-1 vom 2024-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2725-1 vom 2024-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2758-1 vom 2024-08-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019109.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06",
"url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5067 vom 2024-08-07",
"url": "https://access.redhat.com/errata/RHSA-2024:5067"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5066 vom 2024-08-07",
"url": "https://access.redhat.com/errata/RHSA-2024:5066"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2773-1 vom 2024-08-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019112.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5102 vom 2024-08-08",
"url": "https://access.redhat.com/errata/RHSA-2024:5102"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5101 vom 2024-08-08",
"url": "https://access.redhat.com/errata/RHSA-2024:5101"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6953-1 vom 2024-08-09",
"url": "https://ubuntu.com/security/notices/USN-6953-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2843-1 vom 2024-08-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019145.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2851-1 vom 2024-08-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019143.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2824-1 vom 2024-08-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019152.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2821-1 vom 2024-08-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019155.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2850-1 vom 2024-08-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019144.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2840-1 vom 2024-08-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019147.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2825-1 vom 2024-08-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019151.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5101 vom 2024-08-09",
"url": "https://linux.oracle.com/errata/ELSA-2024-5101.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5747 vom 2024-08-12",
"url": "https://security-tracker.debian.org/tracker/DSA-5747-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-066 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-066.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5281 vom 2024-08-13",
"url": "https://access.redhat.com/errata/RHSA-2024:5281"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1663-1 vom 2024-08-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MFQEXBT2XPZQJMUF7MN6ZVO5FXVY4NKK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-188 vom 2024-08-21",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-188.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-184 vom 2024-08-21",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-184.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-187 vom 2024-08-21",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-187.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-186 vom 2024-08-21",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-186.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6976-1 vom 2024-08-22",
"url": "https://ubuntu.com/security/notices/USN-6976-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-185 vom 2024-08-21",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-185.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2024-183 vom 2024-08-21",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-183.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6979-1 vom 2024-08-22",
"url": "https://ubuntu.com/security/notices/USN-6979-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3037-1 vom 2024-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019326.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3048-1 vom 2024-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019320.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3044-1 vom 2024-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019321.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3043-1 vom 2024-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019322.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3034-1 vom 2024-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019315.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6297 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6297"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3318-1 vom 2024-09-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019461.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3347-1 vom 2024-09-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019478.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3348-1 vom 2024-09-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3336-1 vom 2024-09-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3375-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3368-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3379-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3361-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019492.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6993 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3395-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019494.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3405-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019498.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3399-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6998 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6998"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3425-1 vom 2024-09-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019512.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3623-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TF6OKVTF5VSUGWWYIUXLV2YZK7NYELIN/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3639-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QREDIZHMC5MCDU7XHJHAPFFVPPIKTHWD/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3631-1 vom 2024-10-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBN5S6CN75ZWGV3ZNRLZRMQ5DF3HMBZE/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3642-1 vom 2024-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3697-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/A6BRGXRVSUAODD2ZZSX5GJCV46W4N5YB/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3679-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RDWWWR2VCADWSQCCZNNFB4VWOMZDOC63/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3694-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Y2P3R5HQ4Z7AYZLBXUGXBJMITFENT5NV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3696-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YYPGEHXE3QJ5NBRD57VSRTM36AC5DISM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3695-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MOG44NUGCSJS6Q3AKMCV3X4IK2DN6CLL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3649-1 vom 2024-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019619.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3662-1 vom 2024-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3651-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VLAP2QXVEHLNNWBLHF53IAVX5KBCFJGW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3652-1 vom 2024-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XAOP5G7ENALTQ2BLIJROCRJ3STRXQOFY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3815-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JIUM76237NQIAK3CP7ENKHD5EOEBDHZH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3830-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5FIXDPPFE66BKRWS3X45YHODJJ57FQRT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3796-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3829-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RMOWLUMWUZKBWNWZRVPCJY43YUOMCMJ7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3793-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3803-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3820-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3837-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VHXZ2BQRCVWQY2AVSULS6AN56SITZ273/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3798-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3814-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QW54KPSGGX7Q3N4CIMSAGZRZY4WGZV2D/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3842-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VVJDY73ZQLYG6XTLPXQKV6DOXIBCWQNH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3851-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7YDAYBSAUUUZVVIKYWRRX5O6ZCOQ2K46/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3852-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CJCHUFTBOJTQRE24NTRP6WMCK5BGPZ3N/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3855-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HVT4PHTMBZOBVPW2CI26GVIVJNWCBTVN/"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11",
"url": "https://ubuntu.com/security/notices/USN-7100-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9315"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7100-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7123-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4081-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4122-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4123-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4124-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4218-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4UVNDL3CU4NHVPE7QELR2N5HRCDSMYEV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4216-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KZC5ZXKVE5JSNEKEAICAO52WN7SOJCTX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4214-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4UZ4KLYIQHACIYR7LE2ANITUCPLWFYS/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0103-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0106-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0114-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YC7MKFCHLBJHUQM2SLPOGVG4DUWP2J4E/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0240-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCBYAV5OJRXD362FDCZUSIHNHOURONCF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0231-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0244-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0253-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2025-2895 vom 2025-02-13",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25398"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7407-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7408-2 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7408-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7406-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-3 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7406-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-2 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7406-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7408-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-4 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7406-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7408-4 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7408-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7408-3 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7408-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-6 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7406-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7406-5 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7406-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7421-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7420-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7420-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0111-1 vom 2025-04-16",
"url": "https://ubuntu.com/security/notices/LSN-0111-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7458-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7459-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7463-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7459-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html"
},
{
"category": "external",
"summary": "Kyocera Downloads",
"url": "https://www.kyoceradocumentsolutions.us/en/support/downloads.name-L3VzL2VuL3NvZnR3YXJlL0tZT0NFUkFERVZJQ0VNQU5BR0VS.html#tab=application"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7475-1 vom 2025-05-02",
"url": "https://ubuntu.com/security/notices/USN-7475-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20028-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-04T22:00:00.000+00:00",
"generator": {
"date": "2025-06-05T06:09:04.290+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-0984",
"initial_release_date": "2024-04-28T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-28T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-05-14T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-15T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-20T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-22T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-02T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-06-09T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-06-11T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-06-12T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-16T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-06-19T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-23T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-24T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-25T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-26T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-07-02T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-07-04T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-08T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-11T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-14T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-15T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-18T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-22T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-28T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-04T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-06T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2024-08-07T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-08T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-08-11T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Amazon und Red Hat aufgenommen"
},
{
"date": "2024-08-19T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-21T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-27T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-04T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-11T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-19T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-22T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2024-09-24T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-29T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-16T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-28T23:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-02T23:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-05T23:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-09T23:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-16T23:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-19T23:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-27T23:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2025-03-11T23:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-07T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-16T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-28T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "89"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T034392",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
},
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T034583",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual"
}
}
},
{
"category": "product_version_range",
"name": "\u003c19.11",
"product": {
"name": "Dell NetWorker \u003c19.11",
"product_id": "T035785"
}
},
{
"category": "product_version",
"name": "19.11",
"product": {
"name": "Dell NetWorker 19.11",
"product_id": "T035785-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:19.11"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "EMC Avamar",
"product": {
"name": "EMC Avamar",
"product_id": "T014381",
"product_identification_helper": {
"cpe": "cpe:/a:emc:avamar:-"
}
}
}
],
"category": "vendor",
"name": "EMC"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
"product_id": "T038741"
}
},
{
"category": "product_version",
"name": "7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
"product_id": "T038741-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Kyocera Printer",
"product": {
"name": "Kyocera Printer",
"product_id": "T015471",
"product_identification_helper": {
"cpe": "cpe:/h:kyocera:printer:-"
}
}
}
],
"category": "vendor",
"name": "Kyocera"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T034436",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-48631",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48631"
},
{
"cve": "CVE-2022-48632",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48632"
},
{
"cve": "CVE-2022-48633",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48633"
},
{
"cve": "CVE-2022-48634",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48634"
},
{
"cve": "CVE-2022-48635",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48635"
},
{
"cve": "CVE-2022-48636",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48636"
},
{
"cve": "CVE-2022-48637",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48637"
},
{
"cve": "CVE-2022-48638",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48638"
},
{
"cve": "CVE-2022-48639",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48639"
},
{
"cve": "CVE-2022-48640",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48640"
},
{
"cve": "CVE-2022-48641",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48641"
},
{
"cve": "CVE-2022-48642",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48642"
},
{
"cve": "CVE-2022-48643",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48643"
},
{
"cve": "CVE-2022-48644",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48644"
},
{
"cve": "CVE-2022-48645",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48645"
},
{
"cve": "CVE-2022-48646",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48646"
},
{
"cve": "CVE-2022-48647",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48647"
},
{
"cve": "CVE-2022-48648",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48648"
},
{
"cve": "CVE-2022-48649",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48649"
},
{
"cve": "CVE-2022-48650",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48650"
},
{
"cve": "CVE-2022-48651",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48651"
},
{
"cve": "CVE-2022-48652",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48652"
},
{
"cve": "CVE-2022-48653",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48653"
},
{
"cve": "CVE-2022-48654",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48654"
},
{
"cve": "CVE-2022-48655",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48655"
},
{
"cve": "CVE-2022-48656",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48656"
},
{
"cve": "CVE-2022-48657",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48657"
},
{
"cve": "CVE-2022-48658",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48658"
},
{
"cve": "CVE-2022-48659",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48659"
},
{
"cve": "CVE-2022-48660",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48660"
},
{
"cve": "CVE-2022-48661",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48661"
},
{
"cve": "CVE-2022-48662",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48662"
},
{
"cve": "CVE-2022-48663",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48663"
},
{
"cve": "CVE-2022-48664",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48664"
},
{
"cve": "CVE-2022-48665",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48665"
},
{
"cve": "CVE-2022-48666",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48666"
},
{
"cve": "CVE-2022-48667",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48667"
},
{
"cve": "CVE-2022-48668",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2022-48668"
},
{
"cve": "CVE-2023-52646",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2023-52646"
},
{
"cve": "CVE-2024-26927",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2024-26927"
},
{
"cve": "CVE-2024-26928",
"product_status": {
"known_affected": [
"T034436",
"67646",
"T034583",
"T004914",
"T035785",
"T038741",
"T039664",
"T015471",
"T014381",
"2951",
"T002207",
"T034392",
"T000126",
"T024663",
"398363"
]
},
"release_date": "2024-04-28T22:00:00.000+00:00",
"title": "CVE-2024-26928"
}
]
}
BDU:2024-06310
Vulnerability from fstec - Published: 20.09.2022
VLAI Severity ?
Title
Уязвимость компонента gpio ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость компонента gpio ядра операционной системы Linux связана с утечкой ресурсов при регистрации чипа. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Severity ?
Vendor
ООО «Ред Софт», Сообщество свободного программного обеспечения
Software Name
РЕД ОС (запись в едином реестре российских программ №3751), Linux
Software Version
7.3 (РЕД ОС), от 5.16 до 5.19.11 включительно (Linux), от 5.15.0 до 5.15.70 включительно (Linux)
Possible Mitigations
Для Linux:
https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933
https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872
https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790
Для РедОС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Reference
https://git.kernel.org/linus/02743c4091ccfb246f5cdbbe3f44b152d5d12933
https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933
https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872
https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.71
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.12
https://lore.kernel.org/linux-cve-announce/2024042800-CVE-2022-48661-1b6c@gregkh/
https://redos.red-soft.ru/support/secure/
https://www.cve.org/CVERecord?id=CVE-2022-48661
CWE
CWE-404
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.3 (\u0420\u0415\u0414 \u041e\u0421), \u043e\u0442 5.16 \u0434\u043e 5.19.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 5.15.0 \u0434\u043e 5.15.70 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933 \nhttps://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872 \nhttps://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "20.09.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "10.10.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "19.08.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-06310",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-48661",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "\u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.16 \u0434\u043e 5.19.12 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.15 \u0434\u043e 5.15.71 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 gpio \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 gpio \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0443\u0442\u0435\u0447\u043a\u043e\u0439 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u043f\u0440\u0438 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438 \u0447\u0438\u043f\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.kernel.org/linus/02743c4091ccfb246f5cdbbe3f44b152d5d12933\nhttps://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933\nhttps://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872\nhttps://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.71\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.12\nhttps://lore.kernel.org/linux-cve-announce/2024042800-CVE-2022-48661-1b6c@gregkh/\nhttps://redos.red-soft.ru/support/secure/\nhttps://www.cve.org/CVERecord?id=CVE-2022-48661",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
GHSA-98W2-6V6Q-2PRV
Vulnerability from github – Published: 2024-04-28 15:30 – Updated: 2024-04-30 15:30
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
gpio: mockup: Fix potential resource leakage when register a chip
If creation of software node fails, the locally allocated string array is left unfreed. Free it on error path.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2022-48661"
],
"database_specific": {
"cwe_ids": [
"CWE-404"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-04-28T13:15:07Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: mockup: Fix potential resource leakage when register a chip\n\nIf creation of software node fails, the locally allocated string\narray is left unfreed. Free it on error path.",
"id": "GHSA-98w2-6v6q-2prv",
"modified": "2024-04-30T15:30:36Z",
"published": "2024-04-28T15:30:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48661"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2022-48661
Vulnerability from gsd - Updated: 2024-02-26 06:00Details
In the Linux kernel, the following vulnerability has been resolved:
gpio: mockup: Fix potential resource leakage when register a chip
If creation of software node fails, the locally allocated string
array is left unfreed. Free it on error path.
Aliases
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-48661"
],
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: mockup: Fix potential resource leakage when register a chip\n\nIf creation of software node fails, the locally allocated string\narray is left unfreed. Free it on error path.",
"id": "GSD-2022-48661",
"modified": "2024-02-26T06:00:31.211176Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@kernel.org",
"ID": "CVE-2022-48661",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6fda593f3082",
"version_value": "9b26723e058f"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"status": "affected",
"version": "5.15"
},
{
"lessThan": "5.15",
"status": "unaffected",
"version": "0",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.71",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.19.*",
"status": "unaffected",
"version": "5.19.12",
"versionType": "custom"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.0",
"versionType": "original_commit_for_fix"
}
]
}
}
]
}
}
]
},
"vendor_name": "Linux"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: mockup: Fix potential resource leakage when register a chip\n\nIf creation of software node fails, the locally allocated string\narray is left unfreed. Free it on error path."
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790"
},
{
"name": "https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872"
},
{
"name": "https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933",
"refsource": "MISC",
"url": "https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: mockup: Fix potential resource leakage when register a chip\n\nIf creation of software node fails, the locally allocated string\narray is left unfreed. Free it on error path."
}
],
"id": "CVE-2022-48661",
"lastModified": "2024-04-28T13:15:07.897",
"metrics": {},
"published": "2024-04-28T13:15:07.897",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Received"
}
}
}
}
FKIE_CVE-2022-48661
Vulnerability from fkie_nvd - Published: 2024-04-28 13:15 - Updated: 2024-11-21 07:33
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
gpio: mockup: Fix potential resource leakage when register a chip
If creation of software node fails, the locally allocated string
array is left unfreed. Free it on error path.
References
| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790 | Patch |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA574867-6574-44D7-B365-96D57A9704AF",
"versionEndExcluding": "5.15.71",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03B0F56B-C5CC-4E81-BB51-D07D569DE4CA",
"versionEndExcluding": "5.19.12",
"versionStartIncluding": "5.16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: mockup: Fix potential resource leakage when register a chip\n\nIf creation of software node fails, the locally allocated string\narray is left unfreed. Free it on error path."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: gpio: maqueta: corrige una posible fuga de recursos al registrar un chip. Si falla la creaci\u00f3n del nodo de software, la matriz de cadenas asignada localmente queda sin liberar. Lib\u00e9relo en la ruta de error."
}
],
"id": "CVE-2022-48661",
"lastModified": "2024-11-21T07:33:43.400",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-04-28T13:15:07.897",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-404"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…