Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-3439 (GCVE-0-2023-3439)
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
patrick@puiterwijk.org | http://www.openwall.com/lists/oss-security/2023/07/02/1 | Mailing List, Patch, Third Party Advisory | |
patrick@puiterwijk.org | https://bugzilla.redhat.com/show_bug.cgi?id=2217915 | Issue Tracking, Patch, Third Party Advisory | |
patrick@puiterwijk.org | https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2023/07/02/1 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2217915 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269 | Patch |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Linux Kernel (mctp) |
Version: Fixed in kernel 5.18-rc5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217915" }, { "tags": [ "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269" }, { "name": "[oss-security] 20230702 CVE-2023-3439: Linux MCTP use-after-free in mctp_sendmsg", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/07/02/1" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-3439", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-06T15:55:04.331859Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-10T21:08:54.880Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Linux Kernel (mctp)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in kernel 5.18-rc5" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device\u0027s relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev-\u003eaddrs object, potentially leading to a denial of service." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-02T00:00:00.000Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217915" }, { "url": "https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269" }, { "name": "[oss-security] 20230702 CVE-2023-3439: Linux MCTP use-after-free in mctp_sendmsg", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2023/07/02/1" } ] } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2023-3439", "datePublished": "2023-06-28T00:00:00.000Z", "dateReserved": "2023-06-28T00:00:00.000Z", "dateUpdated": "2025-03-10T21:08:54.880Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-3439\",\"sourceIdentifier\":\"patrick@puiterwijk.org\",\"published\":\"2023-06-28T21:15:10.517\",\"lastModified\":\"2025-06-25T20:53:15.413\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device\u0027s relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev-\u003eaddrs object, potentially leading to a denial of service.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"patrick@puiterwijk.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15\",\"versionEndIncluding\":\"5.17\",\"matchCriteriaId\":\"FF25759E-C274-48B4-9CBD-BDED1C6EF754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD94161-84BB-42E6-9882-4FC0C42E9FC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AB06DDF-3C2B-416D-B448-E990D8FF67A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAE6C6C5-4D21-4C04-897C-70CBBB3D7B91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA5F085D-52F3-4EE2-8353-455D1A6FE073\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2023/07/02/1\",\"source\":\"patrick@puiterwijk.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2217915\",\"source\":\"patrick@puiterwijk.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269\",\"source\":\"patrick@puiterwijk.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/07/02/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2217915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2217915\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/07/02/1\", \"name\": \"[oss-security] 20230702 CVE-2023-3439: Linux MCTP use-after-free in mctp_sendmsg\", \"tags\": [\"mailing-list\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T06:55:03.477Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-3439\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-06T15:55:04.331859Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-06T15:55:05.639Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Linux Kernel (mctp)\", \"versions\": [{\"status\": \"affected\", \"version\": \"Fixed in kernel 5.18-rc5\"}]}], \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2217915\"}, {\"url\": \"https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/07/02/1\", \"name\": \"[oss-security] 20230702 CVE-2023-3439: Linux MCTP use-after-free in mctp_sendmsg\", \"tags\": [\"mailing-list\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device\u0027s relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev-\u003eaddrs object, potentially leading to a denial of service.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416\"}]}], \"providerMetadata\": {\"orgId\": \"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5\", \"shortName\": \"fedora\", \"dateUpdated\": \"2023-07-02T00:00:00.000Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-3439\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-10T21:08:54.880Z\", \"dateReserved\": \"2023-06-28T00:00:00.000Z\", \"assignerOrgId\": \"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5\", \"datePublished\": \"2023-06-28T00:00:00.000Z\", \"assignerShortName\": \"fedora\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
WID-SEC-W-2023-1595
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um seine Privilegien zu erh\u00f6hen und einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1595 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1595.json" }, { "category": "self", "summary": "WID-SEC-2023-1595 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1595" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12150 vom 2024-02-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12150.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1278 vom 2024-03-12", "url": "https://access.redhat.com/errata/RHSA-2024:1278" }, { "category": "external", "summary": "Debian Security Advisory DLA-3710 vom 2024-01-11", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1250 vom 2024-03-12", "url": "https://access.redhat.com/errata/RHSA-2024:1250" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1253 vom 2024-03-12", "url": "https://access.redhat.com/errata/RHSA-2024:1253" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-295v-9m5g-79q9" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-3gcx-wjr4-jv32" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-8r8v-fx37-wpw7" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-9787-f568-7rr2" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-hg6h-cj3j-wp77" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-rmg8-h2h6-5wwf" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-vj8j-762w-6jmv" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-wh7q-2hgq-2xj7" }, { "category": "external", "summary": "Debian Security Advisory DSA-5448 vom 2023-07-06", "url": "https://www.debian.org/security/2023/dsa-5448" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2804-1 vom 2023-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015467.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2803-1 vom 2023-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2805-1 vom 2023-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2809-1 vom 2023-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015470.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2808-1 vom 2023-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015471.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2810-1 vom 2023-07-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015472.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2820-1 vom 2023-07-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2831-1 vom 2023-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2834-1 vom 2023-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6231-1 vom 2023-07-14", "url": "https://ubuntu.com/security/notices/USN-6231-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2830-1 vom 2023-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2822-1 vom 2023-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2859-1 vom 2023-07-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2871-1 vom 2023-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015524.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2892-1 vom 2023-07-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2023-024 vom 2023-07-20", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2023-024.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6250-1 vom 2023-07-26", "url": "https://ubuntu.com/security/notices/USN-6250-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6246-1 vom 2023-07-26", "url": "https://ubuntu.com/security/notices/USN-6246-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6248-1 vom 2023-07-26", "url": "https://ubuntu.com/security/notices/USN-6248-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6249-1 vom 2023-07-26", "url": "https://ubuntu.com/security/notices/USN-6249-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6260-1 vom 2023-07-27", "url": "https://ubuntu.com/security/notices/USN-6260-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-3508 vom 2023-07-27", "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5461 vom 2023-07-30", "url": "https://lists.debian.org/debian-security-announce/2023/msg00153.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6261-1 vom 2023-07-28", "url": "https://ubuntu.com/security/notices/USN-6261-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12688 vom 2023-08-01", "url": "https://linux.oracle.com/errata/ELSA-2023-12688.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4378 vom 2023-08-01", "url": "https://access.redhat.com/errata/RHSA-2023:4378" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4380 vom 2023-08-01", "url": "https://access.redhat.com/errata/RHSA-2023:4380" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4377 vom 2023-08-01", "url": "https://access.redhat.com/errata/RHSA-2023:4377" }, { "category": "external", "summary": "Debian Security Advisory DLA-3512 vom 2023-08-02", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3171-1 vom 2023-08-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3172-1 vom 2023-08-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-4377 vom 2023-08-03", "url": "https://linux.oracle.com/errata/ELSA-2023-4377.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3180-1 vom 2023-08-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015780.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3182-1 vom 2023-08-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015778.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4515 vom 2023-08-08", "url": "https://access.redhat.com/errata/RHSA-2023:4515" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4516 vom 2023-08-08", "url": "https://access.redhat.com/errata/RHSA-2023:4516" }, { "category": "external", "summary": "ORACLE OVMSA-2023-0018 vom 2023-08-08", "url": "https://oss.oracle.com/pipermail/el-errata/2023-August/014236.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6285-1 vom 2023-08-11", "url": "https://ubuntu.com/security/notices/USN-6285-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3302-1 vom 2023-08-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015894.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3318-1 vom 2023-08-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015905.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5480 vom 2023-08-18", "url": "https://lists.debian.org/debian-security-announce/2023/msg00172.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3391-1 vom 2023-08-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015999.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3390-1 vom 2023-08-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-141 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-141.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-140 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-140.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-139 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-139.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-138 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-138.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-137 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-137.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-136 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-136.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-135 vom 2023-08-24", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-135.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-134 vom 2023-08-24", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-134.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3421-1 vom 2023-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/016021.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4817 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4817" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4789 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4801 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4801" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4814 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4814" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4815 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4815" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4828 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4828" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4829 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4829" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4888 vom 2023-08-31", "url": "https://access.redhat.com/errata/RHSA-2023:4888" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4967 vom 2023-09-05", "url": "https://access.redhat.com/errata/RHSA-2023:4967" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4961 vom 2023-09-05", "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4962 vom 2023-09-05", "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2023-039 vom 2023-09-07", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2023-039.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3571-1 vom 2023-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016129.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3566-1 vom 2023-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3576-1 vom 2023-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3582-1 vom 2023-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3585-1 vom 2023-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016134.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5069 vom 2023-09-12", "url": "https://access.redhat.com/errata/RHSA-2023:5069" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5093 vom 2023-09-12", "url": "https://access.redhat.com/errata/RHSA-2023:5093" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6583 vom 2024-01-18", "url": "https://oss.oracle.com/pipermail/el-errata/2024-January/015150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3592-1 vom 2023-09-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3594-1 vom 2023-09-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3595-1 vom 2023-09-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3596-1 vom 2023-09-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3603-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3607-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3623-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3620-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3621-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016160.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5069 vom 2023-09-15", "url": "http://linux.oracle.com/errata/ELSA-2023-5069.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3612-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3627-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3628-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3657-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3631-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3630-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3629-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3648-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3647-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3644-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5221 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5221" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5238 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5238" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3671-1 vom 2023-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016218.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3675-1 vom 2023-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016217.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5244 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5255 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5255" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3668-1 vom 2023-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016219.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5235 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5235" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3676-1 vom 2023-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016216.html" }, { "category": "external", "summary": "IBM Security Bulletin 7034265 vom 2023-09-20", "url": "https://www.ibm.com/support/pages/node/7034265" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5244 vom 2023-09-21", "url": "https://linux.oracle.com/errata/ELSA-2023-5244.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1827 vom 2023-09-26", "url": "https://alas.aws.amazon.com/ALAS-2023-1827.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12839 vom 2023-09-29", "url": "http://linux.oracle.com/errata/ELSA-2023-12839.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1268 vom 2024-03-12", "url": "https://access.redhat.com/errata/RHSA-2024:1268" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1269 vom 2024-03-12", "url": "https://access.redhat.com/errata/RHSA-2024:1269" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5627 vom 2023-10-11", "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0098-1 vom 2023-10-10", "url": "https://ubuntu.com/security/notices/LSN-0098-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5548 vom 2023-10-11", "url": "https://access.redhat.com/errata/RHSA-2023:5548" }, { "category": "external", "summary": "Debian Security Advisory DLA-3623 vom 2023-10-19", "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4175-1 vom 2023-10-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1306 vom 2024-03-13", "url": "https://access.redhat.com/errata/RHSA-2024:1306" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4201-1 vom 2023-10-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4219-1 vom 2023-10-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4239-1 vom 2023-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4245-1 vom 2023-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016913.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4267-1 vom 2023-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4285-1 vom 2023-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4279-1 vom 2023-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016938.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4326-1 vom 2023-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4308-1 vom 2023-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6583 vom 2023-11-07", "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-016 vom 2024-07-02", "url": "https://alas.aws.amazon.com/AL2023/ALASLIVEPATCH-2023-016.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-018 vom 2024-07-02", "url": "https://alas.aws.amazon.com/AL2023/ALASLIVEPATCH-2023-018.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-019 vom 2024-07-02", "url": "https://alas.aws.amazon.com/AL2023/ALASLIVEPATCH-2023-019.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-017 vom 2024-07-02", "url": "https://alas.aws.amazon.com/AL2023/ALASLIVEPATCH-2023-017.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-239 vom 2024-07-18", "url": "https://www.dell.com/support/kbdoc/de-de/000227051/dsa-2024-239-security-update-dell-ecs-3-8-1-1-for-multiple-security-vulnerabilities" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-07-18T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:53:45.731+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1595", "initial_release_date": "2023-06-28T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-28T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-07-05T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-07-10T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-11T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-12T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-13T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-16T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-18T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-19T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-20T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-07-25T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-07-27T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Ubuntu und Debian aufgenommen" }, { "date": "2023-07-30T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Debian und Ubuntu aufgenommen" }, { "date": "2023-07-31T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-08-01T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-02T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-08-03T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2023-08-07T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-08T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2023-08-13T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-08-15T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-08-20T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-08-23T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2023-08-24T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-08-29T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-30T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-05T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-06T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-09-10T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-09-11T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-09-12T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-13T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-09-14T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-09-17T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2023-09-18T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-09-19T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2023-09-20T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-09-25T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-10-01T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-10-10T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2023-10-19T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-10-24T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-10-25T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-10-26T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-10-30T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-10-31T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-11-07T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-11T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-01-18T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-02-12T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-03-11T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-12T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-13T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-07-01T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-07-18T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "56" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.8.1.1", "product": { "name": "Dell ECS \u003c3.8.1.1", "product_id": "T036366" } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cplus 10.1.15.2", "product": { "name": "IBM Spectrum Protect \u003cplus 10.1.15.2", "product_id": "T029988" } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T006656", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "category": "product_name", "name": "Oracle VM", "product": { "name": "Oracle VM", "product_id": "T011119", "product_identification_helper": { "cpe": "cpe:/a:oracle:vm:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1295", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen im Linux-Kernel. Die Fehler bestehen aufgrund eines Heap-Out-of-Bounds-Write im ipvlan-Netzwerktreiber, eines Time-of-Check-to-Time-of-Use-Problems und eines Use-after-free-Problems im io_uring-Subsystem und eines Use-after-free-Problems im netfilter-Subsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-1295" }, { "cve": "CVE-2023-3090", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen im Linux-Kernel. Die Fehler bestehen aufgrund eines Heap-Out-of-Bounds-Write im ipvlan-Netzwerktreiber, eines Time-of-Check-to-Time-of-Use-Problems und eines Use-after-free-Problems im io_uring-Subsystem und eines Use-after-free-Problems im netfilter-Subsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3090" }, { "cve": "CVE-2023-3389", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen im Linux-Kernel. Die Fehler bestehen aufgrund eines Heap-Out-of-Bounds-Write im ipvlan-Netzwerktreiber, eines Time-of-Check-to-Time-of-Use-Problems und eines Use-after-free-Problems im io_uring-Subsystem und eines Use-after-free-Problems im netfilter-Subsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3389" }, { "cve": "CVE-2023-3390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen im Linux-Kernel. Die Fehler bestehen aufgrund eines Heap-Out-of-Bounds-Write im ipvlan-Netzwerktreiber, eines Time-of-Check-to-Time-of-Use-Problems und eines Use-after-free-Problems im io_uring-Subsystem und eines Use-after-free-Problems im netfilter-Subsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3390" }, { "cve": "CVE-2023-3357", "notes": [ { "category": "description", "text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer NULL-Zeiger-Dereferenzen und eines Use-after-free-Problems in den Komponenten AMD Sensor Fusion Hub-Treiber, brcm_nvram_parse, Integrated Sensor Hub (ISH)-Treiber und dem MCTP-Protokoll. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3357" }, { "cve": "CVE-2023-3358", "notes": [ { "category": "description", "text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer NULL-Zeiger-Dereferenzen und eines Use-after-free-Problems in den Komponenten AMD Sensor Fusion Hub-Treiber, brcm_nvram_parse, Integrated Sensor Hub (ISH)-Treiber und dem MCTP-Protokoll. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3358" }, { "cve": "CVE-2023-3359", "notes": [ { "category": "description", "text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer NULL-Zeiger-Dereferenzen und eines Use-after-free-Problems in den Komponenten AMD Sensor Fusion Hub-Treiber, brcm_nvram_parse, Integrated Sensor Hub (ISH)-Treiber und dem MCTP-Protokoll. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3359" }, { "cve": "CVE-2023-3439", "notes": [ { "category": "description", "text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer NULL-Zeiger-Dereferenzen und eines Use-after-free-Problems in den Komponenten AMD Sensor Fusion Hub-Treiber, brcm_nvram_parse, Integrated Sensor Hub (ISH)-Treiber und dem MCTP-Protokoll. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3439" } ] }
wid-sec-w-2023-1595
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um seine Privilegien zu erh\u00f6hen und einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1595 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1595.json" }, { "category": "self", "summary": "WID-SEC-2023-1595 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1595" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12150 vom 2024-02-13", "url": "https://linux.oracle.com/errata/ELSA-2024-12150.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1278 vom 2024-03-12", "url": "https://access.redhat.com/errata/RHSA-2024:1278" }, { "category": "external", "summary": "Debian Security Advisory DLA-3710 vom 2024-01-11", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1250 vom 2024-03-12", "url": "https://access.redhat.com/errata/RHSA-2024:1250" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1253 vom 2024-03-12", "url": "https://access.redhat.com/errata/RHSA-2024:1253" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-295v-9m5g-79q9" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-3gcx-wjr4-jv32" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-8r8v-fx37-wpw7" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-9787-f568-7rr2" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-hg6h-cj3j-wp77" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-rmg8-h2h6-5wwf" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-vj8j-762w-6jmv" }, { "category": "external", "summary": "Github Advisory Database vom 2023-06-28", "url": "https://github.com/advisories/GHSA-wh7q-2hgq-2xj7" }, { "category": "external", "summary": "Debian Security Advisory DSA-5448 vom 2023-07-06", "url": "https://www.debian.org/security/2023/dsa-5448" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2804-1 vom 2023-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015467.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2803-1 vom 2023-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2805-1 vom 2023-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2809-1 vom 2023-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015470.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2808-1 vom 2023-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015471.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2810-1 vom 2023-07-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015472.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2820-1 vom 2023-07-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2831-1 vom 2023-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2834-1 vom 2023-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6231-1 vom 2023-07-14", "url": "https://ubuntu.com/security/notices/USN-6231-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2830-1 vom 2023-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2822-1 vom 2023-07-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2859-1 vom 2023-07-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2871-1 vom 2023-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015524.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2892-1 vom 2023-07-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2023-024 vom 2023-07-20", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2023-024.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6250-1 vom 2023-07-26", "url": "https://ubuntu.com/security/notices/USN-6250-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6246-1 vom 2023-07-26", "url": "https://ubuntu.com/security/notices/USN-6246-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6248-1 vom 2023-07-26", "url": "https://ubuntu.com/security/notices/USN-6248-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6249-1 vom 2023-07-26", "url": "https://ubuntu.com/security/notices/USN-6249-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6260-1 vom 2023-07-27", "url": "https://ubuntu.com/security/notices/USN-6260-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-3508 vom 2023-07-27", "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5461 vom 2023-07-30", "url": "https://lists.debian.org/debian-security-announce/2023/msg00153.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6261-1 vom 2023-07-28", "url": "https://ubuntu.com/security/notices/USN-6261-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12688 vom 2023-08-01", "url": "https://linux.oracle.com/errata/ELSA-2023-12688.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4378 vom 2023-08-01", "url": "https://access.redhat.com/errata/RHSA-2023:4378" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4380 vom 2023-08-01", "url": "https://access.redhat.com/errata/RHSA-2023:4380" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4377 vom 2023-08-01", "url": "https://access.redhat.com/errata/RHSA-2023:4377" }, { "category": "external", "summary": "Debian Security Advisory DLA-3512 vom 2023-08-02", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3171-1 vom 2023-08-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3172-1 vom 2023-08-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-4377 vom 2023-08-03", "url": "https://linux.oracle.com/errata/ELSA-2023-4377.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3180-1 vom 2023-08-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015780.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3182-1 vom 2023-08-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015778.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4515 vom 2023-08-08", "url": "https://access.redhat.com/errata/RHSA-2023:4515" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4516 vom 2023-08-08", "url": "https://access.redhat.com/errata/RHSA-2023:4516" }, { "category": "external", "summary": "ORACLE OVMSA-2023-0018 vom 2023-08-08", "url": "https://oss.oracle.com/pipermail/el-errata/2023-August/014236.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6285-1 vom 2023-08-11", "url": "https://ubuntu.com/security/notices/USN-6285-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3302-1 vom 2023-08-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015894.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3318-1 vom 2023-08-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015905.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5480 vom 2023-08-18", "url": "https://lists.debian.org/debian-security-announce/2023/msg00172.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3391-1 vom 2023-08-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015999.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3390-1 vom 2023-08-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-141 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-141.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-140 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-140.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-139 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-139.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-138 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-138.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-137 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-137.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-136 vom 2023-08-23", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-136.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-135 vom 2023-08-24", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-135.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-134 vom 2023-08-24", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-134.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3421-1 vom 2023-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/016021.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4817 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4817" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4789 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4789" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4801 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4801" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4814 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4814" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4815 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4815" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4828 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4828" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4829 vom 2023-08-29", "url": "https://access.redhat.com/errata/RHSA-2023:4829" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4888 vom 2023-08-31", "url": "https://access.redhat.com/errata/RHSA-2023:4888" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4967 vom 2023-09-05", "url": "https://access.redhat.com/errata/RHSA-2023:4967" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4961 vom 2023-09-05", "url": "https://access.redhat.com/errata/RHSA-2023:4961" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4962 vom 2023-09-05", "url": "https://access.redhat.com/errata/RHSA-2023:4962" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2023-039 vom 2023-09-07", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2023-039.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3571-1 vom 2023-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016129.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3566-1 vom 2023-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3576-1 vom 2023-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3582-1 vom 2023-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3585-1 vom 2023-09-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016134.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5069 vom 2023-09-12", "url": "https://access.redhat.com/errata/RHSA-2023:5069" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5093 vom 2023-09-12", "url": "https://access.redhat.com/errata/RHSA-2023:5093" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6583 vom 2024-01-18", "url": "https://oss.oracle.com/pipermail/el-errata/2024-January/015150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3592-1 vom 2023-09-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3594-1 vom 2023-09-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3595-1 vom 2023-09-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3596-1 vom 2023-09-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3603-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3607-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3623-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3620-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3621-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016160.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5069 vom 2023-09-15", "url": "http://linux.oracle.com/errata/ELSA-2023-5069.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3612-1 vom 2023-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3627-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3628-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3657-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3631-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3630-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3629-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3648-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3647-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3644-1 vom 2023-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5221 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5221" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5238 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5238" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3671-1 vom 2023-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016218.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3675-1 vom 2023-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016217.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5244 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5244" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5255 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5255" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3668-1 vom 2023-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016219.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5235 vom 2023-09-19", "url": "https://access.redhat.com/errata/RHSA-2023:5235" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3676-1 vom 2023-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016216.html" }, { "category": "external", "summary": "IBM Security Bulletin 7034265 vom 2023-09-20", "url": "https://www.ibm.com/support/pages/node/7034265" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5244 vom 2023-09-21", "url": "https://linux.oracle.com/errata/ELSA-2023-5244.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1827 vom 2023-09-26", "url": "https://alas.aws.amazon.com/ALAS-2023-1827.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12839 vom 2023-09-29", "url": "http://linux.oracle.com/errata/ELSA-2023-12839.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1268 vom 2024-03-12", "url": "https://access.redhat.com/errata/RHSA-2024:1268" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1269 vom 2024-03-12", "url": "https://access.redhat.com/errata/RHSA-2024:1269" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5627 vom 2023-10-11", "url": "https://access.redhat.com/errata/RHSA-2023:5627" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0098-1 vom 2023-10-10", "url": "https://ubuntu.com/security/notices/LSN-0098-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5548 vom 2023-10-11", "url": "https://access.redhat.com/errata/RHSA-2023:5548" }, { "category": "external", "summary": "Debian Security Advisory DLA-3623 vom 2023-10-19", "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4175-1 vom 2023-10-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1306 vom 2024-03-13", "url": "https://access.redhat.com/errata/RHSA-2024:1306" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4201-1 vom 2023-10-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4219-1 vom 2023-10-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4239-1 vom 2023-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4245-1 vom 2023-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016913.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4267-1 vom 2023-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4285-1 vom 2023-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4279-1 vom 2023-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016938.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4326-1 vom 2023-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4308-1 vom 2023-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6583 vom 2023-11-07", "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-016 vom 2024-07-02", "url": "https://alas.aws.amazon.com/AL2023/ALASLIVEPATCH-2023-016.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-018 vom 2024-07-02", "url": "https://alas.aws.amazon.com/AL2023/ALASLIVEPATCH-2023-018.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-019 vom 2024-07-02", "url": "https://alas.aws.amazon.com/AL2023/ALASLIVEPATCH-2023-019.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-017 vom 2024-07-02", "url": "https://alas.aws.amazon.com/AL2023/ALASLIVEPATCH-2023-017.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-239 vom 2024-07-18", "url": "https://www.dell.com/support/kbdoc/de-de/000227051/dsa-2024-239-security-update-dell-ecs-3-8-1-1-for-multiple-security-vulnerabilities" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-07-18T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:53:45.731+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1595", "initial_release_date": "2023-06-28T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-28T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-07-05T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-07-10T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-11T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-12T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-13T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-16T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-18T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-19T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-20T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-07-25T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-07-27T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Ubuntu und Debian aufgenommen" }, { "date": "2023-07-30T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Debian und Ubuntu aufgenommen" }, { "date": "2023-07-31T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-08-01T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-02T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-08-03T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2023-08-07T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-08T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2023-08-13T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-08-15T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-08-20T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-08-23T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2023-08-24T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-08-29T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-30T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-05T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-06T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-09-10T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-09-11T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-09-12T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-13T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-09-14T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-09-17T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2023-09-18T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-09-19T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2023-09-20T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-09-25T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-10-01T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-10-10T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2023-10-19T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-10-24T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-10-25T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-10-26T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-10-30T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-10-31T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-11-07T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-11T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-01-18T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-02-12T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-03-11T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-12T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-13T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-07-01T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-07-18T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "56" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.8.1.1", "product": { "name": "Dell ECS \u003c3.8.1.1", "product_id": "T036366" } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cplus 10.1.15.2", "product": { "name": "IBM Spectrum Protect \u003cplus 10.1.15.2", "product_id": "T029988" } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T006656", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "category": "product_name", "name": "Oracle VM", "product": { "name": "Oracle VM", "product_id": "T011119", "product_identification_helper": { "cpe": "cpe:/a:oracle:vm:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1295", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen im Linux-Kernel. Die Fehler bestehen aufgrund eines Heap-Out-of-Bounds-Write im ipvlan-Netzwerktreiber, eines Time-of-Check-to-Time-of-Use-Problems und eines Use-after-free-Problems im io_uring-Subsystem und eines Use-after-free-Problems im netfilter-Subsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-1295" }, { "cve": "CVE-2023-3090", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen im Linux-Kernel. Die Fehler bestehen aufgrund eines Heap-Out-of-Bounds-Write im ipvlan-Netzwerktreiber, eines Time-of-Check-to-Time-of-Use-Problems und eines Use-after-free-Problems im io_uring-Subsystem und eines Use-after-free-Problems im netfilter-Subsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3090" }, { "cve": "CVE-2023-3389", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen im Linux-Kernel. Die Fehler bestehen aufgrund eines Heap-Out-of-Bounds-Write im ipvlan-Netzwerktreiber, eines Time-of-Check-to-Time-of-Use-Problems und eines Use-after-free-Problems im io_uring-Subsystem und eines Use-after-free-Problems im netfilter-Subsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3389" }, { "cve": "CVE-2023-3390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen im Linux-Kernel. Die Fehler bestehen aufgrund eines Heap-Out-of-Bounds-Write im ipvlan-Netzwerktreiber, eines Time-of-Check-to-Time-of-Use-Problems und eines Use-after-free-Problems im io_uring-Subsystem und eines Use-after-free-Problems im netfilter-Subsystem. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3390" }, { "cve": "CVE-2023-3357", "notes": [ { "category": "description", "text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer NULL-Zeiger-Dereferenzen und eines Use-after-free-Problems in den Komponenten AMD Sensor Fusion Hub-Treiber, brcm_nvram_parse, Integrated Sensor Hub (ISH)-Treiber und dem MCTP-Protokoll. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3357" }, { "cve": "CVE-2023-3358", "notes": [ { "category": "description", "text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer NULL-Zeiger-Dereferenzen und eines Use-after-free-Problems in den Komponenten AMD Sensor Fusion Hub-Treiber, brcm_nvram_parse, Integrated Sensor Hub (ISH)-Treiber und dem MCTP-Protokoll. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3358" }, { "cve": "CVE-2023-3359", "notes": [ { "category": "description", "text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer NULL-Zeiger-Dereferenzen und eines Use-after-free-Problems in den Komponenten AMD Sensor Fusion Hub-Treiber, brcm_nvram_parse, Integrated Sensor Hub (ISH)-Treiber und dem MCTP-Protokoll. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3359" }, { "cve": "CVE-2023-3439", "notes": [ { "category": "description", "text": "Im Linux Kernel existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer NULL-Zeiger-Dereferenzen und eines Use-after-free-Problems in den Komponenten AMD Sensor Fusion Hub-Treiber, brcm_nvram_parse, Integrated Sensor Hub (ISH)-Treiber und dem MCTP-Protokoll. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T011119", "2951", "T002207", "T006656", "67646", "T000126", "T036366", "T029988", "398363", "T004914" ] }, "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2023-3439" } ] }
gsd-2023-3439
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2023-3439", "id": "GSD-2023-3439" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-3439" ], "details": "A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device\u0027s relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev-\u003eaddrs object, potentially leading to a denial of service.", "id": "GSD-2023-3439", "modified": "2023-12-13T01:20:54.733033Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "patrick@puiterwijk.org", "ID": "CVE-2023-3439", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Linux Kernel (mctp)", "version": { "version_data": [ { "version_value": "Fixed in kernel 5.18-rc5" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device\u0027s relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev-\u003eaddrs object, potentially leading to a denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2217915", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217915" }, { "name": "https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269" }, { "name": "[oss-security] 20230702 CVE-2023-3439: Linux MCTP use-after-free in mctp_sendmsg", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2023/07/02/1" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.18", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "patrick@puiterwijk.org", "ID": "CVE-2023-3439" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device\u0027s relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev-\u003eaddrs object, potentially leading to a denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269", "refsource": "MISC", "tags": [ "Patch" ], "url": "https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2217915", "refsource": "MISC", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217915" }, { "name": "[oss-security] 20230702 CVE-2023-3439: Linux MCTP use-after-free in mctp_sendmsg", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/07/02/1" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6 } }, "lastModifiedDate": "2023-07-06T21:39Z", "publishedDate": "2023-06-28T21:15Z" } } }
ghsa-wh7q-2hgq-2xj7
Vulnerability from github
A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device's relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev->addrs object, potentially leading to a denial of service.
{ "affected": [], "aliases": [ "CVE-2023-3439" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-06-28T21:15:10Z", "severity": "MODERATE" }, "details": "A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device\u0027s relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev-\u003eaddrs object, potentially leading to a denial of service.", "id": "GHSA-wh7q-2hgq-2xj7", "modified": "2024-04-04T05:16:29Z", "published": "2023-06-28T21:30:30Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3439" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217915" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/07/02/1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
cnvd-2024-30381
Vulnerability from cnvd
Title: Linux kernel拒绝服务漏洞(CNVD-2024-30381)
Description:
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
Linux kernel存在拒绝服务漏洞,攻击者可利用该漏洞导致mdev->addrs对象释放后重用和拒绝服务。
Severity: 低
Patch Name: Linux kernel拒绝服务漏洞(CNVD-2024-30381)的补丁
Patch Description:
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
Linux kernel存在拒绝服务漏洞,攻击者可利用该漏洞导致mdev->addrs对象释放后重用和拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269
Reference: https://nvd.nist.gov/vuln/detail/CVE-2023-3439
Name | ['Linux Linux kernel <5.18', 'Linux Linux kernel 5.18 rc1', 'Linux Linux kernel 5.18 rc2', 'Linux Linux kernel 5.18 rc3', 'Linux Linux kernel 5.18 rc4'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2023-3439", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2023-3439" } }, "description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4mdev-\u003eaddrs\u5bf9\u8c61\u91ca\u653e\u540e\u91cd\u7528\u548c\u62d2\u7edd\u670d\u52a1\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2024-30381", "openTime": "2024-07-04", "patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4mdev-\u003eaddrs\u5bf9\u8c61\u91ca\u653e\u540e\u91cd\u7528\u548c\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Linux kernel\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2024-30381\uff09\u7684\u8865\u4e01", "products": { "product": [ "Linux Linux kernel \u003c5.18", "Linux Linux kernel 5.18 rc1", "Linux Linux kernel 5.18 rc2", "Linux Linux kernel 5.18 rc3", "Linux Linux kernel 5.18 rc4" ] }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2023-3439", "serverity": "\u4f4e", "submitTime": "2023-06-30", "title": "Linux kernel\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2024-30381\uff09" }
fkie_cve-2023-3439
Vulnerability from fkie_nvd
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
patrick@puiterwijk.org | http://www.openwall.com/lists/oss-security/2023/07/02/1 | Mailing List, Patch, Third Party Advisory | |
patrick@puiterwijk.org | https://bugzilla.redhat.com/show_bug.cgi?id=2217915 | Issue Tracking, Patch, Third Party Advisory | |
patrick@puiterwijk.org | https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2023/07/02/1 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2217915 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269 | Patch |
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | 5.18 | |
linux | linux_kernel | 5.18 | |
linux | linux_kernel | 5.18 | |
linux | linux_kernel | 5.18 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF25759E-C274-48B4-9CBD-BDED1C6EF754", "versionEndIncluding": "5.17", "versionStartIncluding": "5.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "7AB06DDF-3C2B-416D-B448-E990D8FF67A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", "matchCriteriaId": "EAE6C6C5-4D21-4C04-897C-70CBBB3D7B91", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", "matchCriteriaId": "DA5F085D-52F3-4EE2-8353-455D1A6FE073", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device\u0027s relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev-\u003eaddrs object, potentially leading to a denial of service." } ], "id": "CVE-2023-3439", "lastModified": "2025-06-25T20:53:15.413", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-06-28T21:15:10.517", "references": [ { "source": "patrick@puiterwijk.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/07/02/1" }, { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217915" }, { "source": "patrick@puiterwijk.org", "tags": [ "Patch" ], "url": "https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/07/02/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217915" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269" } ], "sourceIdentifier": "patrick@puiterwijk.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "patrick@puiterwijk.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.