Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-22386 (GCVE-0-2024-22386)
Vulnerability from cvelistv5
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
▼ | URL | Tags | |
---|---|---|---|
security@openanolis.org | https://bugzilla.openanolis.cn/show_bug.cgi?id=8147 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.openanolis.cn/show_bug.cgi?id=8147 | Permissions Required |
Vendor | Product | Version | ||
---|---|---|---|---|
Linux | Linux kernel |
Version: v4.11-rc1 < v6.6-rc1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-22386", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-28T17:06:57.037858Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-28T17:07:05.173Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.688Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=8147" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://kernel.org/", "defaultStatus": "unaffected", "modules": [ "drm", "exynos" ], "packageName": "kernel", "platforms": [ "Linux", "x86", "ARM" ], "product": "Linux kernel", "programFiles": [ "https://gitee.com/anolis/cloud-kernel/blob/devel-5.10/drivers/gpu/drm/exynos/exynos_drm_crtc.c" ], "repo": "https://gitee.com/anolis/cloud-kernel.git", "vendor": "Linux", "versions": [ { "lessThan": "v6.6-rc1", "status": "affected", "version": "v4.11-rc1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "\u767d\u5bb6\u9a79 \u003cbaijiaju@buaa.edu.cn\u003e" }, { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "\u97e9\u6842\u680b \u003changuidong@buaa.edu.cn\u003e" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA race condition was found in the Linux kernel\u0027s drm/exynos device driver in\u0026nbsp;exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003edenial of service issue\u003c/span\u003e.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e\u003c/p\u003e" } ], "value": "A race condition was found in the Linux kernel\u0027s drm/exynos device driver in\u00a0exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-26", "descriptions": [ { "lang": "en", "value": "CAPEC-26 Leveraging Race Conditions" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-05T07:21:20.819Z", "orgId": "cb8f1db9-b4b1-487b-a760-f65c4f368d8e", "shortName": "Anolis" }, "references": [ { "url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=8147" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=2e63972a2de14482d0eae1a03a73e379f1c3f44c\"\u003ehttps://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=2e63972a2de14482d0eae...\u003c/a\u003e\u003cbr\u003e" } ], "value": " https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=2e63972a2de14482d0eae... https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/ \n" } ], "source": { "discovery": "UNKNOWN" }, "title": "Race condition vulnerability in Linux kernel drm/exynos exynos_drm_crtc_atomic_disable", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cb8f1db9-b4b1-487b-a760-f65c4f368d8e", "assignerShortName": "Anolis", "cveId": "CVE-2024-22386", "datePublished": "2024-02-05T07:21:20.819Z", "dateReserved": "2024-01-15T09:44:45.540Z", "dateUpdated": "2024-08-01T22:43:34.688Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-22386\",\"sourceIdentifier\":\"security@openanolis.org\",\"published\":\"2024-02-05T08:15:43.830\",\"lastModified\":\"2024-11-21T08:56:10.247\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A race condition was found in the Linux kernel\u0027s drm/exynos device driver in\u00a0exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una condici\u00f3n de ejecuci\u00f3n en el controlador de dispositivo drm/exynos del kernel de Linux en la funci\u00f3n exynos_drm_crtc_atomic_disable(). Esto puede provocar un problema de desreferencia de puntero nulo, lo que posiblemente provoque un p\u00e1nico en el kernel o un problema de denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@openanolis.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@openanolis.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"},{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.10.17\",\"matchCriteriaId\":\"7AFC89B2-EDF9-4448-A530-D38CD2BD7580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndIncluding\":\"6.5.13\",\"matchCriteriaId\":\"52DA8805-6EDC-4D72-BCC7-96ADE999D73C\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.openanolis.cn/show_bug.cgi?id=8147\",\"source\":\"security@openanolis.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://bugzilla.openanolis.cn/show_bug.cgi?id=8147\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://bugzilla.openanolis.cn/show_bug.cgi?id=8147\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T22:43:34.688Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-22386\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-28T17:06:57.037858Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-28T17:07:02.208Z\"}}], \"cna\": {\"title\": \"Race condition vulnerability in Linux kernel drm/exynos exynos_drm_crtc_atomic_disable\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"\\u767d\\u5bb6\\u9a79 \u003cbaijiaju@buaa.edu.cn\u003e\"}, {\"lang\": \"en\", \"type\": \"reporter\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"\\u97e9\\u6842\\u680b \u003changuidong@buaa.edu.cn\u003e\"}], \"impacts\": [{\"capecId\": \"CAPEC-26\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-26 Leveraging Race Conditions\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://gitee.com/anolis/cloud-kernel.git\", \"vendor\": \"Linux\", \"modules\": [\"drm\", \"exynos\"], \"product\": \"Linux kernel\", \"versions\": [{\"status\": \"affected\", \"version\": \"v4.11-rc1\", \"lessThan\": \"v6.6-rc1\", \"versionType\": \"custom\"}], \"platforms\": [\"Linux\", \"x86\", \"ARM\"], \"packageName\": \"kernel\", \"programFiles\": [\"https://gitee.com/anolis/cloud-kernel/blob/devel-5.10/drivers/gpu/drm/exynos/exynos_drm_crtc.c\"], \"collectionURL\": \"https://kernel.org/\", \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \" https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=2e63972a2de14482d0eae... https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/ \\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=2e63972a2de14482d0eae1a03a73e379f1c3f44c\\\"\u003ehttps://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=2e63972a2de14482d0eae...\u003c/a\u003e\u003cbr\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://bugzilla.openanolis.cn/show_bug.cgi?id=8147\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A race condition was found in the Linux kernel\u0027s drm/exynos device driver in\\u00a0exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003e\u003cspan style=\\\"background-color: var(--wht);\\\"\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eA race condition was found in the Linux kernel\u0027s drm/exynos device driver in\u0026nbsp;exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or \u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003edenial of service issue\u003c/span\u003e.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-362\", \"description\": \"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"cb8f1db9-b4b1-487b-a760-f65c4f368d8e\", \"shortName\": \"Anolis\", \"dateUpdated\": \"2024-02-05T07:21:20.819Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-22386\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T22:43:34.688Z\", \"dateReserved\": \"2024-01-15T09:44:45.540Z\", \"assignerOrgId\": \"cb8f1db9-b4b1-487b-a760-f65c4f368d8e\", \"datePublished\": \"2024-02-05T07:21:20.819Z\", \"assignerShortName\": \"Anolis\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
fkie_cve-2024-22386
Vulnerability from fkie_nvd
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
security@openanolis.org | https://bugzilla.openanolis.cn/show_bug.cgi?id=8147 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.openanolis.cn/show_bug.cgi?id=8147 | Permissions Required |
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AFC89B2-EDF9-4448-A530-D38CD2BD7580", "versionEndIncluding": "4.10.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "52DA8805-6EDC-4D72-BCC7-96ADE999D73C", "versionEndIncluding": "6.5.13", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A race condition was found in the Linux kernel\u0027s drm/exynos device driver in\u00a0exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\n\n\n" }, { "lang": "es", "value": "Se encontr\u00f3 una condici\u00f3n de ejecuci\u00f3n en el controlador de dispositivo drm/exynos del kernel de Linux en la funci\u00f3n exynos_drm_crtc_atomic_disable(). Esto puede provocar un problema de desreferencia de puntero nulo, lo que posiblemente provoque un p\u00e1nico en el kernel o un problema de denegaci\u00f3n de servicio." } ], "id": "CVE-2024-22386", "lastModified": "2024-11-21T08:56:10.247", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 4.0, "source": "security@openanolis.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-05T08:15:43.830", "references": [ { "source": "security@openanolis.org", "tags": [ "Permissions Required" ], "url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=8147" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=8147" } ], "sourceIdentifier": "security@openanolis.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "security@openanolis.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-362" }, { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cnvd-2024-17902
Vulnerability from cnvd
Title: Linux Kernel存在拒绝服务漏洞(CNVD-2024-17902)
Description:
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
Linux Kernel存在拒绝服务漏洞,攻击者可利用该漏洞进行拒绝服务攻击。
Severity: 中
Patch Name: Linux Kernel存在拒绝服务漏洞(CNVD-2024-17902)的补丁
Patch Description:
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
Linux Kernel存在拒绝服务漏洞,攻击者可利用该漏洞进行拒绝服务攻击。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=2e63972a2de14482d0eae1a03a73e379f1c3f44c
Name | Linux Linux kernel |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2024-22386" } }, "description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux Kernel\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002", "discovererName": "hanguidong", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=2e63972a2de14482d0eae1a03a73e379f1c3f44c", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2024-17902", "openTime": "2024-04-27", "patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Linux Kernel\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2024-17902\uff09\u7684\u8865\u4e01", "products": { "product": "Linux Linux kernel" }, "serverity": "\u4e2d", "submitTime": "2024-03-13", "title": "Linux Kernel\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2024-17902\uff09" }
WID-SEC-W-2024-0296
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0296 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0296.json" }, { "category": "self", "summary": "WID-SEC-2024-0296 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0296" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24855" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24857" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24858" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24859" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24860" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24861" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24864" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22386" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23196" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0476-1 vom 2024-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0515-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0514-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0516-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6688-1 vom 2024-03-11", "url": "https://ubuntu.com/security/notices/USN-6688-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6700-1 vom 2024-03-19", "url": "https://ubuntu.com/security/notices/USN-6700-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6701-1 vom 2024-03-19", "url": "https://ubuntu.com/security/notices/USN-6701-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6699-1 vom 2024-03-19", "url": "https://ubuntu.com/security/notices/USN-6699-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6702-1 vom 2024-03-19", "url": "https://ubuntu.com/security/notices/USN-6702-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6704-1 vom 2024-03-20", "url": "https://ubuntu.com/security/notices/USN-6704-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6705-1 vom 2024-03-20", "url": "https://ubuntu.com/security/notices/USN-6705-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6701-2 vom 2024-03-20", "url": "https://ubuntu.com/security/notices/USN-6701-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6702-2 vom 2024-03-20", "url": "https://ubuntu.com/security/notices/USN-6702-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6704-2 vom 2024-03-21", "url": "https://ubuntu.com/security/notices/USN-6704-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6700-2 vom 2024-03-21", "url": "https://ubuntu.com/security/notices/USN-6700-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6716-1 vom 2024-03-26", "url": "https://ubuntu.com/security/notices/USN-6716-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6704-3 vom 2024-03-26", "url": "https://ubuntu.com/security/notices/USN-6704-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6701-3 vom 2024-03-26", "url": "https://ubuntu.com/security/notices/USN-6701-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6704-4 vom 2024-03-28", "url": "https://ubuntu.com/security/notices/USN-6704-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6725-1 vom 2024-04-09", "url": "https://ubuntu.com/security/notices/USN-6725-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6701-4 vom 2024-04-09", "url": "https://ubuntu.com/security/notices/USN-6701-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6725-2 vom 2024-04-16", "url": "https://ubuntu.com/security/notices/USN-6725-2" }, { "category": "external", "summary": "Debian Security Advisory DSA-5681 vom 2024-05-06", "url": "https://lists.debian.org/debian-security-announce/2024/msg00090.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6765-1 vom 2024-05-07", "url": "https://ubuntu.com/security/notices/USN-6765-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1646-1 vom 2024-05-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018526.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1643-1 vom 2024-05-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018529.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1648-1 vom 2024-05-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018524.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1648-2 vom 2024-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018572.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1870-1 vom 2024-05-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018634.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6819-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6818-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6817-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6817-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6816-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6816-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-2 vom 2024-06-10", "url": "https://ubuntu.com/security/notices/USN-6818-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-2 vom 2024-06-12", "url": "https://ubuntu.com/security/notices/USN-6819-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6817-2 vom 2024-06-11", "url": "https://ubuntu.com/security/notices/USN-6817-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-3 vom 2024-06-12", "url": "https://ubuntu.com/security/notices/USN-6819-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6817-3 vom 2024-06-14", "url": "https://ubuntu.com/security/notices/USN-6817-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-3 vom 2024-06-14", "url": "https://ubuntu.com/security/notices/USN-6818-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-4 vom 2024-06-19", "url": "https://ubuntu.com/security/notices/USN-6818-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2135-1 vom 2024-06-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018783.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3841 vom 2024-06-25", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3842 vom 2024-06-25", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-4 vom 2024-06-26", "url": "https://ubuntu.com/security/notices/USN-6819-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-3840 vom 2024-06-27", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-022 vom 2024-07-03", "url": "https://www.dell.com/support/kbdoc/de-de/000226633/dsa-2024-022-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6865-1 vom 2024-07-04", "url": "https://ubuntu.com/security/notices/USN-6865-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6866-1 vom 2024-07-04", "url": "https://ubuntu.com/security/notices/USN-6866-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6866-2 vom 2024-07-04", "url": "https://ubuntu.com/security/notices/USN-6866-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6878-1 vom 2024-07-04", "url": "https://ubuntu.com/security/notices/USN-6878-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6865-2 vom 2024-07-04", "url": "https://ubuntu.com/security/notices/USN-6865-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6866-3 vom 2024-07-10", "url": "https://ubuntu.com/security/notices/USN-6866-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6893-1 vom 2024-07-11", "url": "https://ubuntu.com/security/notices/USN-6893-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6896-1 vom 2024-07-12", "url": "https://ubuntu.com/security/notices/USN-6896-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6895-1 vom 2024-07-12", "url": "https://ubuntu.com/security/notices/USN-6895-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6898-1 vom 2024-07-15", "url": "https://ubuntu.com/security/notices/USN-6898-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6895-2 vom 2024-07-16", "url": "https://ubuntu.com/security/notices/USN-6895-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6893-2 vom 2024-07-16", "url": "https://ubuntu.com/security/notices/USN-6893-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6896-2 vom 2024-07-16", "url": "https://ubuntu.com/security/notices/USN-6896-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6898-2 vom 2024-07-17", "url": "https://ubuntu.com/security/notices/USN-6898-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6896-3 vom 2024-07-17", "url": "https://ubuntu.com/security/notices/USN-6896-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6900-1 vom 2024-07-17", "url": "https://ubuntu.com/security/notices/USN-6900-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6896-4 vom 2024-07-19", "url": "https://ubuntu.com/security/notices/USN-6896-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6898-3 vom 2024-07-19", "url": "https://ubuntu.com/security/notices/USN-6898-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6895-3 vom 2024-07-19", "url": "https://ubuntu.com/security/notices/USN-6895-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6893-3 vom 2024-07-23", "url": "https://ubuntu.com/security/notices/USN-6893-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6896-5 vom 2024-07-23", "url": "https://ubuntu.com/security/notices/USN-6896-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6898-4 vom 2024-07-23", "url": "https://ubuntu.com/security/notices/USN-6898-4" }, { "category": "external", "summary": "SEM 2024.2.1 release notes vom 2024-07-23", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2024-2-1_release_notes.htm" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6918-1 vom 2024-07-26", "url": "https://ubuntu.com/security/notices/USN-6918-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6919-1 vom 2024-07-26", "url": "https://ubuntu.com/security/notices/USN-6919-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6917-1 vom 2024-07-26", "url": "https://ubuntu.com/security/notices/USN-6917-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6922-1 vom 2024-07-29", "url": "https://ubuntu.com/security/notices/USN-6922-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6926-1 vom 2024-07-29", "url": "https://ubuntu.com/security/notices/USN-6926-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6927-1 vom 2024-07-30", "url": "https://ubuntu.com/security/notices/USN-6927-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6938-1 vom 2024-07-31", "url": "https://ubuntu.com/security/notices/USN-6938-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6926-2 vom 2024-08-01", "url": "https://ubuntu.com/security/notices/USN-6926-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6922-2 vom 2024-08-01", "url": "https://ubuntu.com/security/notices/USN-6922-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6895-4 vom 2024-08-05", "url": "https://ubuntu.com/security/notices/USN-6895-4" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06", "url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6926-3 vom 2024-08-09", "url": "https://ubuntu.com/security/notices/USN-6926-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6972-1 vom 2024-08-21", "url": "https://ubuntu.com/security/notices/USN-6972-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6973-1 vom 2024-08-22", "url": "https://ubuntu.com/security/notices/USN-6973-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6976-1 vom 2024-08-22", "url": "https://ubuntu.com/security/notices/USN-6976-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6972-2 vom 2024-08-22", "url": "https://ubuntu.com/security/notices/USN-6972-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6973-2 vom 2024-08-23", "url": "https://ubuntu.com/security/notices/USN-6973-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6973-2 vom 2024-08-23", "url": "https://ubuntu.com/security/notices/USN-6972-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6973-3 vom 2024-08-26", "url": "https://ubuntu.com/security/notices/USN-6973-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6972-4 vom 2024-08-29", "url": "https://ubuntu.com/security/notices/USN-6972-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6973-4 vom 2024-09-02", "url": "https://ubuntu.com/security/notices/USN-6973-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7006-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7006-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7019-1 vom 2024-09-18", "url": "https://ubuntu.com/security/notices/USN-7019-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8856" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8870" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8856.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8870" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "category": "external", "summary": "IBM Security Bulletin 7179045 vom 2024-12-16", "url": "https://www.ibm.com/support/pages/node/7179045" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13", "url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-01-13T23:00:00.000+00:00", "generator": { "date": "2025-01-14T13:52:42.145+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-0296", "initial_release_date": "2024-02-04T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-04T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-02-14T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-02-15T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-03-11T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-18T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-19T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-20T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-21T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-25T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-01T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-09T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-16T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-14T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-30T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-09T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-10T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-11T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-12T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-16T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-18T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-23T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-25T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-06-26T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-27T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-07-02T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-07-03T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-04T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-10T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-11T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-14T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-15T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-16T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-17T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-18T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-23T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates aufgenommen" }, { "date": "2024-07-28T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-29T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-30T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-31T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-01T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-04T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-05T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-08-11T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-19T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-21T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-22T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-25T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-26T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-28T22:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-02T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "62" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T024663", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:-" } } }, { "category": "product_version_range", "name": "\u003c19.11", "product": { "name": "Dell NetWorker \u003c19.11", "product_id": "T035785" } }, { "category": "product_version", "name": "19.11", "product": { "name": "Dell NetWorker 19.11", "product_id": "T035785-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.11" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.1.9.5", "product": { "name": "IBM Storage Scale \u003c6.1.9.5", "product_id": "T039851" } }, { "category": "product_version", "name": "6.1.9.5", "product": { "name": "IBM Storage Scale 6.1.9.5", "product_id": "T039851-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_scale:6.1.9.5" } } }, { "category": "product_version_range", "name": "\u003c6.2.2.0", "product": { "name": "IBM Storage Scale \u003c6.2.2.0", "product_id": "T039852" } }, { "category": "product_version", "name": "6.2.2.0", "product": { "name": "IBM Storage Scale 6.2.2.0", "product_id": "T039852-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_scale:6.2.2.0" } } } ], "category": "product_name", "name": "Storage Scale" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T032517", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2024.2", "product": { "name": "SolarWinds Security Event Manager \u003c2024.2", "product_id": "T034244" } }, { "category": "product_version", "name": "2024.2", "product": { "name": "SolarWinds Security Event Manager 2024.2", "product_id": "T034244-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:security_event_manager:2024.2" } } } ], "category": "product_name", "name": "Security Event Manager" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-22386", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-22386" }, { "cve": "CVE-2024-23196", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-23196" }, { "cve": "CVE-2024-24855", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24855" }, { "cve": "CVE-2024-24857", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24857" }, { "cve": "CVE-2024-24858", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24858" }, { "cve": "CVE-2024-24859", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24859" }, { "cve": "CVE-2024-24860", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24860" }, { "cve": "CVE-2024-24861", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24861" }, { "cve": "CVE-2024-24864", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24864" } ] }
wid-sec-w-2024-0296
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0296 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0296.json" }, { "category": "self", "summary": "WID-SEC-2024-0296 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0296" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24855" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24857" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24858" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24859" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24860" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24861" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24864" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22386" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-02-04", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23196" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0476-1 vom 2024-02-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0515-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0514-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0516-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6688-1 vom 2024-03-11", "url": "https://ubuntu.com/security/notices/USN-6688-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6700-1 vom 2024-03-19", "url": "https://ubuntu.com/security/notices/USN-6700-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6701-1 vom 2024-03-19", "url": "https://ubuntu.com/security/notices/USN-6701-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6699-1 vom 2024-03-19", "url": "https://ubuntu.com/security/notices/USN-6699-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6702-1 vom 2024-03-19", "url": "https://ubuntu.com/security/notices/USN-6702-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6704-1 vom 2024-03-20", "url": "https://ubuntu.com/security/notices/USN-6704-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6705-1 vom 2024-03-20", "url": "https://ubuntu.com/security/notices/USN-6705-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6701-2 vom 2024-03-20", "url": "https://ubuntu.com/security/notices/USN-6701-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6702-2 vom 2024-03-20", "url": "https://ubuntu.com/security/notices/USN-6702-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6704-2 vom 2024-03-21", "url": "https://ubuntu.com/security/notices/USN-6704-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6700-2 vom 2024-03-21", "url": "https://ubuntu.com/security/notices/USN-6700-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6716-1 vom 2024-03-26", "url": "https://ubuntu.com/security/notices/USN-6716-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6704-3 vom 2024-03-26", "url": "https://ubuntu.com/security/notices/USN-6704-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6701-3 vom 2024-03-26", "url": "https://ubuntu.com/security/notices/USN-6701-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6704-4 vom 2024-03-28", "url": "https://ubuntu.com/security/notices/USN-6704-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6725-1 vom 2024-04-09", "url": "https://ubuntu.com/security/notices/USN-6725-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6701-4 vom 2024-04-09", "url": "https://ubuntu.com/security/notices/USN-6701-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6725-2 vom 2024-04-16", "url": "https://ubuntu.com/security/notices/USN-6725-2" }, { "category": "external", "summary": "Debian Security Advisory DSA-5681 vom 2024-05-06", "url": "https://lists.debian.org/debian-security-announce/2024/msg00090.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6765-1 vom 2024-05-07", "url": "https://ubuntu.com/security/notices/USN-6765-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1646-1 vom 2024-05-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018526.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1643-1 vom 2024-05-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018529.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1648-1 vom 2024-05-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018524.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1648-2 vom 2024-05-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018572.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1870-1 vom 2024-05-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018634.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6819-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6818-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6817-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6817-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6816-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6816-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-2 vom 2024-06-10", "url": "https://ubuntu.com/security/notices/USN-6818-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-2 vom 2024-06-12", "url": "https://ubuntu.com/security/notices/USN-6819-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6817-2 vom 2024-06-11", "url": "https://ubuntu.com/security/notices/USN-6817-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-3 vom 2024-06-12", "url": "https://ubuntu.com/security/notices/USN-6819-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6817-3 vom 2024-06-14", "url": "https://ubuntu.com/security/notices/USN-6817-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-3 vom 2024-06-14", "url": "https://ubuntu.com/security/notices/USN-6818-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-4 vom 2024-06-19", "url": "https://ubuntu.com/security/notices/USN-6818-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2135-1 vom 2024-06-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018783.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3841 vom 2024-06-25", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3842 vom 2024-06-25", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-4 vom 2024-06-26", "url": "https://ubuntu.com/security/notices/USN-6819-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-3840 vom 2024-06-27", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-022 vom 2024-07-03", "url": "https://www.dell.com/support/kbdoc/de-de/000226633/dsa-2024-022-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6865-1 vom 2024-07-04", "url": "https://ubuntu.com/security/notices/USN-6865-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6866-1 vom 2024-07-04", "url": "https://ubuntu.com/security/notices/USN-6866-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6866-2 vom 2024-07-04", "url": "https://ubuntu.com/security/notices/USN-6866-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6878-1 vom 2024-07-04", "url": "https://ubuntu.com/security/notices/USN-6878-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6865-2 vom 2024-07-04", "url": "https://ubuntu.com/security/notices/USN-6865-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6866-3 vom 2024-07-10", "url": "https://ubuntu.com/security/notices/USN-6866-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6893-1 vom 2024-07-11", "url": "https://ubuntu.com/security/notices/USN-6893-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6896-1 vom 2024-07-12", "url": "https://ubuntu.com/security/notices/USN-6896-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6895-1 vom 2024-07-12", "url": "https://ubuntu.com/security/notices/USN-6895-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6898-1 vom 2024-07-15", "url": "https://ubuntu.com/security/notices/USN-6898-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6895-2 vom 2024-07-16", "url": "https://ubuntu.com/security/notices/USN-6895-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6893-2 vom 2024-07-16", "url": "https://ubuntu.com/security/notices/USN-6893-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6896-2 vom 2024-07-16", "url": "https://ubuntu.com/security/notices/USN-6896-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6898-2 vom 2024-07-17", "url": "https://ubuntu.com/security/notices/USN-6898-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6896-3 vom 2024-07-17", "url": "https://ubuntu.com/security/notices/USN-6896-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6900-1 vom 2024-07-17", "url": "https://ubuntu.com/security/notices/USN-6900-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6896-4 vom 2024-07-19", "url": "https://ubuntu.com/security/notices/USN-6896-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6898-3 vom 2024-07-19", "url": "https://ubuntu.com/security/notices/USN-6898-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6895-3 vom 2024-07-19", "url": "https://ubuntu.com/security/notices/USN-6895-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6893-3 vom 2024-07-23", "url": "https://ubuntu.com/security/notices/USN-6893-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6896-5 vom 2024-07-23", "url": "https://ubuntu.com/security/notices/USN-6896-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6898-4 vom 2024-07-23", "url": "https://ubuntu.com/security/notices/USN-6898-4" }, { "category": "external", "summary": "SEM 2024.2.1 release notes vom 2024-07-23", "url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2024-2-1_release_notes.htm" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6918-1 vom 2024-07-26", "url": "https://ubuntu.com/security/notices/USN-6918-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6919-1 vom 2024-07-26", "url": "https://ubuntu.com/security/notices/USN-6919-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6917-1 vom 2024-07-26", "url": "https://ubuntu.com/security/notices/USN-6917-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6922-1 vom 2024-07-29", "url": "https://ubuntu.com/security/notices/USN-6922-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6926-1 vom 2024-07-29", "url": "https://ubuntu.com/security/notices/USN-6926-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6927-1 vom 2024-07-30", "url": "https://ubuntu.com/security/notices/USN-6927-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6938-1 vom 2024-07-31", "url": "https://ubuntu.com/security/notices/USN-6938-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6926-2 vom 2024-08-01", "url": "https://ubuntu.com/security/notices/USN-6926-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6922-2 vom 2024-08-01", "url": "https://ubuntu.com/security/notices/USN-6922-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6895-4 vom 2024-08-05", "url": "https://ubuntu.com/security/notices/USN-6895-4" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06", "url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6926-3 vom 2024-08-09", "url": "https://ubuntu.com/security/notices/USN-6926-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6972-1 vom 2024-08-21", "url": "https://ubuntu.com/security/notices/USN-6972-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6973-1 vom 2024-08-22", "url": "https://ubuntu.com/security/notices/USN-6973-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6976-1 vom 2024-08-22", "url": "https://ubuntu.com/security/notices/USN-6976-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6972-2 vom 2024-08-22", "url": "https://ubuntu.com/security/notices/USN-6972-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6973-2 vom 2024-08-23", "url": "https://ubuntu.com/security/notices/USN-6973-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6973-2 vom 2024-08-23", "url": "https://ubuntu.com/security/notices/USN-6972-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6973-3 vom 2024-08-26", "url": "https://ubuntu.com/security/notices/USN-6973-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6972-4 vom 2024-08-29", "url": "https://ubuntu.com/security/notices/USN-6972-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6973-4 vom 2024-09-02", "url": "https://ubuntu.com/security/notices/USN-6973-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7006-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7006-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7019-1 vom 2024-09-18", "url": "https://ubuntu.com/security/notices/USN-7019-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8856" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8870" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8856.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8870" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "category": "external", "summary": "IBM Security Bulletin 7179045 vom 2024-12-16", "url": "https://www.ibm.com/support/pages/node/7179045" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13", "url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-01-13T23:00:00.000+00:00", "generator": { "date": "2025-01-14T13:52:42.145+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-0296", "initial_release_date": "2024-02-04T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-04T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-02-14T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-02-15T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-03-11T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-18T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-19T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-20T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-21T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-25T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-01T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-09T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-16T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-14T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-30T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-09T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-10T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-11T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-12T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-16T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-18T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-23T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-25T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-06-26T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-27T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-07-02T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-07-03T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-04T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-10T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-11T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-14T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-15T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-16T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-17T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-18T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-23T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates aufgenommen" }, { "date": "2024-07-28T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-29T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-30T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-31T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-01T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-04T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-05T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-08-11T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-19T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-21T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-22T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-25T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-26T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-28T22:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-02T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "62" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T024663", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:-" } } }, { "category": "product_version_range", "name": "\u003c19.11", "product": { "name": "Dell NetWorker \u003c19.11", "product_id": "T035785" } }, { "category": "product_version", "name": "19.11", "product": { "name": "Dell NetWorker 19.11", "product_id": "T035785-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.11" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.1.9.5", "product": { "name": "IBM Storage Scale \u003c6.1.9.5", "product_id": "T039851" } }, { "category": "product_version", "name": "6.1.9.5", "product": { "name": "IBM Storage Scale 6.1.9.5", "product_id": "T039851-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_scale:6.1.9.5" } } }, { "category": "product_version_range", "name": "\u003c6.2.2.0", "product": { "name": "IBM Storage Scale \u003c6.2.2.0", "product_id": "T039852" } }, { "category": "product_version", "name": "6.2.2.0", "product": { "name": "IBM Storage Scale 6.2.2.0", "product_id": "T039852-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_scale:6.2.2.0" } } } ], "category": "product_name", "name": "Storage Scale" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T032517", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2024.2", "product": { "name": "SolarWinds Security Event Manager \u003c2024.2", "product_id": "T034244" } }, { "category": "product_version", "name": "2024.2", "product": { "name": "SolarWinds Security Event Manager 2024.2", "product_id": "T034244-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:security_event_manager:2024.2" } } } ], "category": "product_name", "name": "Security Event Manager" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-22386", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-22386" }, { "cve": "CVE-2024-23196", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-23196" }, { "cve": "CVE-2024-24855", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24855" }, { "cve": "CVE-2024-24857", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24857" }, { "cve": "CVE-2024-24858", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24858" }, { "cve": "CVE-2024-24859", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24859" }, { "cve": "CVE-2024-24860", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24860" }, { "cve": "CVE-2024-24861", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24861" }, { "cve": "CVE-2024-24864", "notes": [ { "category": "description", "text": "Im Linux-Kernel gibt es mehrere Schwachstellen. Diese bestehen in mehreren Treibern wie \"drm/exynos\", \"scsi\" oder \"net/bluetooth\" Ger\u00e4tetreibern aufgrund von Race Conditions und NULL-Zeiger-Dereferenzproblemen. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "67646", "T004914", "T032255", "T035785", "T034244", "T039852", "T039851", "T014381", "2951", "T002207", "T000126", "T024663", "T032517" ] }, "release_date": "2024-02-04T23:00:00.000+00:00", "title": "CVE-2024-24864" } ] }
ghsa-c4c9-rwvw-5wrf
Vulnerability from github
A race condition was found in the Linux kernel's drm/exynos device driver in exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.
{ "affected": [], "aliases": [ "CVE-2024-22386" ], "database_specific": { "cwe_ids": [ "CWE-362" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-02-05T08:15:43Z", "severity": "MODERATE" }, "details": "A race condition was found in the Linux kernel\u0027s drm/exynos device driver in\u00a0exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\n\n\n", "id": "GHSA-c4c9-rwvw-5wrf", "modified": "2024-02-10T06:30:18Z", "published": "2024-02-05T09:30:28Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22386" }, { "type": "WEB", "url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=8147" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2024-22386
Vulnerability from gsd
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-22386" ], "details": "A race condition was found in the Linux kernel\u0027s drm/exynos device driver in\u00a0exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\n\n\n", "id": "GSD-2024-22386", "modified": "2024-01-16T06:02:04.096932Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@openanolis.org", "ID": "CVE-2024-22386", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Linux kernel", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "v4.11-rc1", "version_value": "v6.6-rc1" } ] } } ] }, "vendor_name": "Linux" } ] } }, "credits": [ { "lang": "en", "value": "\u767d\u5bb6\u9a79 \u003cbaijiaju@buaa.edu.cn\u003e" }, { "lang": "en", "value": "\u97e9\u6842\u680b \u003changuidong@buaa.edu.cn\u003e" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A race condition was found in the Linux kernel\u0027s drm/exynos device driver in\u00a0exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\n\n\n" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-362", "lang": "eng", "value": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.openanolis.cn/show_bug.cgi?id=8147", "refsource": "MISC", "url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=8147" } ] }, "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=2e63972a2de14482d0eae1a03a73e379f1c3f44c\"\u003ehttps://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=2e63972a2de14482d0eae...\u003c/a\u003e\u003cbr\u003e" } ], "value": " https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=2e63972a2de14482d0eae... https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/ \n" } ], "source": { "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AFC89B2-EDF9-4448-A530-D38CD2BD7580", "versionEndIncluding": "4.10.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "52DA8805-6EDC-4D72-BCC7-96ADE999D73C", "versionEndIncluding": "6.5.13", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A race condition was found in the Linux kernel\u0027s drm/exynos device driver in\u00a0exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\n\n\n" }, { "lang": "es", "value": "Se encontr\u00f3 una condici\u00f3n de ejecuci\u00f3n en el controlador de dispositivo drm/exynos del kernel de Linux en la funci\u00f3n exynos_drm_crtc_atomic_disable(). Esto puede provocar un problema de desreferencia de puntero nulo, lo que posiblemente provoque un p\u00e1nico en el kernel o un problema de denegaci\u00f3n de servicio." } ], "id": "CVE-2024-22386", "lastModified": "2024-02-10T04:05:26.383", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 4.0, "source": "security@openanolis.org", "type": "Secondary" } ] }, "published": "2024-02-05T08:15:43.830", "references": [ { "source": "security@openanolis.org", "tags": [ "Permissions Required" ], "url": "https://bugzilla.openanolis.cn/show_bug.cgi?id=8147" } ], "sourceIdentifier": "security@openanolis.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" }, { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "security@openanolis.org", "type": "Secondary" } ] } } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.