Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-26647 (GCVE-0-2024-26647)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-26647", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-29T16:18:46.186544Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:49:31.372Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:07:19.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647" }, { "tags": [ "x_transferred" ], "url": "https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/link/link_dpms.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "6aa5ede6665122f4c8abce3c6eba06b49e54d25c", "status": "affected", "version": "6ca7415f11af5200ab10bd420b513f846e9bfb99", "versionType": "git" }, { "lessThan": "cf656fc7276e5b3709a81bc9d9639459be2b2647", "status": "affected", "version": "6ca7415f11af5200ab10bd420b513f846e9bfb99", "versionType": "git" }, { "lessThan": "3bb9b1f958c3d986ed90a3ff009f1e77e9553207", "status": "affected", "version": "6ca7415f11af5200ab10bd420b513f846e9bfb99", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/amd/display/dc/link/link_dpms.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.3" }, { "lessThan": "6.3", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.15", "versionType": "semver" }, { "lessThanOrEqual": "6.7.*", "status": "unaffected", "version": "6.7.3", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.8", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6.15", "versionStartIncluding": "6.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.7.3", "versionStartIncluding": "6.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.8", "versionStartIncluding": "6.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix late derefrence \u0027dsc\u0027 check in \u0027link_set_dsc_pps_packet()\u0027\n\nIn link_set_dsc_pps_packet(), \u0027struct display_stream_compressor *dsc\u0027\nwas dereferenced in a DC_LOGGER_INIT(dsc-\u003ectx-\u003elogger); before the \u0027dsc\u0027\nNULL pointer check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check \u0027dsc\u0027 (see line 903)" } ], "providerMetadata": { "dateUpdated": "2025-05-21T09:12:21.705Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c" }, { "url": "https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647" }, { "url": "https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207" } ], "title": "drm/amd/display: Fix late derefrence \u0027dsc\u0027 check in \u0027link_set_dsc_pps_packet()\u0027", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-26647", "datePublished": "2024-03-26T17:50:01.057Z", "dateReserved": "2024-02-19T14:20:24.138Z", "dateUpdated": "2025-05-21T09:12:21.705Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-26647\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-03-26T18:15:10.063\",\"lastModified\":\"2025-01-07T20:15:48.587\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/amd/display: Fix late derefrence \u0027dsc\u0027 check in \u0027link_set_dsc_pps_packet()\u0027\\n\\nIn link_set_dsc_pps_packet(), \u0027struct display_stream_compressor *dsc\u0027\\nwas dereferenced in a DC_LOGGER_INIT(dsc-\u003ectx-\u003elogger); before the \u0027dsc\u0027\\nNULL pointer check.\\n\\nFixes the below:\\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check \u0027dsc\u0027 (see line 903)\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: se corrigi\u00f3 la verificaci\u00f3n de desrefrence tard\u00eda \u0027dsc\u0027 en \u0027link_set_dsc_pps_packet()\u0027. En link_set_dsc_pps_packet(), se elimin\u00f3 la referencia a \u0027struct display_stream_compressor *dsc\u0027 en un DC_LOGGER_INIT(dsc- \u0026gt;ctx-\u0026gt;registrador); antes de la verificaci\u00f3n del puntero NULL \u0027dsc\u0027. Corrige lo siguiente: drivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() advertencia: variable desreferenciada antes de verificar \u0027dsc\u0027 (consulte la l\u00ednea 903)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.6.15\",\"matchCriteriaId\":\"142FB4DC-E1A5-4DD2-8150-C5741C441196\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.7.3\",\"matchCriteriaId\":\"58FD5308-148A-40D3-B36A-0CA6B434A8BF\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T00:07:19.754Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-26647\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-29T16:18:46.186544Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-29T16:18:49.695Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"drm/amd/display: Fix late derefrence \u0027dsc\u0027 check in \u0027link_set_dsc_pps_packet()\u0027\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6ca7415f11af5200ab10bd420b513f846e9bfb99\", \"lessThan\": \"6aa5ede6665122f4c8abce3c6eba06b49e54d25c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6ca7415f11af5200ab10bd420b513f846e9bfb99\", \"lessThan\": \"cf656fc7276e5b3709a81bc9d9639459be2b2647\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6ca7415f11af5200ab10bd420b513f846e9bfb99\", \"lessThan\": \"3bb9b1f958c3d986ed90a3ff009f1e77e9553207\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/gpu/drm/amd/display/dc/link/link_dpms.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.3\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.6.15\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.7.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.7.*\"}, {\"status\": \"unaffected\", \"version\": \"6.8\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/gpu/drm/amd/display/dc/link/link_dpms.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c\"}, {\"url\": \"https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647\"}, {\"url\": \"https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/amd/display: Fix late derefrence \u0027dsc\u0027 check in \u0027link_set_dsc_pps_packet()\u0027\\n\\nIn link_set_dsc_pps_packet(), \u0027struct display_stream_compressor *dsc\u0027\\nwas dereferenced in a DC_LOGGER_INIT(dsc-\u003ectx-\u003elogger); before the \u0027dsc\u0027\\nNULL pointer check.\\n\\nFixes the below:\\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check \u0027dsc\u0027 (see line 903)\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.15\", \"versionStartIncluding\": \"6.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.7.3\", \"versionStartIncluding\": \"6.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.8\", \"versionStartIncluding\": \"6.3\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-21T09:12:21.705Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-26647\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-21T09:12:21.705Z\", \"dateReserved\": \"2024-02-19T14:20:24.138Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-03-26T17:50:01.057Z\", \"assignerShortName\": \"Linux\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ghsa-gxqp-64jf-hj53
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'
In link_set_dsc_pps_packet(), 'struct display_stream_compressor *dsc' was dereferenced in a DC_LOGGER_INIT(dsc->ctx->logger); before the 'dsc' NULL pointer check.
Fixes the below: drivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check 'dsc' (see line 903)
{ "affected": [], "aliases": [ "CVE-2024-26647" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-03-26T18:15:10Z", "severity": "MODERATE" }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix late derefrence \u0027dsc\u0027 check in \u0027link_set_dsc_pps_packet()\u0027\n\nIn link_set_dsc_pps_packet(), \u0027struct display_stream_compressor *dsc\u0027\nwas dereferenced in a DC_LOGGER_INIT(dsc-\u003ectx-\u003elogger); before the \u0027dsc\u0027\nNULL pointer check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check \u0027dsc\u0027 (see line 903)", "id": "GHSA-gxqp-64jf-hj53", "modified": "2025-01-07T21:30:54Z", "published": "2024-03-26T18:32:07Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26647" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2024-26647
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207 | Patch | |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c | Patch | |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647 | Patch |
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "142FB4DC-E1A5-4DD2-8150-C5741C441196", "versionEndExcluding": "6.6.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF", "versionEndExcluding": "6.7.3", "versionStartIncluding": "6.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix late derefrence \u0027dsc\u0027 check in \u0027link_set_dsc_pps_packet()\u0027\n\nIn link_set_dsc_pps_packet(), \u0027struct display_stream_compressor *dsc\u0027\nwas dereferenced in a DC_LOGGER_INIT(dsc-\u003ectx-\u003elogger); before the \u0027dsc\u0027\nNULL pointer check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check \u0027dsc\u0027 (see line 903)" }, { "lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: se corrigi\u00f3 la verificaci\u00f3n de desrefrence tard\u00eda \u0027dsc\u0027 en \u0027link_set_dsc_pps_packet()\u0027. En link_set_dsc_pps_packet(), se elimin\u00f3 la referencia a \u0027struct display_stream_compressor *dsc\u0027 en un DC_LOGGER_INIT(dsc- \u0026gt;ctx-\u0026gt;registrador); antes de la verificaci\u00f3n del puntero NULL \u0027dsc\u0027. Corrige lo siguiente: drivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() advertencia: variable desreferenciada antes de verificar \u0027dsc\u0027 (consulte la l\u00ednea 903)" } ], "id": "CVE-2024-26647", "lastModified": "2025-01-07T20:15:48.587", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-03-26T18:15:10.063", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2024-26647
Vulnerability from gsd
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-26647" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix late derefrence \u0027dsc\u0027 check in \u0027link_set_dsc_pps_packet()\u0027\n\nIn link_set_dsc_pps_packet(), \u0027struct display_stream_compressor *dsc\u0027\nwas dereferenced in a DC_LOGGER_INIT(dsc-\u003ectx-\u003elogger); before the \u0027dsc\u0027\nNULL pointer check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check \u0027dsc\u0027 (see line 903)", "id": "GSD-2024-26647", "modified": "2024-02-20T06:02:29.230826Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@kernel.org", "ID": "CVE-2024-26647", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Linux", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1da177e4c3f4", "version_value": "6aa5ede66651" }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.15", "versionType": "custom" }, { "lessThanOrEqual": "6.7.*", "status": "unaffected", "version": "6.7.3", "versionType": "custom" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.8", "versionType": "original_commit_for_fix" } ] } } ] } } ] }, "vendor_name": "Linux" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix late derefrence \u0027dsc\u0027 check in \u0027link_set_dsc_pps_packet()\u0027\n\nIn link_set_dsc_pps_packet(), \u0027struct display_stream_compressor *dsc\u0027\nwas dereferenced in a DC_LOGGER_INIT(dsc-\u003ectx-\u003elogger); before the \u0027dsc\u0027\nNULL pointer check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check \u0027dsc\u0027 (see line 903)" } ] }, "generator": { "engine": "bippy-b4257b672505" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c", "refsource": "MISC", "url": "https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c" }, { "name": "https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647", "refsource": "MISC", "url": "https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647" }, { "name": "https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207", "refsource": "MISC", "url": "https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207" } ] } }, "nvd.nist.gov": { "cve": { "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix late derefrence \u0027dsc\u0027 check in \u0027link_set_dsc_pps_packet()\u0027\n\nIn link_set_dsc_pps_packet(), \u0027struct display_stream_compressor *dsc\u0027\nwas dereferenced in a DC_LOGGER_INIT(dsc-\u003ectx-\u003elogger); before the \u0027dsc\u0027\nNULL pointer check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check \u0027dsc\u0027 (see line 903)" }, { "lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: se corrigi\u00f3 la verificaci\u00f3n de desrefrence tard\u00eda \u0027dsc\u0027 en \u0027link_set_dsc_pps_packet()\u0027. En link_set_dsc_pps_packet(), se elimin\u00f3 la referencia a \u0027struct display_stream_compressor *dsc\u0027 en un DC_LOGGER_INIT(dsc- \u0026gt;ctx-\u0026gt;registrador); antes de la verificaci\u00f3n del puntero NULL \u0027dsc\u0027. Corrige lo siguiente: drivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() advertencia: variable desreferenciada antes de verificar \u0027dsc\u0027 (consulte la l\u00ednea 903)" } ], "id": "CVE-2024-26647", "lastModified": "2024-03-27T12:29:41.530", "metrics": {}, "published": "2024-03-26T18:15:10.063", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "url": "https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Awaiting Analysis" } } } }
wid-sec-w-2024-0722
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um Dateien zu manipulieren, unbekannte Effekte zu verursachen oder einen Denial-of-Service-Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0722 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0722.json" }, { "category": "self", "summary": "WID-SEC-2024-0722 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0722" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326151722.1258576-3-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326151722.1258576-4-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326171931.1354035-4-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326171931.1354035-5-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326171931.1354035-6-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-10-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-11-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-12-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-13-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-14-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-15-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-16-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-17-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-18-lee@kernel.org/" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271644" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271648" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271690" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271688" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271686" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271684" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271682" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271680" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271678" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-03-26", "url": "https://github.com/advisories/GHSA-q6px-8pwj-ppvh" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-03-26", "url": "https://github.com/advisories/GHSA-wrwp-f8pq-q3qj" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-03-26", "url": "https://github.com/advisories/GHSA-fxcg-hv47-5q4m" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1320-1 vom 2024-04-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018372.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1321-1 vom 2024-04-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018375.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1322-1 vom 2024-04-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018374.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1332-2 vom 2024-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1332-1 vom 2024-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018376.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1322-2 vom 2024-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1466-1 vom 2024-04-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018438.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1480-1 vom 2024-04-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018444.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1490-1 vom 2024-05-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018445.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5681 vom 2024-05-06", "url": "https://lists.debian.org/debian-security-announce/2024/msg00090.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6766-1 vom 2024-05-07", "url": "https://ubuntu.com/security/notices/USN-6766-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6765-1 vom 2024-05-07", "url": "https://ubuntu.com/security/notices/USN-6765-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6767-1 vom 2024-05-07", "url": "https://ubuntu.com/security/notices/USN-6767-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6767-2 vom 2024-05-14", "url": "https://ubuntu.com/security/notices/USN-6767-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1659-1 vom 2024-05-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018538.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6766-2 vom 2024-05-15", "url": "https://ubuntu.com/security/notices/USN-6766-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6766-3 vom 2024-05-20", "url": "https://ubuntu.com/security/notices/USN-6766-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6795-1 vom 2024-05-28", "url": "https://ubuntu.com/security/notices/USN-6795-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6819-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6818-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-2 vom 2024-06-10", "url": "https://ubuntu.com/security/notices/USN-6818-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6828-1 vom 2024-06-11", "url": "https://ubuntu.com/security/notices/USN-6828-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-2 vom 2024-06-12", "url": "https://ubuntu.com/security/notices/USN-6819-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-3 vom 2024-06-12", "url": "https://ubuntu.com/security/notices/USN-6819-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-3 vom 2024-06-14", "url": "https://ubuntu.com/security/notices/USN-6818-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-4 vom 2024-06-19", "url": "https://ubuntu.com/security/notices/USN-6818-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-3842 vom 2024-06-25", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-4 vom 2024-06-26", "url": "https://ubuntu.com/security/notices/USN-6819-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-3840 vom 2024-06-27", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4211 vom 2024-07-02", "url": "https://access.redhat.com/errata/RHSA-2024:4211" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4211 vom 2024-07-03", "url": "https://linux.oracle.com/errata/ELSA-2024-4211.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4349 vom 2024-07-08", "url": "https://access.redhat.com/errata/RHSA-2024:4349" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4349 vom 2024-07-09", "url": "https://linux.oracle.com/errata/ELSA-2024-4349.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2360-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018907.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2372-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018901.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2381-1 vom 2024-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018916.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2394-1 vom 2024-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018922.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4321 vom 2024-07-10", "url": "https://access.redhat.com/errata/RHSA-2024:4321" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4352 vom 2024-07-15", "url": "https://errata.build.resf.org/RLSA-2024:4352" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4349 vom 2024-07-15", "url": "https://errata.build.resf.org/RLSA-2024:4349" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4211 vom 2024-07-15", "url": "https://errata.build.resf.org/RLSA-2024:4211" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18", "url": "https://access.redhat.com/errata/RHSA-2024:4631" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2571-1 vom 2024-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019019.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5101 vom 2024-08-08", "url": "https://access.redhat.com/errata/RHSA-2024:5101" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5102 vom 2024-08-08", "url": "https://access.redhat.com/errata/RHSA-2024:5102" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5101 vom 2024-08-09", "url": "https://linux.oracle.com/errata/ELSA-2024-5101.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1663-1 vom 2024-08-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MFQEXBT2XPZQJMUF7MN6ZVO5FXVY4NKK/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5101 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5101" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5102 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5102" }, { "category": "external", "summary": "IBM Security Bulletin 7167662 vom 2024-09-05", "url": "https://www.ibm.com/support/pages/node/7167662" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-7000.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7001" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12682 vom 2024-09-30", "url": "http://linux.oracle.com/errata/ELSA-2024-12682.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10", "url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7174634" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "category": "external", "summary": "IBM Security Bulletin 7176961 vom 2024-11-22", "url": "https://www.ibm.com/support/pages/node/7176961" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7166-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7166-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7186-1" }, { "category": "external", "summary": "IBM Security Bulletin 7180361 vom 2025-01-07", "url": "https://www.ibm.com/support/pages/node/7180361" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7186-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13", "url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html" }, { "category": "external", "summary": "IBM Security Bulletin 7181933 vom 2025-01-29", "url": "https://www.ibm.com/support/pages/node/7181933" }, { "category": "external", "summary": "Brocade Security Advisory BSA-2025-2895 vom 2025-02-13", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25398" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" }, { "category": "external", "summary": "IBM Security Bulletin 7230557 vom 2025-04-10", "url": "https://www.ibm.com/support/pages/node/7230557" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8248 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8248" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30", "url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20028-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8796 vom 2025-06-11", "url": "https://access.redhat.com/errata/RHSA-2025:8796" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9584 vom 2025-06-25", "url": "https://access.redhat.com/errata/RHSA-2025:9584" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-105 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-105.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-106 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-106.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-08-10T22:00:00.000+00:00", "generator": { "date": "2025-08-11T07:52:15.843+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-0722", "initial_release_date": "2024-03-26T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-26T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-04-16T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-04-18T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-04-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-01T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-02T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-13T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-15T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-05-20T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-09T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-10T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-11T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-12T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-16T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-18T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-25T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-06-26T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-27T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-07-01T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-07-02T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-07-07T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-07-08T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-07-09T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-10T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2024-07-15T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-07-18T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-07T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-11T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-14T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-15T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-18T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-19T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-21T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-09-05T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-09-23T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Rocky Enterprise Software Foundation und Oracle Linux aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von BROCADE aufgenommen" }, { "date": "2025-02-17T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "60", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-06-10T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-06-25T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-10T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "66" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade SANnav", "product": { "name": "Broadcom Brocade SANnav", "product_id": "T034392", "product_identification_helper": { "cpe": "cpe:/a:broadcom:brocade_sannav:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Avamar", "product": { "name": "Dell Avamar", "product_id": "T039664", "product_identification_helper": { "cpe": "cpe:/a:dell:avamar:-" } } }, { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "24.0.0", "product": { "name": "IBM Business Automation Workflow 24.0.0", "product_id": "T036570", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:24.0.0" } } } ], "category": "product_name", "name": "Business Automation Workflow" }, { "category": "product_name", "name": "IBM InfoSphere Guardium", "product": { "name": "IBM InfoSphere Guardium", "product_id": "T002366", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_guardium:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01", "product_id": "T038741" } }, { "category": "product_version", "name": "7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP10 IF01", "product_id": "T038741-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "IBM Security Guardium 12.0", "product_id": "T031092", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:12.0" } } } ], "category": "product_name", "name": "Security Guardium" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.6.4", "product_id": "T040030" } }, { "category": "product_version", "name": "10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus 10.1.6.4", "product_id": "T040030-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4" } } }, { "category": "product_version_range", "name": "\u003c10.1.17", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.17", "product_id": "T042730" } }, { "category": "product_version", "name": "10.1.17", "product": { "name": "IBM Spectrum Protect Plus 10.1.17", "product_id": "T042730-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.17" } } } ], "category": "product_name", "name": "Spectrum Protect Plus" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.8", "product": { "name": "Open Source Linux Kernel \u003c6.8", "product_id": "T033368" } }, { "category": "product_version", "name": "6.8", "product": { "name": "Open Source Linux Kernel 6.8", "product_id": "T033368-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.8" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52621", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52621" }, { "cve": "CVE-2023-52622", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52622" }, { "cve": "CVE-2023-52623", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52623" }, { "cve": "CVE-2023-52624", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52624" }, { "cve": "CVE-2023-52625", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52625" }, { "cve": "CVE-2023-52626", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52626" }, { "cve": "CVE-2023-52627", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52627" }, { "cve": "CVE-2024-26644", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26644" }, { "cve": "CVE-2024-26645", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26645" }, { "cve": "CVE-2024-26646", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26646" }, { "cve": "CVE-2024-26647", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26647" }, { "cve": "CVE-2024-26648", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26648" }, { "cve": "CVE-2024-26649", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26649" }, { "cve": "CVE-2024-26650", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26650" } ] }
WID-SEC-W-2024-0722
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um Dateien zu manipulieren, unbekannte Effekte zu verursachen oder einen Denial-of-Service-Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0722 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0722.json" }, { "category": "self", "summary": "WID-SEC-2024-0722 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0722" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326151722.1258576-3-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326151722.1258576-4-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326171931.1354035-4-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326171931.1354035-5-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326171931.1354035-6-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-10-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-11-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-12-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-13-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-14-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-15-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-16-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-17-lee@kernel.org/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-03-26", "url": "http://lore.kernel.org/linux-cve-announce/20240326175007.1388794-18-lee@kernel.org/" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271644" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271648" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271690" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271688" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271686" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271684" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271682" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271680" }, { "category": "external", "summary": "RedHat Bugzilla vom 2024-03-26", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271678" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-03-26", "url": "https://github.com/advisories/GHSA-q6px-8pwj-ppvh" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-03-26", "url": "https://github.com/advisories/GHSA-wrwp-f8pq-q3qj" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-03-26", "url": "https://github.com/advisories/GHSA-fxcg-hv47-5q4m" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1320-1 vom 2024-04-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018372.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1321-1 vom 2024-04-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018375.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1322-1 vom 2024-04-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018374.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1332-2 vom 2024-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1332-1 vom 2024-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018376.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1322-2 vom 2024-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1466-1 vom 2024-04-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018438.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1480-1 vom 2024-04-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018444.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1490-1 vom 2024-05-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018445.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5681 vom 2024-05-06", "url": "https://lists.debian.org/debian-security-announce/2024/msg00090.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6766-1 vom 2024-05-07", "url": "https://ubuntu.com/security/notices/USN-6766-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6765-1 vom 2024-05-07", "url": "https://ubuntu.com/security/notices/USN-6765-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6767-1 vom 2024-05-07", "url": "https://ubuntu.com/security/notices/USN-6767-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6767-2 vom 2024-05-14", "url": "https://ubuntu.com/security/notices/USN-6767-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1659-1 vom 2024-05-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-May/018538.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6766-2 vom 2024-05-15", "url": "https://ubuntu.com/security/notices/USN-6766-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6766-3 vom 2024-05-20", "url": "https://ubuntu.com/security/notices/USN-6766-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6795-1 vom 2024-05-28", "url": "https://ubuntu.com/security/notices/USN-6795-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6819-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6818-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-2 vom 2024-06-10", "url": "https://ubuntu.com/security/notices/USN-6818-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6828-1 vom 2024-06-11", "url": "https://ubuntu.com/security/notices/USN-6828-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-2 vom 2024-06-12", "url": "https://ubuntu.com/security/notices/USN-6819-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-3 vom 2024-06-12", "url": "https://ubuntu.com/security/notices/USN-6819-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-3 vom 2024-06-14", "url": "https://ubuntu.com/security/notices/USN-6818-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6818-4 vom 2024-06-19", "url": "https://ubuntu.com/security/notices/USN-6818-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-3842 vom 2024-06-25", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6819-4 vom 2024-06-26", "url": "https://ubuntu.com/security/notices/USN-6819-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-3840 vom 2024-06-27", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4211 vom 2024-07-02", "url": "https://access.redhat.com/errata/RHSA-2024:4211" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4211 vom 2024-07-03", "url": "https://linux.oracle.com/errata/ELSA-2024-4211.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4349 vom 2024-07-08", "url": "https://access.redhat.com/errata/RHSA-2024:4349" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4349 vom 2024-07-09", "url": "https://linux.oracle.com/errata/ELSA-2024-4349.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2360-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018907.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2372-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018901.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2381-1 vom 2024-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018916.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2394-1 vom 2024-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018922.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4321 vom 2024-07-10", "url": "https://access.redhat.com/errata/RHSA-2024:4321" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4352 vom 2024-07-15", "url": "https://errata.build.resf.org/RLSA-2024:4352" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4349 vom 2024-07-15", "url": "https://errata.build.resf.org/RLSA-2024:4349" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4211 vom 2024-07-15", "url": "https://errata.build.resf.org/RLSA-2024:4211" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18", "url": "https://access.redhat.com/errata/RHSA-2024:4631" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2571-1 vom 2024-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019019.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5101 vom 2024-08-08", "url": "https://access.redhat.com/errata/RHSA-2024:5101" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5102 vom 2024-08-08", "url": "https://access.redhat.com/errata/RHSA-2024:5102" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5101 vom 2024-08-09", "url": "https://linux.oracle.com/errata/ELSA-2024-5101.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2203-1 vom 2024-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1663-1 vom 2024-08-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MFQEXBT2XPZQJMUF7MN6ZVO5FXVY4NKK/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5101 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5101" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5102 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5102" }, { "category": "external", "summary": "IBM Security Bulletin 7167662 vom 2024-09-05", "url": "https://www.ibm.com/support/pages/node/7167662" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-7000.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7001" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12682 vom 2024-09-30", "url": "http://linux.oracle.com/errata/ELSA-2024-12682.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10", "url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7174634" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "category": "external", "summary": "IBM Security Bulletin 7176961 vom 2024-11-22", "url": "https://www.ibm.com/support/pages/node/7176961" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7166-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7166-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7186-1" }, { "category": "external", "summary": "IBM Security Bulletin 7180361 vom 2025-01-07", "url": "https://www.ibm.com/support/pages/node/7180361" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7186-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7194-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13", "url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html" }, { "category": "external", "summary": "IBM Security Bulletin 7181933 vom 2025-01-29", "url": "https://www.ibm.com/support/pages/node/7181933" }, { "category": "external", "summary": "Brocade Security Advisory BSA-2025-2895 vom 2025-02-13", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25398" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" }, { "category": "external", "summary": "IBM Security Bulletin 7230557 vom 2025-04-10", "url": "https://www.ibm.com/support/pages/node/7230557" }, { "category": "external", "summary": "Debian Security Advisory DLA-4178 vom 2025-05-26", "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8248 vom 2025-05-28", "url": "https://access.redhat.com/errata/RHSA-2025:8248" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30", "url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20028-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8796 vom 2025-06-11", "url": "https://access.redhat.com/errata/RHSA-2025:8796" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9584 vom 2025-06-25", "url": "https://access.redhat.com/errata/RHSA-2025:9584" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-20470.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-105 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-105.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-106 vom 2025-08-09", "url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-106.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-08-10T22:00:00.000+00:00", "generator": { "date": "2025-08-11T07:52:15.843+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-0722", "initial_release_date": "2024-03-26T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-26T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-04-16T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-04-18T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-04-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-01T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-02T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-13T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-15T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-05-20T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-09T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-10T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-11T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-12T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-16T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-18T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-25T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-06-26T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-27T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-07-01T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-07-02T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-07-07T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-07-08T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-07-09T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-10T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2024-07-15T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-07-18T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-07T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-11T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-14T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-15T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-18T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-19T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-21T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-09-05T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-09-23T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Rocky Enterprise Software Foundation und Oracle Linux aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von BROCADE aufgenommen" }, { "date": "2025-02-17T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "60", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-06-10T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-06-25T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-10T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "66" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade SANnav", "product": { "name": "Broadcom Brocade SANnav", "product_id": "T034392", "product_identification_helper": { "cpe": "cpe:/a:broadcom:brocade_sannav:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Avamar", "product": { "name": "Dell Avamar", "product_id": "T039664", "product_identification_helper": { "cpe": "cpe:/a:dell:avamar:-" } } }, { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "24.0.0", "product": { "name": "IBM Business Automation Workflow 24.0.0", "product_id": "T036570", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:24.0.0" } } } ], "category": "product_name", "name": "Business Automation Workflow" }, { "category": "product_name", "name": "IBM InfoSphere Guardium", "product": { "name": "IBM InfoSphere Guardium", "product_id": "T002366", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_guardium:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01", "product_id": "T038741" } }, { "category": "product_version", "name": "7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP10 IF01", "product_id": "T038741-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "IBM Security Guardium 12.0", "product_id": "T031092", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:12.0" } } } ], "category": "product_name", "name": "Security Guardium" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.6.4", "product_id": "T040030" } }, { "category": "product_version", "name": "10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus 10.1.6.4", "product_id": "T040030-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4" } } }, { "category": "product_version_range", "name": "\u003c10.1.17", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.17", "product_id": "T042730" } }, { "category": "product_version", "name": "10.1.17", "product": { "name": "IBM Spectrum Protect Plus 10.1.17", "product_id": "T042730-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.17" } } } ], "category": "product_name", "name": "Spectrum Protect Plus" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.8", "product": { "name": "Open Source Linux Kernel \u003c6.8", "product_id": "T033368" } }, { "category": "product_version", "name": "6.8", "product": { "name": "Open Source Linux Kernel 6.8", "product_id": "T033368-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.8" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52621", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52621" }, { "cve": "CVE-2023-52622", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52622" }, { "cve": "CVE-2023-52623", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52623" }, { "cve": "CVE-2023-52624", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52624" }, { "cve": "CVE-2023-52625", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52625" }, { "cve": "CVE-2023-52626", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52626" }, { "cve": "CVE-2023-52627", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2023-52627" }, { "cve": "CVE-2024-26644", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26644" }, { "cve": "CVE-2024-26645", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26645" }, { "cve": "CVE-2024-26646", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26646" }, { "cve": "CVE-2024-26647", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26647" }, { "cve": "CVE-2024-26648", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26648" }, { "cve": "CVE-2024-26649", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26649" }, { "cve": "CVE-2024-26650", "product_status": { "known_affected": [ "T033368", "67646", "T034583", "T004914", "T032255", "T038741", "T039664", "T040030", "T042730", "T036570", "2951", "T002207", "T034392", "T000126", "T031092", "T002366", "398363" ] }, "release_date": "2024-03-26T23:00:00.000+00:00", "title": "CVE-2024-26650" } ] }
CERTFR-2024-AVI-0383
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Ubuntu 18.04 ESM", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 20.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } }, { "description": "Ubuntu 22.04 LTS", "product": { "name": "Ubuntu", "vendor": { "name": "Ubuntu", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-52633", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52633" }, { "name": "CVE-2024-26825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26825" }, { "name": "CVE-2023-52622", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52622" }, { "name": "CVE-2023-52448", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52448" }, { "name": "CVE-2024-26696", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26696" }, { "name": "CVE-2023-52456", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52456" }, { "name": "CVE-2024-26650", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26650" }, { "name": "CVE-2024-26614", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26614" }, { "name": "CVE-2024-26595", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26595" }, { "name": "CVE-2024-26634", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26634" }, { "name": "CVE-2023-52621", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52621" }, { "name": "CVE-2024-26629", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26629" }, { "name": "CVE-2024-26586", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26586" }, { "name": "CVE-2024-26715", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26715" }, { "name": "CVE-2023-52637", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52637" }, { "name": "CVE-2024-26585", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26585" }, { "name": "CVE-2024-26638", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26638" }, { "name": "CVE-2023-52491", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52491" }, { "name": "CVE-2024-26704", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26704" }, { "name": "CVE-2024-26671", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26671" }, { "name": "CVE-2023-6536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6536" }, { "name": "CVE-2023-52453", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52453" }, { "name": "CVE-2024-26712", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26712" }, { "name": "CVE-2023-52642", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52642" }, { "name": "CVE-2024-26600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26600" }, { "name": "CVE-2023-52635", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52635" }, { "name": "CVE-2023-52593", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52593" }, { "name": "CVE-2023-52489", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52489" }, { "name": "CVE-2023-52638", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52638" }, { "name": "CVE-2023-52492", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52492" }, { "name": "CVE-2024-26665", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26665" }, { "name": "CVE-2023-52611", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52611" }, { "name": "CVE-2023-52454", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52454" }, { "name": "CVE-2024-26627", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26627" }, { "name": "CVE-2023-52632", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52632" }, { "name": "CVE-2024-26910", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26910" }, { "name": "CVE-2023-52587", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52587" }, { "name": "CVE-2024-26698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26698" }, { "name": "CVE-2024-26632", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26632" }, { "name": "CVE-2024-26645", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26645" }, { "name": "CVE-2024-26702", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26702" }, { "name": "CVE-2024-26631", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26631" }, { "name": "CVE-2024-26673", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26673" }, { "name": "CVE-2024-26720", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26720" }, { "name": "CVE-2024-26615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26615" }, { "name": "CVE-2024-26669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26669" }, { "name": "CVE-2023-52618", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52618" }, { "name": "CVE-2023-52604", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52604" }, { "name": "CVE-2023-52643", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52643" }, { "name": "CVE-2023-52601", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52601" }, { "name": "CVE-2024-26722", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26722" }, { "name": "CVE-2024-26598", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26598" }, { "name": "CVE-2024-26679", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26679" }, { "name": "CVE-2023-52616", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52616" }, { "name": "CVE-2023-52435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52435" }, { "name": "CVE-2024-26707", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26707" }, { "name": "CVE-2023-52455", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52455" }, { "name": "CVE-2024-26695", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26695" }, { "name": "CVE-2024-26647", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26647" }, { "name": "CVE-2024-26623", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26623" }, { "name": "CVE-2023-52486", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52486" }, { "name": "CVE-2024-26670", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26670" }, { "name": "CVE-2023-52619", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52619" }, { "name": "CVE-2023-52617", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52617" }, { "name": "CVE-2024-26920", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26920" }, { "name": "CVE-2024-26593", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26593" }, { "name": "CVE-2024-26676", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26676" }, { "name": "CVE-2024-26916", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26916" }, { "name": "CVE-2023-52462", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52462" }, { "name": "CVE-2024-26636", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26636" }, { "name": "CVE-2023-6356", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6356" }, { "name": "CVE-2023-52609", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52609" }, { "name": "CVE-2024-26829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26829" }, { "name": "CVE-2023-52469", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52469" }, { "name": "CVE-2023-52493", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52493" }, { "name": "CVE-2023-52584", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52584" }, { "name": "CVE-2024-26606", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26606" }, { "name": "CVE-2023-52488", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52488" }, { "name": "CVE-2024-26625", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26625" }, { "name": "CVE-2024-26635", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26635" }, { "name": "CVE-2023-52451", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52451" }, { "name": "CVE-2024-26649", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26649" }, { "name": "CVE-2023-52631", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52631" }, { "name": "CVE-2023-52608", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52608" }, { "name": "CVE-2024-26592", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26592" }, { "name": "CVE-2023-52589", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52589" }, { "name": "CVE-2024-26697", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26697" }, { "name": "CVE-2024-26826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26826" }, { "name": "CVE-2024-26583", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26583" }, { "name": "CVE-2024-26685", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26685" }, { "name": "CVE-2024-24860", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24860" }, { "name": "CVE-2023-52599", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52599" }, { "name": "CVE-2023-52473", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52473" }, { "name": "CVE-2024-26607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26607" }, { "name": "CVE-2023-52472", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52472" }, { "name": "CVE-2024-26663", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26663" }, { "name": "CVE-2024-26675", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26675" }, { "name": "CVE-2023-52470", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52470" }, { "name": "CVE-2024-26610", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26610" }, { "name": "CVE-2023-52583", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52583" }, { "name": "CVE-2024-26584", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26584" }, { "name": "CVE-2023-52602", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52602" }, { "name": "CVE-2023-52445", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52445" }, { "name": "CVE-2023-6535", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6535" }, { "name": "CVE-2023-52498", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52498" }, { "name": "CVE-2024-26618", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26618" }, { "name": "CVE-2023-52446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52446" }, { "name": "CVE-2023-52487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52487" }, { "name": "CVE-2024-1151", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1151" }, { "name": "CVE-2023-52497", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52497" }, { "name": "CVE-2024-26646", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26646" }, { "name": "CVE-2024-26668", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26668" }, { "name": "CVE-2023-52612", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52612" }, { "name": "CVE-2024-26640", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26640" }, { "name": "CVE-2024-26594", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26594" }, { "name": "CVE-2023-52627", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52627" }, { "name": "CVE-2023-52458", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52458" }, { "name": "CVE-2023-52588", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52588" }, { "name": "CVE-2023-52468", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52468" }, { "name": "CVE-2024-26602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26602" }, { "name": "CVE-2024-26644", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26644" }, { "name": "CVE-2023-52465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52465" }, { "name": "CVE-2023-52598", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52598" }, { "name": "CVE-2023-52490", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52490" }, { "name": "CVE-2024-26633", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26633" }, { "name": "CVE-2023-52450", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52450" }, { "name": "CVE-2023-52594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52594" }, { "name": "CVE-2024-26808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26808" }, { "name": "CVE-2023-52595", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52595" }, { "name": "CVE-2024-26620", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26620" }, { "name": "CVE-2023-52623", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52623" }, { "name": "CVE-2023-52447", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52447" }, { "name": "CVE-2023-52464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52464" }, { "name": "CVE-2024-26608", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26608" }, { "name": "CVE-2023-52615", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52615" }, { "name": "CVE-2023-52610", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52610" }, { "name": "CVE-2024-26660", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26660" }, { "name": "CVE-2024-26689", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26689" }, { "name": "CVE-2023-52606", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52606" }, { "name": "CVE-2023-52597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52597" }, { "name": "CVE-2023-52495", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52495" }, { "name": "CVE-2024-26717", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26717" }, { "name": "CVE-2024-26616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26616" }, { "name": "CVE-2024-26582", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26582" }, { "name": "CVE-2024-2201", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2201" }, { "name": "CVE-2024-26641", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26641" }, { "name": "CVE-2023-52626", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52626" }, { "name": "CVE-2023-52463", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52463" }, { "name": "CVE-2023-52467", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52467" }, { "name": "CVE-2023-52443", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52443" }, { "name": "CVE-2023-52591", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52591" }, { "name": "CVE-2023-52614", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52614" }, { "name": "CVE-2024-26664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26664" }, { "name": "CVE-2023-52452", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52452" }, { "name": "CVE-2023-52494", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52494" }, { "name": "CVE-2024-26612", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26612" }, { "name": "CVE-2023-52607", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52607" }, { "name": "CVE-2024-23849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23849" }, { "name": "CVE-2024-26684", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26684" }, { "name": "CVE-2023-52457", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52457" }, { "name": "CVE-2023-52449", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52449" }, { "name": "CVE-2023-52444", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52444" } ], "initial_release_date": "2024-05-10T00:00:00", "last_revision_date": "2024-05-10T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0383", "revisions": [ { "description": "Version initiale", "revision_date": "2024-05-10T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6767-1 du 07 mai 2024", "url": "https://ubuntu.com/security/notices/USN-6767-1" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6765-1 du 07 mai 2024", "url": "https://ubuntu.com/security/notices/USN-6765-1" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6766-1 du 07 mai 2024", "url": "https://ubuntu.com/security/notices/USN-6766-1" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.