Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-38428 (GCVE-0-2024-38428)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:gnu:wget:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wget", "vendor": "gnu", "versions": [ { "lessThan": "1.24.5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-38428", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-19T19:48:27.672206Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-436", "description": "CWE-436 Interpretation Conflict", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T20:46:08.713Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-04-21T10:03:18.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" }, { "tags": [ "x_transferred" ], "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace" }, { "url": "https://security.netapp.com/advisory/ntap-20241115-0005/" }, { "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00029.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-16T02:22:07.056Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" }, { "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-38428", "datePublished": "2024-06-16T00:00:00.000Z", "dateReserved": "2024-06-16T00:00:00.000Z", "dateUpdated": "2025-04-21T10:03:18.212Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-38428\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-06-16T03:15:08.430\",\"lastModified\":\"2025-04-21T10:15:14.207\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.\"},{\"lang\":\"es\",\"value\":\"url.c en GNU Wget hasta 1.24.5 maneja mal los puntos y comas en el subcomponente de informaci\u00f3n de usuario de un URI y, por lo tanto, puede haber un comportamiento inseguro en el que los datos que se supon\u00eda que estaban en el subcomponente de informaci\u00f3n de usuario se malinterpretan como parte del subcomponente del host.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-436\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-436\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.24.5\",\"matchCriteriaId\":\"CFC92ECA-B3E9-413B-A576-D563F357A047\"}]}]}],\"references\":[{\"url\":\"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/04/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20241115-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20241115-0005/\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/04/msg00029.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-04-21T10:03:18.212Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-38428\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-19T19:48:27.672206Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:gnu:wget:-:*:*:*:*:*:*:*\"], \"vendor\": \"gnu\", \"product\": \"wget\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.24.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-436\", \"description\": \"CWE-436 Interpretation Conflict\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-19T19:48:31.787Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html\"}, {\"url\": \"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-06-16T02:22:07.056Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-38428\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-21T10:03:18.212Z\", \"dateReserved\": \"2024-06-16T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2024-06-16T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
RHSA-2024:5299
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5299", "url": "https://access.redhat.com/errata/RHSA-2024:5299" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/8.10_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/8.10_release_notes/index" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5299.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2025-10-08T14:15:09+00:00", "generator": { "date": "2025-10-08T14:15:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:5299", "initial_release_date": "2024-08-13T15:39:30+00:00", "revision_history": [ { "date": "2024-08-13T15:39:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T15:39:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-08T14:15:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.src", "product": { "name": "wget-0:1.19.5-12.el8_10.src", "product_id": "wget-0:1.19.5-12.el8_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.aarch64", "product": { "name": "wget-0:1.19.5-12.el8_10.aarch64", "product_id": "wget-0:1.19.5-12.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.ppc64le", "product": { "name": "wget-0:1.19.5-12.el8_10.ppc64le", "product_id": "wget-0:1.19.5-12.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.x86_64", "product": { "name": "wget-0:1.19.5-12.el8_10.x86_64", "product_id": "wget-0:1.19.5-12.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.s390x", "product": { "name": "wget-0:1.19.5-12.el8_10.s390x", "product_id": "wget-0:1.19.5-12.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64" }, "product_reference": "wget-0:1.19.5-12.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le" }, "product_reference": "wget-0:1.19.5-12.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x" }, "product_reference": "wget-0:1.19.5-12.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src" }, "product_reference": "wget-0:1.19.5-12.el8_10.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64" }, "product_reference": "wget-0:1.19.5-12.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to Wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\nTo exploit this issue, an attacker must convince a local user into running Wget with a specially crafted userinfo subcomponent, limiting the exposure of this vulnerability.\nFor these reasons, this vulnerability has been rated with a moderate severity.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls such as input validation and error handling mitigate input misinterpretation risks by enforcing strict validation rules and secure error management. Error handling ensures inputs are validated against predefined formats, preventing malformed data from being misinterpreted. Techniques like strong typing, allow listing, and proper encoding reduce the likelihood of injection attacks and unintended code execution. Input validation also ensures that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents information leakage through detailed error messages while preserving system stability under malformed input conditions. Together, these controls reduce the attack surface by maintaining consistent input processing and preventing exploitable system states, strengthening the overall security posture.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T15:39:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5299" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
rhsa-2024_4998
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4998", "url": "https://access.redhat.com/errata/RHSA-2024:4998" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4998.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2024-11-24T17:41:39+00:00", "generator": { "date": "2024-11-24T17:41:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4998", "initial_release_date": "2024-08-06T15:02:30+00:00", "revision_history": [ { "date": "2024-08-06T15:02:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-06T15:02:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:41:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.src", "product": { "name": "wget-0:1.19.5-10.el8_6.2.src", "product_id": "wget-0:1.19.5-10.el8_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.x86_64", "product": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64", "product_id": "wget-0:1.19.5-10.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.aarch64", "product": { "name": "wget-0:1.19.5-10.el8_6.2.aarch64", "product_id": "wget-0:1.19.5-10.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.ppc64le", "product": { "name": "wget-0:1.19.5-10.el8_6.2.ppc64le", "product_id": "wget-0:1.19.5-10.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.s390x", "product": { "name": "wget-0:1.19.5-10.el8_6.2.s390x", "product_id": "wget-0:1.19.5-10.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-06T15:02:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4998" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
rhsa-2024:6208
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:6208", "url": "https://access.redhat.com/errata/RHSA-2024:6208" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6208.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2025-10-08T14:15:14+00:00", "generator": { "date": "2025-10-08T14:15:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:6208", "initial_release_date": "2024-09-03T10:30:17+00:00", "revision_history": [ { "date": "2024-09-03T10:30:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-03T10:30:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-08T14:15:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.src", "product": { "name": "wget-0:1.19.5-11.el8_8.1.src", "product_id": "wget-0:1.19.5-11.el8_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.aarch64", "product": { "name": "wget-0:1.19.5-11.el8_8.1.aarch64", "product_id": "wget-0:1.19.5-11.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.ppc64le", "product": { "name": "wget-0:1.19.5-11.el8_8.1.ppc64le", "product_id": "wget-0:1.19.5-11.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.x86_64", "product": { "name": "wget-0:1.19.5-11.el8_8.1.x86_64", "product_id": "wget-0:1.19.5-11.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.s390x", "product": { "name": "wget-0:1.19.5-11.el8_8.1.s390x", "product_id": "wget-0:1.19.5-11.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to Wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\nTo exploit this issue, an attacker must convince a local user into running Wget with a specially crafted userinfo subcomponent, limiting the exposure of this vulnerability.\nFor these reasons, this vulnerability has been rated with a moderate severity.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls such as input validation and error handling mitigate input misinterpretation risks by enforcing strict validation rules and secure error management. Error handling ensures inputs are validated against predefined formats, preventing malformed data from being misinterpreted. Techniques like strong typing, allow listing, and proper encoding reduce the likelihood of injection attacks and unintended code execution. Input validation also ensures that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents information leakage through detailed error messages while preserving system stability under malformed input conditions. Together, these controls reduce the attack surface by maintaining consistent input processing and preventing exploitable system states, strengthening the overall security posture.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-03T10:30:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6208" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
rhsa-2024_6192
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:6192", "url": "https://access.redhat.com/errata/RHSA-2024:6192" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6192.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2024-11-24T17:42:10+00:00", "generator": { "date": "2024-11-24T17:42:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:6192", "initial_release_date": "2024-09-03T18:31:59+00:00", "revision_history": [ { "date": "2024-09-03T18:31:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-03T18:31:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:42:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.src", "product": { "name": "wget-0:1.21.1-8.el9_4.src", "product_id": "wget-0:1.21.1-8.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.aarch64", "product": { "name": "wget-0:1.21.1-8.el9_4.aarch64", "product_id": "wget-0:1.21.1-8.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.ppc64le", "product": { "name": "wget-0:1.21.1-8.el9_4.ppc64le", "product_id": "wget-0:1.21.1-8.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.x86_64", "product": { "name": "wget-0:1.21.1-8.el9_4.x86_64", "product_id": "wget-0:1.21.1-8.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.s390x", "product": { "name": "wget-0:1.21.1-8.el9_4.s390x", "product_id": "wget-0:1.21.1-8.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64" }, "product_reference": "wget-0:1.21.1-8.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le" }, "product_reference": "wget-0:1.21.1-8.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x" }, "product_reference": "wget-0:1.21.1-8.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src" }, "product_reference": "wget-0:1.21.1-8.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64" }, "product_reference": "wget-0:1.21.1-8.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-03T18:31:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6192" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
rhsa-2024:4998
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4998", "url": "https://access.redhat.com/errata/RHSA-2024:4998" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4998.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2025-10-08T14:15:05+00:00", "generator": { "date": "2025-10-08T14:15:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:4998", "initial_release_date": "2024-08-06T15:02:30+00:00", "revision_history": [ { "date": "2024-08-06T15:02:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-06T15:02:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-08T14:15:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.src", "product": { "name": "wget-0:1.19.5-10.el8_6.2.src", "product_id": "wget-0:1.19.5-10.el8_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.x86_64", "product": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64", "product_id": "wget-0:1.19.5-10.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.aarch64", "product": { "name": "wget-0:1.19.5-10.el8_6.2.aarch64", "product_id": "wget-0:1.19.5-10.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.ppc64le", "product": { "name": "wget-0:1.19.5-10.el8_6.2.ppc64le", "product_id": "wget-0:1.19.5-10.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.s390x", "product": { "name": "wget-0:1.19.5-10.el8_6.2.s390x", "product_id": "wget-0:1.19.5-10.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to Wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\nTo exploit this issue, an attacker must convince a local user into running Wget with a specially crafted userinfo subcomponent, limiting the exposure of this vulnerability.\nFor these reasons, this vulnerability has been rated with a moderate severity.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls such as input validation and error handling mitigate input misinterpretation risks by enforcing strict validation rules and secure error management. Error handling ensures inputs are validated against predefined formats, preventing malformed data from being misinterpreted. Techniques like strong typing, allow listing, and proper encoding reduce the likelihood of injection attacks and unintended code execution. Input validation also ensures that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents information leakage through detailed error messages while preserving system stability under malformed input conditions. Together, these controls reduce the attack surface by maintaining consistent input processing and preventing exploitable system states, strengthening the overall security posture.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-06T15:02:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4998" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
rhsa-2024:6438
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:6438", "url": "https://access.redhat.com/errata/RHSA-2024:6438" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6438.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2025-10-08T14:15:14+00:00", "generator": { "date": "2025-10-08T14:15:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:6438", "initial_release_date": "2024-09-05T18:17:20+00:00", "revision_history": [ { "date": "2024-09-05T18:17:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-05T18:17:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-08T14:15:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.src", "product": { "name": "wget-0:1.21.1-7.el9_2.1.src", "product_id": "wget-0:1.21.1-7.el9_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.aarch64", "product": { "name": "wget-0:1.21.1-7.el9_2.1.aarch64", "product_id": "wget-0:1.21.1-7.el9_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.ppc64le", "product": { "name": "wget-0:1.21.1-7.el9_2.1.ppc64le", "product_id": "wget-0:1.21.1-7.el9_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.x86_64", "product": { "name": "wget-0:1.21.1-7.el9_2.1.x86_64", "product_id": "wget-0:1.21.1-7.el9_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.s390x", "product": { "name": "wget-0:1.21.1-7.el9_2.1.s390x", "product_id": "wget-0:1.21.1-7.el9_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to Wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\nTo exploit this issue, an attacker must convince a local user into running Wget with a specially crafted userinfo subcomponent, limiting the exposure of this vulnerability.\nFor these reasons, this vulnerability has been rated with a moderate severity.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls such as input validation and error handling mitigate input misinterpretation risks by enforcing strict validation rules and secure error management. Error handling ensures inputs are validated against predefined formats, preventing malformed data from being misinterpreted. Techniques like strong typing, allow listing, and proper encoding reduce the likelihood of injection attacks and unintended code execution. Input validation also ensures that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents information leakage through detailed error messages while preserving system stability under malformed input conditions. Together, these controls reduce the attack surface by maintaining consistent input processing and preventing exploitable system states, strengthening the overall security posture.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-05T18:17:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6438" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
RHSA-2024:6438
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:6438", "url": "https://access.redhat.com/errata/RHSA-2024:6438" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6438.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2025-10-08T14:15:14+00:00", "generator": { "date": "2025-10-08T14:15:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:6438", "initial_release_date": "2024-09-05T18:17:20+00:00", "revision_history": [ { "date": "2024-09-05T18:17:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-05T18:17:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-08T14:15:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.src", "product": { "name": "wget-0:1.21.1-7.el9_2.1.src", "product_id": "wget-0:1.21.1-7.el9_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.aarch64", "product": { "name": "wget-0:1.21.1-7.el9_2.1.aarch64", "product_id": "wget-0:1.21.1-7.el9_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.ppc64le", "product": { "name": "wget-0:1.21.1-7.el9_2.1.ppc64le", "product_id": "wget-0:1.21.1-7.el9_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.x86_64", "product": { "name": "wget-0:1.21.1-7.el9_2.1.x86_64", "product_id": "wget-0:1.21.1-7.el9_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.s390x", "product": { "name": "wget-0:1.21.1-7.el9_2.1.s390x", "product_id": "wget-0:1.21.1-7.el9_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to Wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\nTo exploit this issue, an attacker must convince a local user into running Wget with a specially crafted userinfo subcomponent, limiting the exposure of this vulnerability.\nFor these reasons, this vulnerability has been rated with a moderate severity.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls such as input validation and error handling mitigate input misinterpretation risks by enforcing strict validation rules and secure error management. Error handling ensures inputs are validated against predefined formats, preventing malformed data from being misinterpreted. Techniques like strong typing, allow listing, and proper encoding reduce the likelihood of injection attacks and unintended code execution. Input validation also ensures that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents information leakage through detailed error messages while preserving system stability under malformed input conditions. Together, these controls reduce the attack surface by maintaining consistent input processing and preventing exploitable system states, strengthening the overall security posture.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-05T18:17:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6438" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
rhsa-2024:5299
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5299", "url": "https://access.redhat.com/errata/RHSA-2024:5299" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/8.10_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/8.10_release_notes/index" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5299.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2025-10-08T14:15:09+00:00", "generator": { "date": "2025-10-08T14:15:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:5299", "initial_release_date": "2024-08-13T15:39:30+00:00", "revision_history": [ { "date": "2024-08-13T15:39:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T15:39:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-08T14:15:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.src", "product": { "name": "wget-0:1.19.5-12.el8_10.src", "product_id": "wget-0:1.19.5-12.el8_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.aarch64", "product": { "name": "wget-0:1.19.5-12.el8_10.aarch64", "product_id": "wget-0:1.19.5-12.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.ppc64le", "product": { "name": "wget-0:1.19.5-12.el8_10.ppc64le", "product_id": "wget-0:1.19.5-12.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.x86_64", "product": { "name": "wget-0:1.19.5-12.el8_10.x86_64", "product_id": "wget-0:1.19.5-12.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.s390x", "product": { "name": "wget-0:1.19.5-12.el8_10.s390x", "product_id": "wget-0:1.19.5-12.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64" }, "product_reference": "wget-0:1.19.5-12.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le" }, "product_reference": "wget-0:1.19.5-12.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x" }, "product_reference": "wget-0:1.19.5-12.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src" }, "product_reference": "wget-0:1.19.5-12.el8_10.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64" }, "product_reference": "wget-0:1.19.5-12.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to Wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\nTo exploit this issue, an attacker must convince a local user into running Wget with a specially crafted userinfo subcomponent, limiting the exposure of this vulnerability.\nFor these reasons, this vulnerability has been rated with a moderate severity.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls such as input validation and error handling mitigate input misinterpretation risks by enforcing strict validation rules and secure error management. Error handling ensures inputs are validated against predefined formats, preventing malformed data from being misinterpreted. Techniques like strong typing, allow listing, and proper encoding reduce the likelihood of injection attacks and unintended code execution. Input validation also ensures that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents information leakage through detailed error messages while preserving system stability under malformed input conditions. Together, these controls reduce the attack surface by maintaining consistent input processing and preventing exploitable system states, strengthening the overall security posture.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T15:39:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5299" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
rhsa-2024:6192
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:6192", "url": "https://access.redhat.com/errata/RHSA-2024:6192" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6192.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2025-10-08T14:15:11+00:00", "generator": { "date": "2025-10-08T14:15:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:6192", "initial_release_date": "2024-09-03T18:31:59+00:00", "revision_history": [ { "date": "2024-09-03T18:31:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-03T18:31:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-08T14:15:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.src", "product": { "name": "wget-0:1.21.1-8.el9_4.src", "product_id": "wget-0:1.21.1-8.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.aarch64", "product": { "name": "wget-0:1.21.1-8.el9_4.aarch64", "product_id": "wget-0:1.21.1-8.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.ppc64le", "product": { "name": "wget-0:1.21.1-8.el9_4.ppc64le", "product_id": "wget-0:1.21.1-8.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.x86_64", "product": { "name": "wget-0:1.21.1-8.el9_4.x86_64", "product_id": "wget-0:1.21.1-8.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.s390x", "product": { "name": "wget-0:1.21.1-8.el9_4.s390x", "product_id": "wget-0:1.21.1-8.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64" }, "product_reference": "wget-0:1.21.1-8.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le" }, "product_reference": "wget-0:1.21.1-8.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x" }, "product_reference": "wget-0:1.21.1-8.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src" }, "product_reference": "wget-0:1.21.1-8.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64" }, "product_reference": "wget-0:1.21.1-8.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to Wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\nTo exploit this issue, an attacker must convince a local user into running Wget with a specially crafted userinfo subcomponent, limiting the exposure of this vulnerability.\nFor these reasons, this vulnerability has been rated with a moderate severity.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls such as input validation and error handling mitigate input misinterpretation risks by enforcing strict validation rules and secure error management. Error handling ensures inputs are validated against predefined formats, preventing malformed data from being misinterpreted. Techniques like strong typing, allow listing, and proper encoding reduce the likelihood of injection attacks and unintended code execution. Input validation also ensures that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents information leakage through detailed error messages while preserving system stability under malformed input conditions. Together, these controls reduce the attack surface by maintaining consistent input processing and preventing exploitable system states, strengthening the overall security posture.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-03T18:31:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6192" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
RHSA-2024:6208
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:6208", "url": "https://access.redhat.com/errata/RHSA-2024:6208" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6208.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2025-10-08T14:15:14+00:00", "generator": { "date": "2025-10-08T14:15:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:6208", "initial_release_date": "2024-09-03T10:30:17+00:00", "revision_history": [ { "date": "2024-09-03T10:30:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-03T10:30:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-08T14:15:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.src", "product": { "name": "wget-0:1.19.5-11.el8_8.1.src", "product_id": "wget-0:1.19.5-11.el8_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.aarch64", "product": { "name": "wget-0:1.19.5-11.el8_8.1.aarch64", "product_id": "wget-0:1.19.5-11.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.ppc64le", "product": { "name": "wget-0:1.19.5-11.el8_8.1.ppc64le", "product_id": "wget-0:1.19.5-11.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.x86_64", "product": { "name": "wget-0:1.19.5-11.el8_8.1.x86_64", "product_id": "wget-0:1.19.5-11.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.s390x", "product": { "name": "wget-0:1.19.5-11.el8_8.1.s390x", "product_id": "wget-0:1.19.5-11.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to Wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\nTo exploit this issue, an attacker must convince a local user into running Wget with a specially crafted userinfo subcomponent, limiting the exposure of this vulnerability.\nFor these reasons, this vulnerability has been rated with a moderate severity.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls such as input validation and error handling mitigate input misinterpretation risks by enforcing strict validation rules and secure error management. Error handling ensures inputs are validated against predefined formats, preventing malformed data from being misinterpreted. Techniques like strong typing, allow listing, and proper encoding reduce the likelihood of injection attacks and unintended code execution. Input validation also ensures that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents information leakage through detailed error messages while preserving system stability under malformed input conditions. Together, these controls reduce the attack surface by maintaining consistent input processing and preventing exploitable system states, strengthening the overall security posture.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-03T10:30:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6208" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
RHSA-2024:4998
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4998", "url": "https://access.redhat.com/errata/RHSA-2024:4998" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4998.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2025-10-08T14:15:05+00:00", "generator": { "date": "2025-10-08T14:15:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:4998", "initial_release_date": "2024-08-06T15:02:30+00:00", "revision_history": [ { "date": "2024-08-06T15:02:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-06T15:02:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-08T14:15:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.src", "product": { "name": "wget-0:1.19.5-10.el8_6.2.src", "product_id": "wget-0:1.19.5-10.el8_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.x86_64", "product": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64", "product_id": "wget-0:1.19.5-10.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.aarch64", "product": { "name": "wget-0:1.19.5-10.el8_6.2.aarch64", "product_id": "wget-0:1.19.5-10.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.ppc64le", "product": { "name": "wget-0:1.19.5-10.el8_6.2.ppc64le", "product_id": "wget-0:1.19.5-10.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-10.el8_6.2.s390x", "product": { "name": "wget-0:1.19.5-10.el8_6.2.s390x", "product_id": "wget-0:1.19.5-10.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-10.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "product": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "product_id": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-10.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "product": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "product_id": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-10.el8_6.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to Wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\nTo exploit this issue, an attacker must convince a local user into running Wget with a specially crafted userinfo subcomponent, limiting the exposure of this vulnerability.\nFor these reasons, this vulnerability has been rated with a moderate severity.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls such as input validation and error handling mitigate input misinterpretation risks by enforcing strict validation rules and secure error management. Error handling ensures inputs are validated against predefined formats, preventing malformed data from being misinterpreted. Techniques like strong typing, allow listing, and proper encoding reduce the likelihood of injection attacks and unintended code execution. Input validation also ensures that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents information leakage through detailed error messages while preserving system stability under malformed input conditions. Together, these controls reduce the attack surface by maintaining consistent input processing and preventing exploitable system states, strengthening the overall security posture.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-06T15:02:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4998" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.AUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.AUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.E4S:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.aarch64", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.ppc64le", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.s390x", "AppStream-8.6.0.Z.E4S:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.src", "AppStream-8.6.0.Z.TUS:wget-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debuginfo-0:1.19.5-10.el8_6.2.x86_64", "AppStream-8.6.0.Z.TUS:wget-debugsource-0:1.19.5-10.el8_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
RHSA-2024:6192
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:6192", "url": "https://access.redhat.com/errata/RHSA-2024:6192" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6192.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2025-10-08T14:15:11+00:00", "generator": { "date": "2025-10-08T14:15:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:6192", "initial_release_date": "2024-09-03T18:31:59+00:00", "revision_history": [ { "date": "2024-09-03T18:31:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-03T18:31:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-08T14:15:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.src", "product": { "name": "wget-0:1.21.1-8.el9_4.src", "product_id": "wget-0:1.21.1-8.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.aarch64", "product": { "name": "wget-0:1.21.1-8.el9_4.aarch64", "product_id": "wget-0:1.21.1-8.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.ppc64le", "product": { "name": "wget-0:1.21.1-8.el9_4.ppc64le", "product_id": "wget-0:1.21.1-8.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.x86_64", "product": { "name": "wget-0:1.21.1-8.el9_4.x86_64", "product_id": "wget-0:1.21.1-8.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-8.el9_4.s390x", "product": { "name": "wget-0:1.21.1-8.el9_4.s390x", "product_id": "wget-0:1.21.1-8.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-8.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "product": { "name": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "product_id": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-8.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "product": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "product_id": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-8.el9_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64" }, "product_reference": "wget-0:1.21.1-8.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le" }, "product_reference": "wget-0:1.21.1-8.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x" }, "product_reference": "wget-0:1.21.1-8.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src" }, "product_reference": "wget-0:1.21.1-8.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64" }, "product_reference": "wget-0:1.21.1-8.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64" }, "product_reference": "wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-8.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" }, "product_reference": "wget-debugsource-0:1.21.1-8.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to Wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\nTo exploit this issue, an attacker must convince a local user into running Wget with a specially crafted userinfo subcomponent, limiting the exposure of this vulnerability.\nFor these reasons, this vulnerability has been rated with a moderate severity.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls such as input validation and error handling mitigate input misinterpretation risks by enforcing strict validation rules and secure error management. Error handling ensures inputs are validated against predefined formats, preventing malformed data from being misinterpreted. Techniques like strong typing, allow listing, and proper encoding reduce the likelihood of injection attacks and unintended code execution. Input validation also ensures that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents information leakage through detailed error messages while preserving system stability under malformed input conditions. Together, these controls reduce the attack surface by maintaining consistent input processing and preventing exploitable system states, strengthening the overall security posture.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-03T18:31:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6192" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:wget-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debuginfo-0:1.21.1-8.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:wget-debugsource-0:1.21.1-8.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
rhsa-2024_5299
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5299", "url": "https://access.redhat.com/errata/RHSA-2024:5299" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/8.10_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/8.10_release_notes/index" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5299.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2024-11-24T17:41:49+00:00", "generator": { "date": "2024-11-24T17:41:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:5299", "initial_release_date": "2024-08-13T15:39:30+00:00", "revision_history": [ { "date": "2024-08-13T15:39:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T15:39:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:41:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.src", "product": { "name": "wget-0:1.19.5-12.el8_10.src", "product_id": "wget-0:1.19.5-12.el8_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.aarch64", "product": { "name": "wget-0:1.19.5-12.el8_10.aarch64", "product_id": "wget-0:1.19.5-12.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.ppc64le", "product": { "name": "wget-0:1.19.5-12.el8_10.ppc64le", "product_id": "wget-0:1.19.5-12.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.x86_64", "product": { "name": "wget-0:1.19.5-12.el8_10.x86_64", "product_id": "wget-0:1.19.5-12.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-12.el8_10.s390x", "product": { "name": "wget-0:1.19.5-12.el8_10.s390x", "product_id": "wget-0:1.19.5-12.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-12.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "product": { "name": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "product_id": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-12.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "product": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "product_id": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-12.el8_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64" }, "product_reference": "wget-0:1.19.5-12.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le" }, "product_reference": "wget-0:1.19.5-12.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x" }, "product_reference": "wget-0:1.19.5-12.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src" }, "product_reference": "wget-0:1.19.5-12.el8_10.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64" }, "product_reference": "wget-0:1.19.5-12.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-12.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T15:39:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5299" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:wget-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debuginfo-0:1.19.5-12.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:wget-debugsource-0:1.19.5-12.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
rhsa-2024_6208
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:6208", "url": "https://access.redhat.com/errata/RHSA-2024:6208" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6208.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2024-11-24T17:41:59+00:00", "generator": { "date": "2024-11-24T17:41:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:6208", "initial_release_date": "2024-09-03T10:30:17+00:00", "revision_history": [ { "date": "2024-09-03T10:30:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-03T10:30:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:41:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.src", "product": { "name": "wget-0:1.19.5-11.el8_8.1.src", "product_id": "wget-0:1.19.5-11.el8_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.aarch64", "product": { "name": "wget-0:1.19.5-11.el8_8.1.aarch64", "product_id": "wget-0:1.19.5-11.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.ppc64le", "product": { "name": "wget-0:1.19.5-11.el8_8.1.ppc64le", "product_id": "wget-0:1.19.5-11.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.x86_64", "product": { "name": "wget-0:1.19.5-11.el8_8.1.x86_64", "product_id": "wget-0:1.19.5-11.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.19.5-11.el8_8.1.s390x", "product": { "name": "wget-0:1.19.5-11.el8_8.1.s390x", "product_id": "wget-0:1.19.5-11.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.19.5-11.el8_8.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "product": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "product_id": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.19.5-11.el8_8.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "product": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "product_id": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.19.5-11.el8_8.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.19.5-11.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64" }, "product_reference": "wget-0:1.19.5-11.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64" }, "product_reference": "wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" }, "product_reference": "wget-debugsource-0:1.19.5-11.el8_8.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-03T10:30:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6208" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.src", "AppStream-8.8.0.Z.EUS:wget-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debuginfo-0:1.19.5-11.el8_8.1.x86_64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.aarch64", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.ppc64le", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.s390x", "AppStream-8.8.0.Z.EUS:wget-debugsource-0:1.19.5-11.el8_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
rhsa-2024_6438
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:6438", "url": "https://access.redhat.com/errata/RHSA-2024:6438" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6438.json" } ], "title": "Red Hat Security Advisory: wget security update", "tracking": { "current_release_date": "2024-11-24T17:42:20+00:00", "generator": { "date": "2024-11-24T17:42:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:6438", "initial_release_date": "2024-09-05T18:17:20+00:00", "revision_history": [ { "date": "2024-09-05T18:17:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-09-05T18:17:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:42:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.src", "product": { "name": "wget-0:1.21.1-7.el9_2.1.src", "product_id": "wget-0:1.21.1-7.el9_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.aarch64", "product": { "name": "wget-0:1.21.1-7.el9_2.1.aarch64", "product_id": "wget-0:1.21.1-7.el9_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.ppc64le", "product": { "name": "wget-0:1.21.1-7.el9_2.1.ppc64le", "product_id": "wget-0:1.21.1-7.el9_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.x86_64", "product": { "name": "wget-0:1.21.1-7.el9_2.1.x86_64", "product_id": "wget-0:1.21.1-7.el9_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.21.1-7.el9_2.1.s390x", "product": { "name": "wget-0:1.21.1-7.el9_2.1.s390x", "product_id": "wget-0:1.21.1-7.el9_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.21.1-7.el9_2.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "product": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "product_id": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debugsource@1.21.1-7.el9_2.1?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "product": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "product_id": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.21.1-7.el9_2.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.21.1-7.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64" }, "product_reference": "wget-0:1.21.1-7.el9_2.1.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64" }, "product_reference": "wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" }, "product_reference": "wget-debugsource-0:1.21.1-7.el9_2.1.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292836" } ], "notes": [ { "category": "description", "text": "A flaw was found in wget. Incorrect handling of semicolons in the userinfo subcomponent of a URI allows it to be misinterpreted as part of the host subcomponent, potentially exposing user credentials.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Misinterpretation of input may lead to improper behavior", "title": "Vulnerability summary" }, { "category": "other", "text": "Only calls to wget using semicolons in the userinfo subcomponent of a URI are vulnerable to this issue. However, this is allowed by the standard and is supported by other similar tools.\n\nAdditionally, this vulnerability only affects wget 1.x, wget2 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "RHBZ#2292836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "category": "external", "summary": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" } ], "release_date": "2024-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-09-05T18:17:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:6438" }, { "category": "workaround", "details": "Make sure to not add semicolons in the userinfo subcomponent of a URI.", "product_ids": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.src", "AppStream-9.2.0.Z.EUS:wget-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debuginfo-0:1.21.1-7.el9_2.1.x86_64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.aarch64", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.ppc64le", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.s390x", "AppStream-9.2.0.Z.EUS:wget-debugsource-0:1.21.1-7.el9_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Misinterpretation of input may lead to improper behavior" } ] }
CERTFR-2024-AVI-0713
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
VMware | Tanzu | Cflinuxfs4 versions antérieures à 1.99.0 | ||
VMware | Tanzu | Platform Automation Toolkit versions 4.2.x antérieures à 4.2.8 | ||
VMware | Tanzu | Operations Manager Image versions 2.8.x antérieures à 2.8.16 | ||
VMware | Tanzu | Platform Automation Toolkit versions 4.4.x antérieures à 4.4.32 | ||
VMware | Tanzu | Operations Manager versions 2.7.x antérieures à 2.7.25 | ||
VMware | Tanzu | Platform Automation Toolkit versions 4.3.x antérieures à 4.3.5 | ||
VMware | Tanzu | Operations Manager versions 2.9.x antérieures à 2.9.12 | ||
VMware | Tanzu | Platform Automation Toolkit versions 5.1.x antérieures à 5.1.2 | ||
VMware | Tanzu | Tanzu Greenplum pour Kubernetes versions 1.x antérieures à 1.2.0 | ||
VMware | Tanzu | Tanzu Greenplum pour Kubernetes versions 2.x antérieures à 2.0.0 | ||
VMware | Tanzu | Platform Automation Toolkit versions 4.0.x antérieures à 4.0.13 | ||
VMware | Tanzu | Operations Manager versions 3.x LTS-T antérieures à 3.0.30+LTS-T | ||
VMware | Tanzu | Platform Automation Toolkit versions 4.1.x antérieures à 4.1.13 | ||
VMware | Tanzu | Operations Manager versions 2.10.x antérieures à 2.10.75 | ||
VMware | Tanzu | Platform Automation Toolkit versions 5.0.x antérieures à 5.0.25 | ||
VMware | Tanzu | Xenial Stemcells versions antérieures à 621.969 | ||
VMware | Tanzu | Operations Manager Image versions 3.x LTS-T antérieures à 3.0.30+LTS-T | ||
VMware | Tanzu | CF Deployment versions antérieures à 41.0.0 | ||
VMware | Tanzu | Cflinuxfs3 versions antérieures à 0.390.0 | ||
VMware | Tanzu | Jammy Stemcells versions antérieures à 1.486 | ||
VMware | Tanzu | Operations Manager Image versions 2.10.x antérieures à 2.10.75 | ||
VMware | Tanzu | Operations Manager Image versions 2.7.x antérieures à 2.7.25 | ||
VMware | Tanzu | Operations Manager versions 2.8.x antérieures à 2.8.16 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Cflinuxfs4 versions ant\u00e9rieures \u00e0 1.99.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 4.2.x ant\u00e9rieures \u00e0 4.2.8", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Operations Manager Image versions 2.8.x ant\u00e9rieures \u00e0 2.8.16", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 4.4.x ant\u00e9rieures \u00e0 4.4.32", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Operations Manager versions 2.7.x ant\u00e9rieures \u00e0 2.7.25", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 4.3.x ant\u00e9rieures \u00e0 4.3.5", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Operations Manager versions 2.9.x ant\u00e9rieures \u00e0 2.9.12", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 5.1.x ant\u00e9rieures \u00e0 5.1.2", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum pour Kubernetes versions 1.x ant\u00e9rieures \u00e0 1.2.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum pour Kubernetes versions 2.x ant\u00e9rieures \u00e0 2.0.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 4.0.x ant\u00e9rieures \u00e0 4.0.13", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Operations Manager versions 3.x LTS-T ant\u00e9rieures \u00e0 3.0.30+LTS-T", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 4.1.x ant\u00e9rieures \u00e0 4.1.13", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Operations Manager versions 2.10.x ant\u00e9rieures \u00e0 2.10.75", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Platform Automation Toolkit versions 5.0.x ant\u00e9rieures \u00e0 5.0.25", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Xenial Stemcells versions ant\u00e9rieures \u00e0 621.969", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Operations Manager Image versions 3.x LTS-T ant\u00e9rieures \u00e0 3.0.30+LTS-T", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "CF Deployment versions ant\u00e9rieures \u00e0 41.0.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Cflinuxfs3 versions ant\u00e9rieures \u00e0 0.390.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Jammy Stemcells versions ant\u00e9rieures \u00e0 1.486", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Operations Manager Image versions 2.10.x ant\u00e9rieures \u00e0 2.10.75", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Operations Manager Image versions 2.7.x ant\u00e9rieures \u00e0 2.7.25", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Operations Manager versions 2.8.x ant\u00e9rieures \u00e0 2.8.16", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-7104", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104" }, { "name": "CVE-2023-46103", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46103" }, { "name": "CVE-2024-33602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602" }, { "name": "CVE-2023-50868", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50868" }, { "name": "CVE-2023-28746", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28746" }, { "name": "CVE-2016-9840", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9840" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2024-33600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600" }, { "name": "CVE-2024-33599", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599" }, { "name": "CVE-2024-1013", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1013" }, { "name": "CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "name": "CVE-2023-3164", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3164" }, { "name": "CVE-2018-25032", "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032" }, { "name": "CVE-2023-38575", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38575" }, { "name": "CVE-2022-37434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434" }, { "name": "CVE-2024-33601", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601" }, { "name": "CVE-2016-9841", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9841" }, { "name": "CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "name": "CVE-2023-47855", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47855" }, { "name": "CVE-2022-40735", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40735" }, { "name": "CVE-2022-48622", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48622" }, { "name": "CVE-2023-50387", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50387" }, { "name": "CVE-2024-26256", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26256" }, { "name": "CVE-2023-43490", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43490" }, { "name": "CVE-2024-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651" }, { "name": "CVE-2023-45745", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45745" }, { "name": "CVE-2023-22655", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22655" }, { "name": "CVE-2023-39368", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39368" }, { "name": "CVE-2024-34064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064" }, { "name": "CVE-2024-6387", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6387" }, { "name": "CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "name": "CVE-2024-34397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34397" }, { "name": "CVE-2023-45733", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45733" }, { "name": "CVE-2024-28182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182" } ], "initial_release_date": "2024-08-23T00:00:00", "last_revision_date": "2024-08-23T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0713", "revisions": [ { "description": "Version initiale", "revision_date": "2024-08-23T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de code indirecte \u00e0 distance (XSS).", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware", "vendor_advisories": [ { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24790", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24790" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24759", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24759" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24757", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24757" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24726", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24726" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24730", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24730" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24754", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24754" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24749", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24749" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24761", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24761" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24724", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24724" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24703", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24703" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24763", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24763" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24746", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24746" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24760", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24760" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24758", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24758" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24729", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24729" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24722", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24722" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24750", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24750" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24728", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24728" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24731", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24731" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24762", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24762" }, { "published_at": "2024-08-22", "title": "Bulletin de s\u00e9curit\u00e9 VMware 24704", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24704" } ] }
CERTFR-2024-AVI-0958
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.x antérieures à 2.3.4.1 | ||
IBM | VIOS | VIOS version 4.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
IBM | Security QRadar EDR | Security QRadar EDR versions 3.12.x antérieures à 3.12.13 | ||
IBM | VIOS | VIOS version 4.1 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
IBM | AIX | AIX version 7.2 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
IBM | AIX | AIX version 7.3 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
IBM | AIX | AIX version 7.3 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 IF01 | ||
IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.0 avec Db2 versions antérieures à 11.5.9 Special Build | ||
IBM | Sterling Control Center | Sterling Control Center versions 6.3.1.x antérieures à 6.3.1.0 iFix03 | ||
IBM | VIOS | VIOS version 3.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.10.27.0 | ||
IBM | Cloud Transformation Advisor | Cloud Transformation Advisor versions antérieures à 3.10.2 | ||
IBM | QRadar Suite Software | QRadar Suite Software versions antérieures à 1.10.27.0 | ||
IBM | Sterling Control Center | Sterling Control Center versions 6.2.1.x antérieures à 6.2.1.0 iFix14 | ||
IBM | QRadar Deployment Intelligence App | QRadar Deployment Intelligence App versions antérieures à 3.0.15 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Cloud Pak System versions 2.3.4.x ant\u00e9rieures \u00e0 2.3.4.1", "product": { "name": "Cloud Pak System", "vendor": { "name": "IBM", "scada": false } } }, { "description": "VIOS version 4.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1", "product": { "name": "VIOS", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.13", "product": { "name": "Security QRadar EDR", "vendor": { "name": "IBM", "scada": false } } }, { "description": "VIOS version 4.1 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0", "product": { "name": "VIOS", "vendor": { "name": "IBM", "scada": false } } }, { "description": "AIX version 7.2 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1", "product": { "name": "AIX", "vendor": { "name": "IBM", "scada": false } } }, { "description": "AIX version 7.3 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0", "product": { "name": "AIX", "vendor": { "name": "IBM", "scada": false } } }, { "description": "AIX version 7.3 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1", "product": { "name": "AIX", "vendor": { "name": "IBM", "scada": false } } }, { "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10 IF01", "product": { "name": "QRadar SIEM", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Cloud Pak System versions 2.3.4.0 avec Db2 versions ant\u00e9rieures \u00e0 11.5.9 Special Build", "product": { "name": "Cloud Pak System", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling Control Center versions 6.3.1.x ant\u00e9rieures \u00e0 6.3.1.0 iFix03", "product": { "name": "Sterling Control Center", "vendor": { "name": "IBM", "scada": false } } }, { "description": "VIOS version 3.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1", "product": { "name": "VIOS", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.10.27.0", "product": { "name": "Cloud Pak", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Cloud Transformation Advisor versions ant\u00e9rieures \u00e0 3.10.2 ", "product": { "name": "Cloud Transformation Advisor", "vendor": { "name": "IBM", "scada": false } } }, { "description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.10.27.0", "product": { "name": "QRadar Suite Software", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling Control Center versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.0 iFix14", "product": { "name": "Sterling Control Center", "vendor": { "name": "IBM", "scada": false } } }, { "description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.15", "product": { "name": "QRadar Deployment Intelligence App", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2020-25659", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25659" }, { "name": "CVE-2020-36242", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36242" }, { "name": "CVE-2022-23181", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23181" }, { "name": "CVE-2021-42340", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42340" }, { "name": "CVE-2022-29885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29885" }, { "name": "CVE-2022-34305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34305" }, { "name": "CVE-2017-7500", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7500" }, { "name": "CVE-2022-25762", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25762" }, { "name": "CVE-2022-42252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42252" }, { "name": "CVE-2022-40897", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2023-23931", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23931" }, { "name": "CVE-2023-28708", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28708" }, { "name": "CVE-2022-24999", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24999" }, { "name": "CVE-2023-28322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2023-2953", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953" }, { "name": "CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2023-38325", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38325" }, { "name": "CVE-2023-38546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-5678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678" }, { "name": "CVE-2021-43618", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618" }, { "name": "CVE-2023-48795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795" }, { "name": "CVE-2023-28487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28487" }, { "name": "CVE-2022-23471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23471" }, { "name": "CVE-2023-28486", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28486" }, { "name": "CVE-2023-25153", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25153" }, { "name": "CVE-2023-7104", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104" }, { "name": "CVE-2023-6129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129" }, { "name": "CVE-2023-46218", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218" }, { "name": "CVE-2024-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727" }, { "name": "CVE-2023-39325", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325" }, { "name": "CVE-2023-25173", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25173" }, { "name": "CVE-2022-31030", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31030" }, { "name": "CVE-2022-23648", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23648" }, { "name": "CVE-2023-28746", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28746" }, { "name": "CVE-2023-52451", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52451" }, { "name": "CVE-2023-52584", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52584" }, { "name": "CVE-2023-52469", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52469" }, { "name": "CVE-2023-52600", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52600" }, { "name": "CVE-2023-52463", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52463" }, { "name": "CVE-2023-52599", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52599" }, { "name": "CVE-2023-42465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42465" }, { "name": "CVE-2023-52530", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52530" }, { "name": "CVE-2024-26586", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26586" }, { "name": "CVE-2023-27043", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043" }, { "name": "CVE-2023-36632", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632" }, { "name": "CVE-2023-49083", "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083" }, { "name": "CVE-2023-2253", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2253" }, { "name": "CVE-2024-2201", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2201" }, { "name": "CVE-2023-52609", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52609" }, { "name": "CVE-2017-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7501" }, { "name": "CVE-2024-25710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710" }, { "name": "CVE-2021-35939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35939" }, { "name": "CVE-2024-26308", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308" }, { "name": "CVE-2024-0553", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0553" }, { "name": "CVE-2021-35938", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35938" }, { "name": "CVE-2023-50782", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782" }, { "name": "CVE-2021-35937", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35937" }, { "name": "CVE-2023-6597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597" }, { "name": "CVE-2023-52591", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52591" }, { "name": "CVE-2024-26667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26667" }, { "name": "CVE-2023-52608", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52608" }, { "name": "CVE-2023-52486", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52486" }, { "name": "CVE-2024-26614", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26614" }, { "name": "CVE-2024-25739", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25739" }, { "name": "CVE-2023-52623", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52623" }, { "name": "CVE-2023-52619", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52619" }, { "name": "CVE-2024-29133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29133" }, { "name": "CVE-2024-29131", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29131" }, { "name": "CVE-2024-26707", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26707" }, { "name": "CVE-2024-26697", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26697" }, { "name": "CVE-2024-26704", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26704" }, { "name": "CVE-2023-52622", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52622" }, { "name": "CVE-2024-26727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26727" }, { "name": "CVE-2024-26718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26718" }, { "name": "CVE-2024-26702", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26702" }, { "name": "CVE-2024-26710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26710" }, { "name": "CVE-2024-26810", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26810" }, { "name": "CVE-2024-26663", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26663" }, { "name": "CVE-2024-26773", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26773" }, { "name": "CVE-2024-26660", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26660" }, { "name": "CVE-2024-26726", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26726" }, { "name": "CVE-2024-26640", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26640" }, { "name": "CVE-2024-26802", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26802" }, { "name": "CVE-2024-26733", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26733" }, { "name": "CVE-2024-26700", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26700" }, { "name": "CVE-2024-26772", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26772" }, { "name": "CVE-2024-26696", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26696" }, { "name": "CVE-2024-26698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26698" }, { "name": "CVE-2024-26714", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26714" }, { "name": "CVE-2024-26686", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686" }, { "name": "CVE-2017-11468", "url": "https://www.cve.org/CVERecord?id=CVE-2017-11468" }, { "name": "CVE-2023-45284", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45284" }, { "name": "CVE-2023-52590", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52590" }, { "name": "CVE-2021-46939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46939" }, { "name": "CVE-2024-26870", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26870" }, { "name": "CVE-2024-27025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27025" }, { "name": "CVE-2024-26961", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26961" }, { "name": "CVE-2024-26840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26840" }, { "name": "CVE-2024-26958", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26958" }, { "name": "CVE-2024-26843", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26843" }, { "name": "CVE-2024-26925", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26925" }, { "name": "CVE-2024-27388", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27388" }, { "name": "CVE-2024-27020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27020" }, { "name": "CVE-2024-26960", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26960" }, { "name": "CVE-2024-26820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26820" }, { "name": "CVE-2024-26878", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26878" }, { "name": "CVE-2024-26852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26852" }, { "name": "CVE-2024-27065", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27065" }, { "name": "CVE-2024-26825", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26825" }, { "name": "CVE-2024-27019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27019" }, { "name": "CVE-2024-26668", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26668" }, { "name": "CVE-2024-26669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26669" }, { "name": "CVE-2023-52425", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425" }, { "name": "CVE-2024-21823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21823" }, { "name": "CVE-2024-28182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182" }, { "name": "CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" }, { "name": "CVE-2023-52653", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52653" }, { "name": "CVE-2024-26853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26853" }, { "name": "CVE-2022-48632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48632" }, { "name": "CVE-2024-29025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025" }, { "name": "CVE-2024-35947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35947" }, { "name": "CVE-2024-36017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36017" }, { "name": "CVE-2024-36886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36886" }, { "name": "CVE-2024-36889", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36889" }, { "name": "CVE-2024-36904", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36904" }, { "name": "CVE-2024-36905", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36905" }, { "name": "CVE-2024-36929", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36929" }, { "name": "CVE-2024-36933", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36933" }, { "name": "CVE-2024-36940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36940" }, { "name": "CVE-2024-36941", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36941" }, { "name": "CVE-2024-36950", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36950" }, { "name": "CVE-2024-36954", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36954" }, { "name": "CVE-2021-47231", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47231" }, { "name": "CVE-2021-47284", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47284" }, { "name": "CVE-2021-47373", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47373" }, { "name": "CVE-2021-47408", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47408" }, { "name": "CVE-2021-47449", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47449" }, { "name": "CVE-2021-47461", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47461" }, { "name": "CVE-2021-47468", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47468" }, { "name": "CVE-2021-47491", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47491" }, { "name": "CVE-2021-47548", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47548" }, { "name": "CVE-2023-52662", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52662" }, { "name": "CVE-2023-52679", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52679" }, { "name": "CVE-2023-52707", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52707" }, { "name": "CVE-2023-52730", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52730" }, { "name": "CVE-2023-52756", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52756" }, { "name": "CVE-2023-52764", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52764" }, { "name": "CVE-2023-52777", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52777" }, { "name": "CVE-2023-52791", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52791" }, { "name": "CVE-2023-52796", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52796" }, { "name": "CVE-2023-52803", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52803" }, { "name": "CVE-2023-52811", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52811" }, { "name": "CVE-2023-52817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52817" }, { "name": "CVE-2023-52832", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52832" }, { "name": "CVE-2023-52834", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52834" }, { "name": "CVE-2023-52847", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52847" }, { "name": "CVE-2023-52864", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52864" }, { "name": "CVE-2024-26921", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26921" }, { "name": "CVE-2024-26940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26940" }, { "name": "CVE-2024-27395", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27395" }, { "name": "CVE-2024-35801", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35801" }, { "name": "CVE-2024-35823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35823" }, { "name": "CVE-2024-35847", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35847" }, { "name": "CVE-2024-35912", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35912" }, { "name": "CVE-2024-35924", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35924" }, { "name": "CVE-2024-35930", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35930" }, { "name": "CVE-2024-35938", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35938" }, { "name": "CVE-2024-35940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35940" }, { "name": "CVE-2024-35952", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35952" }, { "name": "CVE-2024-36006", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36006" }, { "name": "CVE-2024-36016", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36016" }, { "name": "CVE-2024-36896", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36896" }, { "name": "CVE-2024-29857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857" }, { "name": "CVE-2024-30171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171" }, { "name": "CVE-2024-30172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172" }, { "name": "CVE-2024-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535" }, { "name": "CVE-2023-52658", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52658" }, { "name": "CVE-2024-26740", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26740" }, { "name": "CVE-2024-26844", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26844" }, { "name": "CVE-2024-26962", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26962" }, { "name": "CVE-2024-27434", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27434" }, { "name": "CVE-2024-35790", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790" }, { "name": "CVE-2024-35810", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35810" }, { "name": "CVE-2024-35814", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35814" }, { "name": "CVE-2024-35824", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35824" }, { "name": "CVE-2024-35937", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35937" }, { "name": "CVE-2024-35946", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35946" }, { "name": "CVE-2024-36020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36020" }, { "name": "CVE-2024-36025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36025" }, { "name": "CVE-2024-36921", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36921" }, { "name": "CVE-2024-31076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31076" }, { "name": "CVE-2024-33621", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33621" }, { "name": "CVE-2024-35807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35807" }, { "name": "CVE-2024-35893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35893" }, { "name": "CVE-2024-35896", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35896" }, { "name": "CVE-2024-35897", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35897" }, { "name": "CVE-2024-35899", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35899" }, { "name": "CVE-2024-35900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35900" }, { "name": "CVE-2024-35910", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35910" }, { "name": "CVE-2024-35925", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35925" }, { "name": "CVE-2024-36005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36005" }, { "name": "CVE-2024-36286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36286" }, { "name": "CVE-2024-36960", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36960" }, { "name": "CVE-2024-36971", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36971" }, { "name": "CVE-2024-38596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38596" }, { "name": "CVE-2024-38598", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38598" }, { "name": "CVE-2024-38627", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38627" }, { "name": "CVE-2023-5752", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752" }, { "name": "CVE-2024-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651" }, { "name": "CVE-2024-2398", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398" }, { "name": "CVE-2024-4032", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032" }, { "name": "CVE-2023-52648", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52648" }, { "name": "CVE-2023-6004", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6004" }, { "name": "CVE-2023-6918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6918" }, { "name": "CVE-2024-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450" }, { "name": "CVE-2024-25062", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062" }, { "name": "CVE-2024-26458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458" }, { "name": "CVE-2024-26461", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461" }, { "name": "CVE-2024-28834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834" }, { "name": "CVE-2024-2961", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961" }, { "name": "CVE-2024-33599", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599" }, { "name": "CVE-2024-33600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600" }, { "name": "CVE-2024-33601", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601" }, { "name": "CVE-2024-33602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602" }, { "name": "CVE-2024-34064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064" }, { "name": "CVE-2024-34069", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34069" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2024-4067", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4067" }, { "name": "CVE-2022-48743", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48743" }, { "name": "CVE-2022-48747", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48747" }, { "name": "CVE-2023-52762", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52762" }, { "name": "CVE-2023-52784", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52784" }, { "name": "CVE-2023-52845", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52845" }, { "name": "CVE-2024-26842", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26842" }, { "name": "CVE-2024-36917", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36917" }, { "name": "CVE-2024-36945", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945" }, { "name": "CVE-2024-36978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36978" }, { "name": "CVE-2024-38555", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38555" }, { "name": "CVE-2024-38573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38573" }, { "name": "CVE-2024-22365", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365" }, { "name": "CVE-2024-21131", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21131" }, { "name": "CVE-2024-21138", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21138" }, { "name": "CVE-2024-21140", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21140" }, { "name": "CVE-2024-21144", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21144" }, { "name": "CVE-2024-21145", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21145" }, { "name": "CVE-2024-21147", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21147" }, { "name": "CVE-2024-26662", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26662" }, { "name": "CVE-2024-26703", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26703" }, { "name": "CVE-2024-26818", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26818" }, { "name": "CVE-2024-26824", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26824" }, { "name": "CVE-2024-26831", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26831" }, { "name": "CVE-2024-27010", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27010" }, { "name": "CVE-2024-27011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27011" }, { "name": "CVE-2024-36270", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36270" }, { "name": "CVE-2024-36489", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36489" }, { "name": "CVE-2024-38615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38615" }, { "name": "CVE-2024-39276", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39276" }, { "name": "CVE-2024-39476", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39476" }, { "name": "CVE-2024-39487", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39487" }, { "name": "CVE-2024-39495", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39495" }, { "name": "CVE-2024-39502", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39502" }, { "name": "CVE-2024-40902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40902" }, { "name": "CVE-2024-40927", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40927" }, { "name": "CVE-2024-40974", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40974" }, { "name": "CVE-2024-36010", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36010" }, { "name": "CVE-2024-38575", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38575" }, { "name": "CVE-2024-6923", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923" }, { "name": "CVE-2024-36000", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36000" }, { "name": "CVE-2024-36927", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36927" }, { "name": "CVE-2024-36979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36979" }, { "name": "CVE-2024-38538", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38538" }, { "name": "CVE-2021-47018", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47018" }, { "name": "CVE-2021-47257", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47257" }, { "name": "CVE-2021-47304", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47304" }, { "name": "CVE-2021-47579", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47579" }, { "name": "CVE-2021-47624", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47624" }, { "name": "CVE-2022-48757", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48757" }, { "name": "CVE-2023-52471", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52471" }, { "name": "CVE-2023-52775", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52775" }, { "name": "CVE-2024-26837", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26837" }, { "name": "CVE-2024-39472", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39472" }, { "name": "CVE-2024-37891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891" }, { "name": "CVE-2024-6345", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345" }, { "name": "CVE-2024-38808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38808" }, { "name": "CVE-2024-38809", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38809" }, { "name": "CVE-2024-27267", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27267" }, { "name": "CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "name": "CVE-2024-42232", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42232" }, { "name": "CVE-2024-42236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42236" }, { "name": "CVE-2024-42244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42244" }, { "name": "CVE-2024-42247", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42247" }, { "name": "CVE-2023-4692", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4692" }, { "name": "CVE-2023-4693", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4693" }, { "name": "CVE-2023-7008", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008" }, { "name": "CVE-2024-1048", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1048" }, { "name": "CVE-2024-6232", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232" }, { "name": "CVE-2024-6119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119" }, { "name": "CVE-2024-39338", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338" }, { "name": "CVE-2024-39689", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39689" }, { "name": "CVE-2024-45491", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45491" }, { "name": "CVE-2024-45492", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45492" }, { "name": "CVE-2024-38816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816" }, { "name": "CVE-2024-41042", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41042" }, { "name": "CVE-2024-42238", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42238" }, { "name": "CVE-2024-42259", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42259" }, { "name": "CVE-2024-43824", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43824" }, { "name": "CVE-2024-43833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43833" }, { "name": "CVE-2024-43858", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43858" }, { "name": "CVE-2021-42694", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42694" }, { "name": "CVE-2023-50314", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50314" }, { "name": "CVE-2024-34155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155" }, { "name": "CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "name": "CVE-2024-34158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158" }, { "name": "CVE-2024-42252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42252" }, { "name": "CVE-2024-43832", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43832" }, { "name": "CVE-2024-37370", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37370" }, { "name": "CVE-2024-37371", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371" }, { "name": "CVE-2024-45296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296" }, { "name": "CVE-2024-42251", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42251" }, { "name": "CVE-2021-43980", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43980" }, { "name": "CVE-2023-20584", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20584" }, { "name": "CVE-2023-31356", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31356" }, { "name": "CVE-2023-36328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36328" }, { "name": "CVE-2023-48161", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48161" }, { "name": "CVE-2023-5115", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5115" }, { "name": "CVE-2023-52596", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52596" }, { "name": "CVE-2023-5764", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5764" }, { "name": "CVE-2024-21529", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21529" }, { "name": "CVE-2024-21534", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21534" }, { "name": "CVE-2024-25620", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25620" }, { "name": "CVE-2024-26147", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26147" }, { "name": "CVE-2024-26713", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26713" }, { "name": "CVE-2024-26721", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26721" }, { "name": "CVE-2024-26823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26823" }, { "name": "CVE-2024-30203", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30203" }, { "name": "CVE-2024-30205", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30205" }, { "name": "CVE-2024-31882", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31882" }, { "name": "CVE-2024-34447", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447" }, { "name": "CVE-2024-35136", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35136" }, { "name": "CVE-2024-35152", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35152" }, { "name": "CVE-2024-37529", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37529" }, { "name": "CVE-2024-38286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286" }, { "name": "CVE-2024-39331", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39331" }, { "name": "CVE-2024-42254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42254" }, { "name": "CVE-2024-42255", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42255" }, { "name": "CVE-2024-42256", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42256" }, { "name": "CVE-2024-42258", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42258" }, { "name": "CVE-2024-42460", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42460" }, { "name": "CVE-2024-43796", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43796" }, { "name": "CVE-2024-43799", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43799" }, { "name": "CVE-2024-43800", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43800" }, { "name": "CVE-2024-43857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43857" }, { "name": "CVE-2024-45490", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45490" }, { "name": "CVE-2024-45590", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45590" }, { "name": "CVE-2024-45801", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45801" }, { "name": "CVE-2024-46982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46982" }, { "name": "CVE-2024-47764", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47764" }, { "name": "CVE-2024-47874", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47874" }, { "name": "CVE-2024-47875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47875" }, { "name": "CVE-2024-7592", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592" }, { "name": "CVE-2024-8088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088" } ], "initial_release_date": "2024-11-08T00:00:00", "last_revision_date": "2024-11-08T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0958", "revisions": [ { "description": "Version initiale", "revision_date": "2024-11-08T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": "2024-11-05", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174802", "url": "https://www.ibm.com/support/pages/node/7174802" }, { "published_at": "2024-11-01", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174634", "url": "https://www.ibm.com/support/pages/node/7174634" }, { "published_at": "2024-11-01", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174639", "url": "https://www.ibm.com/support/pages/node/7174639" }, { "published_at": "2024-11-08", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175196", "url": "https://www.ibm.com/support/pages/node/7175196" }, { "published_at": "2024-11-07", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175086", "url": "https://www.ibm.com/support/pages/node/7175086" }, { "published_at": "2024-11-08", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175192", "url": "https://www.ibm.com/support/pages/node/7175192" }, { "published_at": "2024-11-05", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174799", "url": "https://www.ibm.com/support/pages/node/7174799" }, { "published_at": "2024-11-05", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174797", "url": "https://www.ibm.com/support/pages/node/7174797" }, { "published_at": "2024-11-06", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174945", "url": "https://www.ibm.com/support/pages/node/7174945" }, { "published_at": "2024-11-05", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174912", "url": "https://www.ibm.com/support/pages/node/7174912" }, { "published_at": "2024-11-07", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175166", "url": "https://www.ibm.com/support/pages/node/7175166" } ] }
CERTFR-2024-AVI-0873
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
IBM | Sterling | Sterling B2B Integrator versions 6.x antérieures à 6.1.2.5_1 | ||
IBM | Sterling | Sterling B2B Integrator versions 6.2.x antérieures à 6.2.0.3 | ||
IBM | QRadar | Security QRadar EDR versions 3.12.x antérieures à 3.12.12 | ||
IBM | QRadar Suite Software | QRadar Suite versions antérieures à 1.10.26.0 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Sterling B2B Integrator versions 6.x ant\u00e9rieures \u00e0 6.1.2.5_1", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling B2B Integrator versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.3", "product": { "name": "Sterling", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.12", "product": { "name": "QRadar", "vendor": { "name": "IBM", "scada": false } } }, { "description": "QRadar Suite versions ant\u00e9rieures \u00e0 1.10.26.0", "product": { "name": "QRadar Suite Software", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-52356", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52356" }, { "name": "CVE-2018-15209", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15209" }, { "name": "CVE-2023-25433", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25433" }, { "name": "CVE-2024-34158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158" }, { "name": "CVE-2022-24999", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24999" }, { "name": "CVE-2024-5569", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5569" }, { "name": "CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "name": "CVE-2023-6228", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6228" }, { "name": "CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "name": "CVE-2024-42367", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42367" }, { "name": "CVE-2024-34750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750" }, { "name": "CVE-2024-39338", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338" }, { "name": "CVE-2024-41818", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41818" }, { "name": "CVE-2023-50314", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50314" }, { "name": "CVE-2023-26136", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26136" }, { "name": "CVE-2024-6221", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6221" }, { "name": "CVE-2024-34155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155" }, { "name": "CVE-2024-31903", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31903" }, { "name": "CVE-2024-24789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789" }, { "name": "CVE-2024-6345", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345" } ], "initial_release_date": "2024-10-11T00:00:00", "last_revision_date": "2024-10-11T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0873", "revisions": [ { "description": "Version initiale", "revision_date": "2024-10-11T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": "2024-10-04", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7172233", "url": "https://www.ibm.com/support/pages/node/7172233" }, { "published_at": "2024-10-04", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7172211", "url": "https://www.ibm.com/support/pages/node/7172211" }, { "published_at": "2024-10-09", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7172678", "url": "https://www.ibm.com/support/pages/node/7172678" } ] }
CERTFR-2025-AVI-0855
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | Junos OS | Junos OS versions 24.4 antérieures à 24.4R2 | ||
Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 22.4R3-S8-EVO | ||
Juniper Networks | Junos OS | Junos OS versions 23.4 antérieures à 23.4R2-S5 | ||
Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S4-EVO | ||
Juniper Networks | Junos OS | Junos OS versions antérieures à 22.4R3-S8 | ||
Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.2-EVO antérieures à 24.2R2-S2-EVO | ||
Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.4-EVO antérieures à 24.4R2-EVO | ||
Juniper Networks | Junos Space | Junos Space versions antérieures à 24.1R4 | ||
Juniper Networks | Security Director | Security Director Policy Enforcer versions antérieures à 23.1R1 Hotpatch v3 | ||
Juniper Networks | Junos Space | Junos Space Security Director versions antérieures à 24.1R4 | ||
Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R2-S5-EVO | ||
Juniper Networks | Junos OS | Junos OS versions 23.2 antérieures à 23.2R2-S4 | ||
Juniper Networks | Junos OS | Junos OS versions 24.2 antérieures à 24.2R2-S1 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Junos OS versions 24.4 ant\u00e9rieures \u00e0 24.4R2", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R3-S8-EVO", "product": { "name": "Junos OS Evolved", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2-S5", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S4-EVO", "product": { "name": "Junos OS Evolved", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions ant\u00e9rieures \u00e0 22.4R3-S8", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-S2-EVO", "product": { "name": "Junos OS Evolved", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS Evolved versions 24.4-EVO ant\u00e9rieures \u00e0 24.4R2-EVO", "product": { "name": "Junos OS Evolved", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R4", "product": { "name": "Junos Space", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Security Director Policy Enforcer versions ant\u00e9rieures \u00e0 23.1R1 Hotpatch v3", "product": { "name": "Security Director", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos Space Security Director versions ant\u00e9rieures \u00e0 24.1R4", "product": { "name": "Junos Space", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-S5-EVO", "product": { "name": "Junos OS Evolved", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S4", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 24.2 ant\u00e9rieures \u00e0 24.2R2-S1", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-24795", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24795" }, { "name": "CVE-2024-36903", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36903" }, { "name": "CVE-2023-44431", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44431" }, { "name": "CVE-2021-47606", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47606" }, { "name": "CVE-2025-59993", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59993" }, { "name": "CVE-2025-59997", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59997" }, { "name": "CVE-2023-7104", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104" }, { "name": "CVE-2025-59995", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59995" }, { "name": "CVE-2024-21235", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21235" }, { "name": "CVE-2023-28466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28466" }, { "name": "CVE-2024-36921", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36921" }, { "name": "CVE-2025-59986", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59986" }, { "name": "CVE-2025-60009", "url": "https://www.cve.org/CVERecord?id=CVE-2025-60009" }, { "name": "CVE-2025-59989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59989" }, { "name": "CVE-2024-26897", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26897" }, { "name": "CVE-2023-46103", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46103" }, { "name": "CVE-2024-27052", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27052" }, { "name": "CVE-2023-2235", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2235" }, { "name": "CVE-2025-59999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59999" }, { "name": "CVE-2025-59994", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59994" }, { "name": "CVE-2024-4076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4076" }, { "name": "CVE-2025-59967", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59967" }, { "name": "CVE-2022-24805", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24805" }, { "name": "CVE-2024-12797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797" }, { "name": "CVE-2023-3390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3390" }, { "name": "CVE-2024-37356", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37356" }, { "name": "CVE-2024-47538", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47538" }, { "name": "CVE-2023-4004", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4004" }, { "name": "CVE-2024-21823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21823" }, { "name": "CVE-2025-59991", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59991" }, { "name": "CVE-2024-5564", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5564" }, { "name": "CVE-2024-26600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26600" }, { "name": "CVE-2023-28746", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28746" }, { "name": "CVE-2023-52864", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52864" }, { "name": "CVE-2025-26600", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26600" }, { "name": "CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "name": "CVE-2024-27280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27280" }, { "name": "CVE-2024-36929", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36929" }, { "name": "CVE-2023-35788", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35788" }, { "name": "CVE-2025-59982", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59982" }, { "name": "CVE-2024-1975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975" }, { "name": "CVE-2023-43785", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43785" }, { "name": "CVE-2024-30205", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30205" }, { "name": "CVE-2018-17247", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17247" }, { "name": "CVE-2025-60004", "url": "https://www.cve.org/CVERecord?id=CVE-2025-60004" }, { "name": "CVE-2023-51594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51594" }, { "name": "CVE-2024-22025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22025" }, { "name": "CVE-2023-50229", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50229" }, { "name": "CVE-2025-59974", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59974" }, { "name": "CVE-2025-26598", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26598" }, { "name": "CVE-2018-3824", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3824" }, { "name": "CVE-2024-40928", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40928" }, { "name": "CVE-2024-43398", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43398" }, { "name": "CVE-2024-8508", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8508" }, { "name": "CVE-2024-36020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36020" }, { "name": "CVE-2021-45105", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45105" }, { "name": "CVE-2025-59981", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59981" }, { "name": "CVE-2023-31248", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31248" }, { "name": "CVE-2024-1737", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737" }, { "name": "CVE-2023-25193", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25193" }, { "name": "CVE-2021-4104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4104" }, { "name": "CVE-2024-30203", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30203" }, { "name": "CVE-2023-3090", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3090" }, { "name": "CVE-2024-35937", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35937" }, { "name": "CVE-2025-59968", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59968" }, { "name": "CVE-2023-51592", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51592" }, { "name": "CVE-2025-59990", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59990" }, { "name": "CVE-2021-22146", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22146" }, { "name": "CVE-2025-59978", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59978" }, { "name": "CVE-2024-25629", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629" }, { "name": "CVE-2024-36017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36017" }, { "name": "CVE-2024-24806", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24806" }, { "name": "CVE-2024-27434", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27434" }, { "name": "CVE-2023-47038", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47038" }, { "name": "CVE-2024-35852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35852" }, { "name": "CVE-2024-38558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38558" }, { "name": "CVE-2025-59992", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59992" }, { "name": "CVE-2024-35845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35845" }, { "name": "CVE-2021-41072", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41072" }, { "name": "CVE-2025-60000", "url": "https://www.cve.org/CVERecord?id=CVE-2025-60000" }, { "name": "CVE-2022-24807", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24807" }, { "name": "CVE-2024-47607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47607" }, { "name": "CVE-2024-27065", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27065" }, { "name": "CVE-2024-36005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36005" }, { "name": "CVE-2023-45866", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45866" }, { "name": "CVE-2023-27349", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27349" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2015-5377", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5377" }, { "name": "CVE-2023-48161", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48161" }, { "name": "CVE-2022-24810", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24810" }, { "name": "CVE-2024-33621", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33621" }, { "name": "CVE-2024-27983", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983" }, { "name": "CVE-2025-60001", "url": "https://www.cve.org/CVERecord?id=CVE-2025-60001" }, { "name": "CVE-2024-5742", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5742" }, { "name": "CVE-2023-50230", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50230" }, { "name": "CVE-2025-52960", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52960" }, { "name": "CVE-2024-36922", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36922" }, { "name": "CVE-2025-59996", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59996" }, { "name": "CVE-2024-39487", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39487" }, { "name": "CVE-2024-27982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982" }, { "name": "CVE-2023-38575", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38575" }, { "name": "CVE-2024-35911", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35911" }, { "name": "CVE-2025-59957", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59957" }, { "name": "CVE-2025-59958", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59958" }, { "name": "CVE-2021-41043", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41043" }, { "name": "CVE-2018-17244", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17244" }, { "name": "CVE-2019-12900", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12900" }, { "name": "CVE-2024-39908", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39908" }, { "name": "CVE-2025-26597", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26597" }, { "name": "CVE-2024-36971", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36971" }, { "name": "CVE-2023-2603", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2603" }, { "name": "CVE-2024-41946", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41946" }, { "name": "CVE-2023-3776", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3776" }, { "name": "CVE-2024-42934", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42934" }, { "name": "CVE-2023-51580", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51580" }, { "name": "CVE-2024-35848", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35848" }, { "name": "CVE-2024-27417", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27417" }, { "name": "CVE-2023-21102", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21102" }, { "name": "CVE-2024-27281", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27281" }, { "name": "CVE-2025-59983", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59983" }, { "name": "CVE-2024-36941", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36941" }, { "name": "CVE-2024-2236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236" }, { "name": "CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "name": "CVE-2024-35969", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35969" }, { "name": "CVE-2021-45046", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45046" }, { "name": "CVE-2025-60006", "url": "https://www.cve.org/CVERecord?id=CVE-2025-60006" }, { "name": "CVE-2024-36489", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36489" }, { "name": "CVE-2015-1427", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1427" }, { "name": "CVE-2024-38575", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38575" }, { "name": "CVE-2024-35899", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35899" }, { "name": "CVE-2024-35823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35823" }, { "name": "CVE-2024-40954", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40954" }, { "name": "CVE-2024-9632", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9632" }, { "name": "CVE-2023-38408", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38408" }, { "name": "CVE-2025-26595", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26595" }, { "name": "CVE-2024-26868", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26868" }, { "name": "CVE-2023-43787", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43787" }, { "name": "CVE-2023-43786", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43786" }, { "name": "CVE-2024-8235", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8235" }, { "name": "CVE-2023-4147", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4147" }, { "name": "CVE-2025-59977", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59977" }, { "name": "CVE-2023-6004", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6004" }, { "name": "CVE-2023-3610", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3610" }, { "name": "CVE-2025-26596", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26596" }, { "name": "CVE-2024-4603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603" }, { "name": "CVE-2022-48622", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48622" }, { "name": "CVE-2021-42550", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42550" }, { "name": "CVE-2021-44228", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228" }, { "name": "CVE-2024-26828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26828" }, { "name": "CVE-2025-59998", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59998" }, { "name": "CVE-2024-26808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26808" }, { "name": "CVE-2024-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30204" }, { "name": "CVE-2025-60002", "url": "https://www.cve.org/CVERecord?id=CVE-2025-60002" }, { "name": "CVE-2023-35001", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35001" }, { "name": "CVE-2024-27282", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27282" }, { "name": "CVE-2018-3831", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3831" }, { "name": "CVE-2023-43490", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43490" }, { "name": "CVE-2025-59976", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59976" }, { "name": "CVE-2025-59980", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59980" }, { "name": "CVE-2025-26599", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26599" }, { "name": "CVE-2024-47615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47615" }, { "name": "CVE-2018-3823", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3823" }, { "name": "CVE-2023-22655", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22655" }, { "name": "CVE-2024-6126", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6126" }, { "name": "CVE-2023-4911", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911" }, { "name": "CVE-2023-39368", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39368" }, { "name": "CVE-2021-44832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832" }, { "name": "CVE-2024-26853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26853" }, { "name": "CVE-2025-59975", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59975" }, { "name": "CVE-2025-0624", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0624" }, { "name": "CVE-2025-59987", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59987" }, { "name": "CVE-2024-40958", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40958" }, { "name": "CVE-2018-3826", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3826" }, { "name": "CVE-2025-26601", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26601" }, { "name": "CVE-2024-52337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52337" }, { "name": "CVE-2025-59985", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59985" }, { "name": "CVE-2025-11198", "url": "https://www.cve.org/CVERecord?id=CVE-2025-11198" }, { "name": "CVE-2022-24806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24806" }, { "name": "CVE-2023-32233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32233" }, { "name": "CVE-2024-35789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35789" }, { "name": "CVE-2024-26327", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26327" }, { "name": "CVE-2015-3253", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3253" }, { "name": "CVE-2025-59964", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59964" }, { "name": "CVE-2025-59988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59988" }, { "name": "CVE-2024-21210", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21210" }, { "name": "CVE-2024-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511" }, { "name": "CVE-2024-34397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34397" }, { "name": "CVE-2023-45733", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45733" }, { "name": "CVE-2021-40153", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40153" }, { "name": "CVE-2024-6655", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6655" }, { "name": "CVE-2024-41123", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41123" }, { "name": "CVE-2024-27049", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27049" }, { "name": "CVE-2025-59984", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59984" }, { "name": "CVE-2025-52961", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52961" }, { "name": "CVE-2023-51589", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51589" }, { "name": "CVE-2024-21217", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21217" }, { "name": "CVE-2024-28182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182" }, { "name": "CVE-2021-3903", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3903" }, { "name": "CVE-2024-35800", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35800" }, { "name": "CVE-2023-2124", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2124" }, { "name": "CVE-2023-51596", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51596" }, { "name": "CVE-2025-60010", "url": "https://www.cve.org/CVERecord?id=CVE-2025-60010" }, { "name": "CVE-2023-51764", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51764" }, { "name": "CVE-2025-26594", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26594" }, { "name": "CVE-2024-6409", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6409" }, { "name": "CVE-2024-49761", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49761" }, { "name": "CVE-2022-24808", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24808" }, { "name": "CVE-2025-59962", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59962" }, { "name": "CVE-2024-21208", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21208" }, { "name": "CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "name": "CVE-2024-40961", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40961" } ], "initial_release_date": "2025-10-09T00:00:00", "last_revision_date": "2025-10-09T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0855", "revisions": [ { "description": "Version initiale", "revision_date": "2025-10-09T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks", "vendor_advisories": [ { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103140", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-XSS-vulnerabilities-resolved-in-24-1R4-release" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103141", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R4-release" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103163", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-Multiple-OS-command-injection-vulnerabilities-fixed-CVE-2025-60006" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103168", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Device-allows-login-for-user-with-expired-password-CVE-2025-60010" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103171", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Reflected-client-side-HTTP-parameter-pollution-vulnerability-in-web-interface-CVE-2025-59977" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103167", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-When-a-user-with-the-name-ftp-or-anonymous-is-configured-unauthenticated-filesystem-access-is-allowed-CVE-2025-59980" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103156", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7024X-ACX7100-32C-ACX7100-48L-ACX7348-ACX7509-When-specific-valid-multicast-traffic-is-received-on-the-L3-interface-a-vulnerable-device-evo-pfemand-crashes-and-restarts-CVE-2025-59967" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103437", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Security-Director-Policy-Enforcer-An-unrestricted-API-allows-a-network-based-unauthenticated-attacker-to-deploy-malicious-vSRX-images-to-VMWare-NSX-Server-CVE-2025-11198" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103172", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Flooding-device-with-inbound-API-calls-leads-to-WebUI-and-CLI-management-access-DoS-CVE-2025-59975" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103157", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-sensitive-resources-in-web-interface-CVE-2025-59968" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103170", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Arbitrary-file-download-vulnerability-in-web-interface-CVE-2025-59976" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103139", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103151", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-BGP-sharding-enabled-change-in-indirect-next-hop-can-cause-RPD-crash-CVE-2025-59962" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103153", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX4700-When-forwarding-options-sampling-is-enabled-any-traffic-destined-to-the-RE-will-cause-the-forwarding-line-card-to-crash-and-restart-CVE-2025-59964" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103147", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-When-firewall-filter-rejects-traffic-these-packets-are-erroneously-sent-to-the-RE-CVE-2025-59958" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103144", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-except-PTX10003-An-unauthenticated-adjacent-attacker-sending-specific-valid-traffic-can-cause-a-memory-leak-in-cfmman-leading-to-FPC-crash-and-restart-CVE-2025-52961" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103143", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Receipt-of-specific-SIP-packets-in-a-high-utilization-situation-causes-a-flowd-crash-CVE-2025-52960" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103146", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-An-attacker-with-physical-access-can-open-a-persistent-backdoor-CVE-2025-59957" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103138", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4-by-upgrading-Log4j-Java-library-to-2-23-1-and-ElasticSearch-to-6-8-17" }, { "published_at": "2025-10-08", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103165", "url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Specific-BGP-EVPN-update-message-causes-rpd-crash-CVE-2025-60004" } ] }
CERTFR-2024-AVI-0741
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | Secure Analytics | Juniper Secure Analytics versions antérieures à 7.5.0 UP9 IF02 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Juniper Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP9 IF02", "product": { "name": "Secure Analytics", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-29483", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29483" }, { "name": "CVE-2024-42472", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42472" }, { "name": "CVE-2024-26934", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26934" }, { "name": "CVE-2023-52477", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52477" }, { "name": "CVE-2023-52675", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52675" }, { "name": "CVE-2023-4692", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4692" }, { "name": "CVE-2024-27059", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27059" }, { "name": "CVE-2024-26656", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26656" }, { "name": "CVE-2024-28834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834" }, { "name": "CVE-2023-38264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38264" }, { "name": "CVE-2024-26974", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26974" }, { "name": "CVE-2024-26897", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26897" }, { "name": "CVE-2021-47055", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47055" }, { "name": "CVE-2020-36777", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36777" }, { "name": "CVE-2023-43788", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43788" }, { "name": "CVE-2024-27052", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27052" }, { "name": "CVE-2023-52425", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425" }, { "name": "CVE-2024-26585", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26585" }, { "name": "CVE-2024-25744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25744" }, { "name": "CVE-2024-26973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26973" }, { "name": "CVE-2024-33602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602" }, { "name": "CVE-2024-27397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27397" }, { "name": "CVE-2024-35854", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35854" }, { "name": "CVE-2023-52878", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52878" }, { "name": "CVE-2021-47185", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47185" }, { "name": "CVE-2024-23650", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23650" }, { "name": "CVE-2024-26603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26603" }, { "name": "CVE-2024-26964", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26964" }, { "name": "CVE-2024-5564", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5564" }, { "name": "CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "name": "CVE-2024-26993", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26993" }, { "name": "CVE-2019-25162", "url": "https://www.cve.org/CVERecord?id=CVE-2019-25162" }, { "name": "CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "name": "CVE-2023-39321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39321" }, { "name": "CVE-2024-3933", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3933" }, { "name": "CVE-2024-1975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975" }, { "name": "CVE-2023-52669", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52669" }, { "name": "CVE-2019-11358", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358" }, { "name": "CVE-2020-15778", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15778" }, { "name": "CVE-2022-3287", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3287" }, { "name": "CVE-2024-36004", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36004" }, { "name": "CVE-2024-26859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26859" }, { "name": "CVE-2020-13936", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13936" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2024-29857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857" }, { "name": "CVE-2024-35959", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35959" }, { "name": "CVE-2018-20060", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20060" }, { "name": "CVE-2024-35855", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35855" }, { "name": "CVE-2024-1737", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737" }, { "name": "CVE-2023-25193", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25193" }, { "name": "CVE-2024-33600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600" }, { "name": "CVE-2024-3652", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3652" }, { "name": "CVE-2024-26615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26615" }, { "name": "CVE-2023-45802", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45802" }, { "name": "CVE-2024-26801", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26801" }, { "name": "CVE-2024-36007", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36007" }, { "name": "CVE-2021-47311", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47311" }, { "name": "CVE-2023-3635", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3635" }, { "name": "CVE-2024-26643", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26643" }, { "name": "CVE-2024-26779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26779" }, { "name": "CVE-2024-32021", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32021" }, { "name": "CVE-2024-33599", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599" }, { "name": "CVE-2024-25629", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629" }, { "name": "CVE-2024-28180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180" }, { "name": "CVE-2024-24806", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24806" }, { "name": "CVE-2024-35852", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35852" }, { "name": "CVE-2024-23307", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23307" }, { "name": "CVE-2024-30172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172" }, { "name": "CVE-2023-52528", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52528" }, { "name": "CVE-2024-27048", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27048" }, { "name": "CVE-2021-47013", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47013" }, { "name": "CVE-2023-52781", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52781" }, { "name": "CVE-2024-35845", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35845" }, { "name": "CVE-2021-41072", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41072" }, { "name": "CVE-2023-48795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795" }, { "name": "CVE-2021-47073", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47073" }, { "name": "CVE-2024-26804", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26804" }, { "name": "CVE-2024-26593", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26593" }, { "name": "CVE-2022-48627", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48627" }, { "name": "CVE-2021-47171", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47171" }, { "name": "CVE-2024-26743", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26743" }, { "name": "CVE-2023-52686", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52686" }, { "name": "CVE-2021-47236", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47236" }, { "name": "CVE-2023-39318", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318" }, { "name": "CVE-2023-6240", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6240" }, { "name": "CVE-2024-32004", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32004" }, { "name": "CVE-2021-47118", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47118" }, { "name": "CVE-2024-35890", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35890" }, { "name": "CVE-2020-23064", "url": "https://www.cve.org/CVERecord?id=CVE-2020-23064" }, { "name": "CVE-2023-6918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6918" }, { "name": "CVE-2024-22195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195" }, { "name": "CVE-2023-52877", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52877" }, { "name": "CVE-2024-21011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21011" }, { "name": "CVE-2024-32020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32020" }, { "name": "CVE-2024-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450" }, { "name": "CVE-2023-45803", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803" }, { "name": "CVE-2023-39319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319" }, { "name": "CVE-2024-32487", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32487" }, { "name": "CVE-2024-26826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26826" }, { "name": "CVE-2024-27056", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27056" }, { "name": "CVE-2024-26583", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26583" }, { "name": "CVE-2024-26642", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26642" }, { "name": "CVE-2021-47153", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47153" }, { "name": "CVE-2024-35888", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35888" }, { "name": "CVE-2023-52700", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52700" }, { "name": "CVE-2023-31122", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31122" }, { "name": "CVE-2023-52439", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52439" }, { "name": "CVE-2021-47495", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47495" }, { "name": "CVE-2024-26675", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26675" }, { "name": "CVE-2019-14865", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14865" }, { "name": "CVE-2024-26906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26906" }, { "name": "CVE-2024-26610", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26610" }, { "name": "CVE-2024-2357", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2357" }, { "name": "CVE-2024-26584", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26584" }, { "name": "CVE-2024-21094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21094" }, { "name": "CVE-2024-26919", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26919" }, { "name": "CVE-2023-52445", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52445" }, { "name": "CVE-2024-33601", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601" }, { "name": "CVE-2024-3019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3019" }, { "name": "CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "name": "CVE-2024-27014", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27014" }, { "name": "CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "name": "CVE-2024-32465", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32465" }, { "name": "CVE-2024-22365", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365" }, { "name": "CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "name": "CVE-2023-43789", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43789" }, { "name": "CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "name": "CVE-2024-25062", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062" }, { "name": "CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "name": "CVE-2024-2398", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398" }, { "name": "CVE-2024-26892", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26892" }, { "name": "CVE-2024-35835", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35835" }, { "name": "CVE-2024-26735", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26735" }, { "name": "CVE-2023-52881", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52881" }, { "name": "CVE-2023-4693", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4693" }, { "name": "CVE-2021-46972", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46972" }, { "name": "CVE-2023-52578", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52578" }, { "name": "CVE-2024-26461", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461" }, { "name": "CVE-2024-34750", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750" }, { "name": "CVE-2024-26458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458" }, { "name": "CVE-2021-46934", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46934" }, { "name": "CVE-2024-1048", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1048" }, { "name": "CVE-2023-6004", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6004" }, { "name": "CVE-2023-52598", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52598" }, { "name": "CVE-2020-11022", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022" }, { "name": "CVE-2023-7008", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008" }, { "name": "CVE-2024-26659", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26659" }, { "name": "CVE-2023-52667", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52667" }, { "name": "CVE-2024-26933", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26933" }, { "name": "CVE-2023-31484", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484" }, { "name": "CVE-2023-52703", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52703" }, { "name": "CVE-2023-52594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52594" }, { "name": "CVE-2024-26693", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26693" }, { "name": "CVE-2023-52595", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52595" }, { "name": "CVE-2024-30171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171" }, { "name": "CVE-2023-45287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287" }, { "name": "CVE-2022-48624", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48624" }, { "name": "CVE-2024-26759", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26759" }, { "name": "CVE-2023-52464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52464" }, { "name": "CVE-2023-52813", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52813" }, { "name": "CVE-2024-35838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35838" }, { "name": "CVE-2023-52513", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52513" }, { "name": "CVE-2023-52615", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52615" }, { "name": "CVE-2023-52610", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52610" }, { "name": "CVE-2023-52560", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52560" }, { "name": "CVE-2024-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651" }, { "name": "CVE-2023-39322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39322" }, { "name": "CVE-2023-52606", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52606" }, { "name": "CVE-2021-47069", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47069" }, { "name": "CVE-2024-35960", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35960" }, { "name": "CVE-2022-39253", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39253" }, { "name": "CVE-2024-34064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064" }, { "name": "CVE-2023-2953", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953" }, { "name": "CVE-2024-26872", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26872" }, { "name": "CVE-2020-26555", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26555" }, { "name": "CVE-2024-26901", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26901" }, { "name": "CVE-2023-39326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326" }, { "name": "CVE-2024-21085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21085" }, { "name": "CVE-2023-29409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409" }, { "name": "CVE-2024-35789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35789" }, { "name": "CVE-2023-52835", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52835" }, { "name": "CVE-2024-26982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26982" }, { "name": "CVE-2021-47310", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47310" }, { "name": "CVE-2023-52626", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52626" }, { "name": "CVE-2024-0340", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0340" }, { "name": "CVE-2024-26744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26744" }, { "name": "CVE-2024-24786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786" }, { "name": "CVE-2024-35958", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35958" }, { "name": "CVE-2021-47456", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47456" }, { "name": "CVE-2021-40153", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40153" }, { "name": "CVE-2024-32002", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32002" }, { "name": "CVE-2022-48669", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48669" }, { "name": "CVE-2023-52565", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52565" }, { "name": "CVE-2023-52520", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52520" }, { "name": "CVE-2021-47356", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47356" }, { "name": "CVE-2024-26694", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26694" }, { "name": "CVE-2024-2961", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961" }, { "name": "CVE-2024-26664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26664" }, { "name": "CVE-2024-28182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182" }, { "name": "CVE-2021-47353", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47353" }, { "name": "CVE-2023-6597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597" }, { "name": "CVE-2023-52607", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52607" }, { "name": "CVE-2024-6345", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345" }, { "name": "CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "name": "CVE-2018-25091", "url": "https://www.cve.org/CVERecord?id=CVE-2018-25091" }, { "name": "CVE-2023-5090", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5090" }, { "name": "CVE-2024-27410", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27410" }, { "name": "CVE-2021-46909", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46909" }, { "name": "CVE-2024-35853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35853" }, { "name": "CVE-2024-26907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26907" } ], "initial_release_date": "2024-09-05T00:00:00", "last_revision_date": "2024-10-15T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0741", "revisions": [ { "description": "Version initiale", "revision_date": "2024-09-05T00:00:00.000000" }, { "description": "Ajout r\u00e9f\u00e9rence \u00e9diteur", "revision_date": "2024-09-06T00:00:00.000000" }, { "description": "Correction d\u0027identifiants CVE erron\u00e9s", "revision_date": "2024-10-15T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Secure Analytics. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics", "vendor_advisories": [ { "published_at": "2024-09-30", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA86686", "url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP9-IF02" } ] }
CERTFR-2024-AVI-0797
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
IBM | Spectrum | Spectrum Control versions 5.4.x antérieures à 5.4.12.1 | ||
IBM | Db2 | DB2 Query Management Facility pour z/OS versions 12.2 et 13.1 sans la dernière version du JRE | ||
IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP9 IF03 | ||
IBM | AIX | AIX version 7.3 avec Python versions 3.9.x antérieures à 3.9.19.3 | ||
IBM | VIOS | VIOS version 4.1 avec Python versions 3.9.x antérieures à 3.9.19.3 |
Title | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Spectrum Control versions 5.4.x ant\u00e9rieures \u00e0 5.4.12.1", "product": { "name": "Spectrum", "vendor": { "name": "IBM", "scada": false } } }, { "description": "DB2 Query Management Facility pour z/OS versions 12.2 et 13.1 sans la derni\u00e8re version du JRE", "product": { "name": "Db2", "vendor": { "name": "IBM", "scada": false } } }, { "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP9 IF03", "product": { "name": "QRadar SIEM", "vendor": { "name": "IBM", "scada": false } } }, { "description": "AIX version 7.3 avec Python versions 3.9.x ant\u00e9rieures \u00e0 3.9.19.3", "product": { "name": "AIX", "vendor": { "name": "IBM", "scada": false } } }, { "description": "VIOS version 4.1 avec Python versions 3.9.x ant\u00e9rieures \u00e0 3.9.19.3", "product": { "name": "VIOS", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-42472", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42472" }, { "name": "CVE-2024-37891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891" }, { "name": "CVE-2024-21144", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21144" }, { "name": "CVE-2024-3933", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3933" }, { "name": "CVE-2024-1975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975" }, { "name": "CVE-2024-1737", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737" }, { "name": "CVE-2024-25629", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629" }, { "name": "CVE-2024-21147", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21147" }, { "name": "CVE-2024-26906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26906" }, { "name": "CVE-2024-21140", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21140" }, { "name": "CVE-2024-38428", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428" }, { "name": "CVE-2024-2398", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398" }, { "name": "CVE-2024-21138", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21138" }, { "name": "CVE-2024-0397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397" }, { "name": "CVE-2024-21145", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21145" }, { "name": "CVE-2024-34064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064" }, { "name": "CVE-2024-4032", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032" }, { "name": "CVE-2024-26982", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26982" }, { "name": "CVE-2024-21131", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21131" }, { "name": "CVE-2024-22354", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22354" }, { "name": "CVE-2024-27267", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27267" }, { "name": "CVE-2024-6345", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345" } ], "initial_release_date": "2024-09-20T00:00:00", "last_revision_date": "2024-09-20T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0797", "revisions": [ { "description": "Version initiale", "revision_date": "2024-09-20T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": "2024-09-18", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7168925", "url": "https://www.ibm.com/support/pages/node/7168925" }, { "published_at": "2024-09-18", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7168815", "url": "https://www.ibm.com/support/pages/node/7168815" }, { "published_at": "2024-09-17", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7168787", "url": "https://www.ibm.com/support/pages/node/7168787" }, { "published_at": "2024-09-17", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7168639", "url": "https://www.ibm.com/support/pages/node/7168639" } ] }
opensuse-su-2024:14056-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "wget-1.24.5-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the wget-1.24.5-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14056", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14056-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38428 page", "url": "https://www.suse.com/security/cve/CVE-2024-38428/" } ], "title": "wget-1.24.5-2.1 on GA media", "tracking": { "current_release_date": "2024-06-18T00:00:00Z", "generator": { "date": "2024-06-18T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14056-1", "initial_release_date": "2024-06-18T00:00:00Z", "revision_history": [ { "date": "2024-06-18T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wget-1.24.5-2.1.aarch64", "product": { "name": "wget-1.24.5-2.1.aarch64", "product_id": "wget-1.24.5-2.1.aarch64" } }, { "category": "product_version", "name": "wget-lang-1.24.5-2.1.aarch64", "product": { "name": "wget-lang-1.24.5-2.1.aarch64", "product_id": "wget-lang-1.24.5-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-1.24.5-2.1.ppc64le", "product": { "name": "wget-1.24.5-2.1.ppc64le", "product_id": "wget-1.24.5-2.1.ppc64le" } }, { "category": "product_version", "name": "wget-lang-1.24.5-2.1.ppc64le", "product": { "name": "wget-lang-1.24.5-2.1.ppc64le", "product_id": "wget-lang-1.24.5-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-1.24.5-2.1.s390x", "product": { "name": "wget-1.24.5-2.1.s390x", "product_id": "wget-1.24.5-2.1.s390x" } }, { "category": "product_version", "name": "wget-lang-1.24.5-2.1.s390x", "product": { "name": "wget-lang-1.24.5-2.1.s390x", "product_id": "wget-lang-1.24.5-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wget-1.24.5-2.1.x86_64", "product": { "name": "wget-1.24.5-2.1.x86_64", "product_id": "wget-1.24.5-2.1.x86_64" } }, { "category": "product_version", "name": "wget-lang-1.24.5-2.1.x86_64", "product": { "name": "wget-lang-1.24.5-2.1.x86_64", "product_id": "wget-lang-1.24.5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-1.24.5-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-1.24.5-2.1.aarch64" }, "product_reference": "wget-1.24.5-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.24.5-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-1.24.5-2.1.ppc64le" }, "product_reference": "wget-1.24.5-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.24.5-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-1.24.5-2.1.s390x" }, "product_reference": "wget-1.24.5-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.24.5-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-1.24.5-2.1.x86_64" }, "product_reference": "wget-1.24.5-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-lang-1.24.5-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.aarch64" }, "product_reference": "wget-lang-1.24.5-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-lang-1.24.5-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.ppc64le" }, "product_reference": "wget-lang-1.24.5-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-lang-1.24.5-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.s390x" }, "product_reference": "wget-lang-1.24.5-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-lang-1.24.5-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.x86_64" }, "product_reference": "wget-lang-1.24.5-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38428" } ], "notes": [ { "category": "general", "text": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:wget-1.24.5-2.1.aarch64", "openSUSE Tumbleweed:wget-1.24.5-2.1.ppc64le", "openSUSE Tumbleweed:wget-1.24.5-2.1.s390x", "openSUSE Tumbleweed:wget-1.24.5-2.1.x86_64", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.aarch64", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.ppc64le", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.s390x", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38428", "url": "https://www.suse.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "SUSE Bug 1226419 for CVE-2024-38428", "url": "https://bugzilla.suse.com/1226419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:wget-1.24.5-2.1.aarch64", "openSUSE Tumbleweed:wget-1.24.5-2.1.ppc64le", "openSUSE Tumbleweed:wget-1.24.5-2.1.s390x", "openSUSE Tumbleweed:wget-1.24.5-2.1.x86_64", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.aarch64", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.ppc64le", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.s390x", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:wget-1.24.5-2.1.aarch64", "openSUSE Tumbleweed:wget-1.24.5-2.1.ppc64le", "openSUSE Tumbleweed:wget-1.24.5-2.1.s390x", "openSUSE Tumbleweed:wget-1.24.5-2.1.x86_64", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.aarch64", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.ppc64le", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.s390x", "openSUSE Tumbleweed:wget-lang-1.24.5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-18T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-38428" } ] }
WID-SEC-W-2024-1913
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer oder lokaler Angreifer kann mehrere Schwachstellen in Red Hat OpenShift Container Platform ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1913 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1913.json" }, { "category": "self", "summary": "WID-SEC-2024-1913 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1913" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5433 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5433" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5436 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5436" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5439 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5439" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5442 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5442" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5444 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5444" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5446 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5446" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5749 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5749" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6054 vom 2024-08-30", "url": "https://access.redhat.com/errata/RHSA-2024:6054" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12606 vom 2024-09-03", "url": "https://linux.oracle.com/errata/ELSA-2024-12606.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6159 vom 2024-09-03", "url": "https://access.redhat.com/errata/RHSA-2024:6159" }, { "category": "external", "summary": "ORACLE OVMSA-2024-0011 vom 2024-09-04", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-September/001099.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6011 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6011" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6409 vom 2024-09-11", "url": "https://access.redhat.com/errata/RHSA-2024:6409" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6667 vom 2024-09-13", "url": "https://access.redhat.com/errata/RHSA-2024:6667" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6642 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6642" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6755 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6755" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6687 vom 2024-09-19", "url": "https://access.redhat.com/errata/RHSA-2024:6687" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6685 vom 2024-09-19", "url": "https://access.redhat.com/errata/RHSA-2024:6685" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6998 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6998" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6994 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6994" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6995 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6995" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6997" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6811 vom 2024-09-25", "url": "https://access.redhat.com/errata/RHSA-2024:6811" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7237 vom 2024-09-26", "url": "https://access.redhat.com/errata/RHSA-2024:7237" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7174 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7174" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7436 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7436" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3722 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:3722" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3718 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:3718" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7624 vom 2024-10-03", "url": "https://access.redhat.com/errata/RHSA-2024:7624" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7184 vom 2024-10-03", "url": "https://access.redhat.com/errata/RHSA-2024:7184" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7324 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7324" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7744 vom 2024-10-07", "url": "https://access.redhat.com/errata/RHSA-2024:7744" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7323 vom 2024-10-07", "url": "https://access.redhat.com/errata/RHSA-2024:7323" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8040 vom 2024-10-14", "url": "https://access.redhat.com/errata/RHSA-2024:8040" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8677 vom 2024-10-30", "url": "https://access.redhat.com/errata/RHSA-2024:8677" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3803-1 vom 2024-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3849-1 vom 2024-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8856.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8876 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8876.html" }, { "category": "external", "summary": "Red Hat vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9089" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10135 vom 2024-11-21", "url": "https://access.redhat.com/errata/RHSA-2024:10135" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10775 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10775" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4250-1 vom 2024-12-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10823 vom 2024-12-12", "url": "https://access.redhat.com/errata/RHSA-2024:10823" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11562 vom 2025-01-02", "url": "https://access.redhat.com/errata/RHSA-2024:11562" }, { "category": "external", "summary": "IBM Security Bulletin 7180361 vom 2025-01-07", "url": "https://www.ibm.com/support/pages/node/7180361" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2727 vom 2025-01-10", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2727.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1116 vom 2025-02-13", "url": "https://access.redhat.com/errata/RHSA-2025:1116" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1038-1 vom 2025-03-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RDUSLVUE4ABN4A2UXKEXXYBVNZYOL62N/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1037-1 vom 2025-03-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HRXHLPSCYZEZQ6GJKOABY44N37DC5ST2/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1036-1 vom 2025-03-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020615.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14988-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-099 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-099.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20013-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021364.html" }, { "category": "external", "summary": "IBM Security Bulletin 7236419 vom 2025-06-30", "url": "https://www.ibm.com/support/pages/node/7236419" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11669 vom 2025-07-31", "url": "https://access.redhat.com/errata/RHSA-2025:11669" } ], "source_lang": "en-US", "title": "Red Hat OpenShift Container Platform: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-30T22:00:00.000+00:00", "generator": { "date": "2025-07-31T07:59:47.173+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-1913", "initial_release_date": "2024-08-22T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-22T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-08-29T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-02T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-03T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-04T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von ORACLE und Red Hat aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-18T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-23T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-26T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-13T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-30T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-06T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-08T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-14T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-12T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-26T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-15T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "39" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.6.4", "product_id": "T040030" } }, { "category": "product_version", "name": "10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus 10.1.6.4", "product_id": "T040030-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4" } } } ], "category": "product_name", "name": "Spectrum Protect Plus" }, { "branches": [ { "category": "product_version_range", "name": "\u003c6.1.9.7", "product": { "name": "IBM Storage Scale System \u003c6.1.9.7", "product_id": "T044961" } }, { "category": "product_version", "name": "6.1.9.7", "product": { "name": "IBM Storage Scale System 6.1.9.7", "product_id": "T044961-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.7" } } }, { "category": "product_version_range", "name": "\u003c6.2.3.0", "product": { "name": "IBM Storage Scale System \u003c6.2.3.0", "product_id": "T044962" } }, { "category": "product_version", "name": "6.2.3.0", "product": { "name": "IBM Storage Scale System 6.2.3.0", "product_id": "T044962-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.2.3.0" } } } ], "category": "product_name", "name": "Storage Scale System" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "Advanced Cluster Security for Kubernetes 4", "product": { "name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4", "product_id": "T027916", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4" } } }, { "category": "product_version", "name": "9", "product": { "name": "Red Hat Enterprise Linux 9", "product_id": "T038904", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version_range", "name": "Container Platform \u003c4.14.35", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.35", "product_id": "T037037" } }, { "category": "product_version", "name": "Container Platform 4.14.35", "product": { "name": "Red Hat OpenShift Container Platform 4.14.35", "product_id": "T037037-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.35" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.15.28", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.15.28", "product_id": "T037038" } }, { "category": "product_version", "name": "Container Platform 4.15.28", "product": { "name": "Red Hat OpenShift Container Platform 4.15.28", "product_id": "T037038-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.15.28" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.13.48", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.13.48", "product_id": "T037039" } }, { "category": "product_version", "name": "Container Platform 4.13.48", "product": { "name": "Red Hat OpenShift Container Platform 4.13.48", "product_id": "T037039-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.48" } } }, { "category": "product_version", "name": "CodeReady Workspaces", "product": { "name": "Red Hat OpenShift CodeReady Workspaces", "product_id": "T037618", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:codeready_workspaces" } } }, { "category": "product_version", "name": "Logging Subsystem 5.9.7", "product": { "name": "Red Hat OpenShift Logging Subsystem 5.9.7", "product_id": "T037939", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:logging_subsystem_5.9.7" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.38", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.38", "product_id": "T037940" } }, { "category": "product_version", "name": "Container Platform 4.14.38", "product": { "name": "Red Hat OpenShift Container Platform 4.14.38", "product_id": "T037940-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.38" } } }, { "category": "product_version_range", "name": "Data Foundation \u003c4.14.11", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.14.11", "product_id": "T037941" } }, { "category": "product_version", "name": "Data Foundation 4.14.11", "product": { "name": "Red Hat OpenShift Data Foundation 4.14.11", "product_id": "T037941-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation__4.14.11" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.15.42", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.15.42", "product_id": "T039989" } }, { "category": "product_version", "name": "Container Platform 4.15.42", "product": { "name": "Red Hat OpenShift Container Platform 4.15.42", "product_id": "T039989-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.15.42" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.54", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.54", "product_id": "T045757" } }, { "category": "product_version", "name": "Container Platform 4.14.54", "product": { "name": "Red Hat OpenShift Container Platform 4.14.54", "product_id": "T045757-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.54" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-15209", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2018-15209" }, { "cve": "CVE-2021-46939", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-46939" }, { "cve": "CVE-2021-47018", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47018" }, { "cve": "CVE-2021-47257", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47257" }, { "cve": "CVE-2021-47284", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47284" }, { "cve": "CVE-2021-47304", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47304" }, { "cve": "CVE-2021-47373", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47373" }, { "cve": "CVE-2021-47383", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47383" }, { "cve": "CVE-2021-47408", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47408" }, { "cve": "CVE-2021-47461", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47461" }, { "cve": "CVE-2021-47468", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47468" }, { "cve": "CVE-2021-47491", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47491" }, { "cve": "CVE-2021-47548", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47548" }, { "cve": "CVE-2021-47579", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47579" }, { "cve": "CVE-2021-47624", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47624" }, { "cve": "CVE-2022-48632", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2022-48632" }, { "cve": "CVE-2022-48637", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2022-48637" }, { "cve": "CVE-2022-48743", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2022-48743" }, { "cve": "CVE-2022-48747", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2022-48747" }, { "cve": "CVE-2022-48757", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2022-48757" }, { "cve": "CVE-2023-25433", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-25433" }, { "cve": "CVE-2023-28746", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-28746" }, { "cve": "CVE-2023-45142", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-45142" }, { "cve": "CVE-2023-45290", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-45290" }, { "cve": "CVE-2023-47108", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-47108" }, { "cve": "CVE-2023-48795", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52356", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52356" }, { "cve": "CVE-2023-52448", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52448" }, { "cve": "CVE-2023-52451", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52451" }, { "cve": "CVE-2023-52458", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52458" }, { "cve": "CVE-2023-52463", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52463" }, { "cve": "CVE-2023-52469", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52469" }, { "cve": "CVE-2023-52471", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52471" }, { "cve": "CVE-2023-52486", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52486" }, { "cve": "CVE-2023-52530", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52530" }, { "cve": "CVE-2023-52619", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52619" }, { "cve": "CVE-2023-52622", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52622" }, { "cve": "CVE-2023-52623", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52623" }, { "cve": "CVE-2023-52635", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52635" }, { "cve": "CVE-2023-52648", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52648" }, { "cve": "CVE-2023-52651", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52651" }, { "cve": "CVE-2023-52653", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52653" }, { "cve": "CVE-2023-52658", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52658" }, { "cve": "CVE-2023-52662", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52662" }, { "cve": "CVE-2023-52679", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52679" }, { "cve": "CVE-2023-52707", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52707" }, { "cve": "CVE-2023-52730", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52730" }, { "cve": "CVE-2023-52756", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52756" }, { "cve": "CVE-2023-52762", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52762" }, { "cve": "CVE-2023-52764", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52764" }, { "cve": "CVE-2023-52771", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52771" }, { "cve": "CVE-2023-52775", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52775" }, { "cve": "CVE-2023-52777", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52777" }, { "cve": "CVE-2023-52784", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52784" }, { "cve": "CVE-2023-52791", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52791" }, { "cve": "CVE-2023-52796", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52796" }, { "cve": "CVE-2023-52803", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52803" }, { "cve": "CVE-2023-52809", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52809" }, { "cve": "CVE-2023-52811", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52811" }, { "cve": "CVE-2023-52832", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52832" }, { "cve": "CVE-2023-52834", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52834" }, { "cve": "CVE-2023-52845", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52845" }, { "cve": "CVE-2023-52847", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52847" }, { "cve": "CVE-2023-52864", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52864" }, { "cve": "CVE-2023-52885", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52885" }, { "cve": "CVE-2023-6228", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-6228" }, { "cve": "CVE-2024-21823", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-21823" }, { "cve": "CVE-2024-2201", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-2201" }, { "cve": "CVE-2024-24788", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-24788" }, { "cve": "CVE-2024-24790", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-24790" }, { "cve": "CVE-2024-25739", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-25739" }, { "cve": "CVE-2024-26586", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26586" }, { "cve": "CVE-2024-26601", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26601" }, { "cve": "CVE-2024-26614", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26614" }, { "cve": "CVE-2024-26640", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26640" }, { "cve": "CVE-2024-26660", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26660" }, { "cve": "CVE-2024-26669", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26669" }, { "cve": "CVE-2024-26686", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26686" }, { "cve": "CVE-2024-26698", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26698" }, { "cve": "CVE-2024-26704", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26704" }, { "cve": "CVE-2024-26733", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26733" }, { "cve": "CVE-2024-26737", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26737" }, { "cve": "CVE-2024-26740", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26740" }, { "cve": "CVE-2024-26772", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26772" }, { "cve": "CVE-2024-26773", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26773" }, { "cve": "CVE-2024-26802", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26802" }, { "cve": "CVE-2024-26810", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26810" }, { "cve": "CVE-2024-26837", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26837" }, { "cve": "CVE-2024-26840", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26840" }, { "cve": "CVE-2024-26843", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26843" }, { "cve": "CVE-2024-26852", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26852" }, { "cve": "CVE-2024-26853", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26853" }, { "cve": "CVE-2024-26855", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26855" }, { "cve": "CVE-2024-26870", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26870" }, { "cve": "CVE-2024-26878", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26878" }, { "cve": "CVE-2024-26897", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26897" }, { "cve": "CVE-2024-26908", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26908" }, { "cve": "CVE-2024-26921", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26921" }, { "cve": "CVE-2024-26925", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26925" }, { "cve": "CVE-2024-26930", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26930" }, { "cve": "CVE-2024-26940", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26940" }, { "cve": "CVE-2024-26947", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26947" }, { "cve": "CVE-2024-26958", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26958" }, { "cve": "CVE-2024-26960", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26960" }, { "cve": "CVE-2024-26961", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26961" }, { "cve": "CVE-2024-27010", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27010" }, { "cve": "CVE-2024-27011", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27011" }, { "cve": "CVE-2024-27019", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27019" }, { "cve": "CVE-2024-27020", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27020" }, { "cve": "CVE-2024-27025", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27025" }, { "cve": "CVE-2024-27030", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27030" }, { "cve": "CVE-2024-27046", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27046" }, { "cve": "CVE-2024-27052", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27052" }, { "cve": "CVE-2024-27062", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27062" }, { "cve": "CVE-2024-27065", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27065" }, { "cve": "CVE-2024-27388", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27388" }, { "cve": "CVE-2024-27395", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27395" }, { "cve": "CVE-2024-27434", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27434" }, { "cve": "CVE-2024-31076", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-31076" }, { "cve": "CVE-2024-33621", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-33621" }, { "cve": "CVE-2024-34064", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-34064" }, { "cve": "CVE-2024-35789", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35789" }, { "cve": "CVE-2024-35790", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35790" }, { "cve": "CVE-2024-35801", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35801" }, { "cve": "CVE-2024-35807", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35807" }, { "cve": "CVE-2024-35810", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35810" }, { "cve": "CVE-2024-35814", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35814" }, { "cve": "CVE-2024-35823", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35823" }, { "cve": "CVE-2024-35824", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35824" }, { "cve": "CVE-2024-35845", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35845" }, { "cve": "CVE-2024-35847", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35847" }, { "cve": "CVE-2024-35852", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35852" }, { "cve": "CVE-2024-35876", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35876" }, { "cve": "CVE-2024-35885", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35885" }, { "cve": "CVE-2024-35893", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35893" }, { "cve": "CVE-2024-35896", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35896" }, { "cve": "CVE-2024-35897", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35897" }, { "cve": "CVE-2024-35899", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35899" }, { "cve": "CVE-2024-35900", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35900" }, { "cve": "CVE-2024-35907", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35907" }, { "cve": "CVE-2024-35910", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35910" }, { "cve": "CVE-2024-35912", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35912" }, { "cve": "CVE-2024-35924", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35924" }, { "cve": "CVE-2024-35925", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35925" }, { "cve": "CVE-2024-35930", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35930" }, { "cve": "CVE-2024-35937", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35937" }, { "cve": "CVE-2024-35938", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35938" }, { "cve": "CVE-2024-35946", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35946" }, { "cve": "CVE-2024-35947", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35947" }, { "cve": "CVE-2024-35952", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35952" }, { "cve": "CVE-2024-35962", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35962" }, { "cve": "CVE-2024-36000", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36000" }, { "cve": "CVE-2024-36005", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36005" }, { "cve": "CVE-2024-36006", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36006" }, { "cve": "CVE-2024-36010", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36010" }, { "cve": "CVE-2024-36016", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36016" }, { "cve": "CVE-2024-36017", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36017" }, { "cve": "CVE-2024-36020", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36020" }, { "cve": "CVE-2024-36025", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36025" }, { "cve": "CVE-2024-36270", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36270" }, { "cve": "CVE-2024-36286", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36286" }, { "cve": "CVE-2024-36489", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36489" }, { "cve": "CVE-2024-36886", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36886" }, { "cve": "CVE-2024-36889", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36889" }, { "cve": "CVE-2024-36896", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36896" }, { "cve": "CVE-2024-36904", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36904" }, { "cve": "CVE-2024-36905", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36905" }, { "cve": "CVE-2024-36917", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36917" }, { "cve": "CVE-2024-36921", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36921" }, { "cve": "CVE-2024-36922", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36922" }, { "cve": "CVE-2024-36927", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36927" }, { "cve": "CVE-2024-36929", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36929" }, { "cve": "CVE-2024-36933", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36933" }, { "cve": "CVE-2024-36940", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36940" }, { "cve": "CVE-2024-36941", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36941" }, { "cve": "CVE-2024-36945", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36945" }, { "cve": "CVE-2024-36950", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36950" }, { "cve": "CVE-2024-36954", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36954" }, { "cve": "CVE-2024-36960", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36960" }, { "cve": "CVE-2024-36971", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36971" }, { "cve": "CVE-2024-36978", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36978" }, { "cve": "CVE-2024-36979", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36979" }, { "cve": "CVE-2024-37370", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38384", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38384" }, { "cve": "CVE-2024-38428", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38428" }, { "cve": "CVE-2024-38473", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38538", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38538" }, { "cve": "CVE-2024-38555", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38555" }, { "cve": "CVE-2024-38556", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38556" }, { "cve": "CVE-2024-38573", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38573" }, { "cve": "CVE-2024-38575", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38575" }, { "cve": "CVE-2024-38586", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38586" }, { "cve": "CVE-2024-38596", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38596" }, { "cve": "CVE-2024-38598", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38598" }, { "cve": "CVE-2024-38615", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38615" }, { "cve": "CVE-2024-38627", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38627" }, { "cve": "CVE-2024-38663", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38663" }, { "cve": "CVE-2024-39276", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39276" }, { "cve": "CVE-2024-39472", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39472" }, { "cve": "CVE-2024-39476", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39476" }, { "cve": "CVE-2024-39487", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39487" }, { "cve": "CVE-2024-39502", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39502" }, { "cve": "CVE-2024-39573", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39573" }, { "cve": "CVE-2024-40897", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-40897" }, { "cve": "CVE-2024-40927", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-40927" }, { "cve": "CVE-2024-40974", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-40974" }, { "cve": "CVE-2024-6104", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-6104" }, { "cve": "CVE-2024-6345", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-6345" }, { "cve": "CVE-2024-6409", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-6409" } ] }
WID-SEC-W-2024-1386
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Wget ist ein Kommandozeilenprogramm zum Herunterladen von Dateien aus dem Internet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in wget ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1386 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1386.json" }, { "category": "self", "summary": "WID-SEC-2024-1386 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1386" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-06-16", "url": "https://github.com/advisories/GHSA-2j66-vp53-phjj" }, { "category": "external", "summary": "GNU.org Mailing List vom 2024-06-16", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2154-1 vom 2024-06-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018793.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2201-1 vom 2024-06-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6852-1 vom 2024-06-26", "url": "https://ubuntu.com/security/notices/USN-6852-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6852-2 vom 2024-06-27", "url": "https://ubuntu.com/security/notices/USN-6852-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2174-1 vom 2024-06-28", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SWPMU2XL6PDMNR7GAR42PDVM3EVKHYXC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2174-2 vom 2024-07-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018949.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4998 vom 2024-08-05", "url": "https://access.redhat.com/errata/RHSA-2024:4998" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06", "url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5299 vom 2024-08-14", "url": "https://linux.oracle.com/errata/ELSA-2024-5299.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5299 vom 2024-08-14", "url": "https://access.redhat.com/errata/RHSA-2024:5299" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6192 vom 2024-09-03", "url": "https://linux.oracle.com/errata/ELSA-2024-6192.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6192 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6192" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6208 vom 2024-09-03", "url": "https://access.redhat.com/errata/RHSA-2024:6208" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6438 vom 2024-09-06", "url": "https://access.redhat.com/errata/RHSA-2024:6438" }, { "category": "external", "summary": "IBM Security Bulletin 7168815 vom 2024-09-18", "url": "https://www.ibm.com/support/pages/node/7168815" }, { "category": "external", "summary": "IBM Security Bulletin 7172523 vom 2024-10-08", "url": "https://www.ibm.com/support/pages/node/7172523" }, { "category": "external", "summary": "Debian Security Advisory DLA-4133 vom 2025-04-21", "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00029.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20010-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021357.html" }, { "category": "external", "summary": "Security Update for Dell PowerProtect Data Domain", "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities" } ], "source_lang": "en-US", "title": "wget: Schwachstelle erm\u00f6glicht nicht spezifizierten Angriff", "tracking": { "current_release_date": "2025-08-04T22:00:00.000+00:00", "generator": { "date": "2025-08-05T07:20:01.823+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-1386", "initial_release_date": "2024-06-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-06-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-06-18T22:00:00.000+00:00", "number": "2", "summary": "Korrektur der Bewertung" }, { "date": "2024-06-23T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-25T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-27T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-30T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-14T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-04T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-05T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-03T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-09-05T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-21T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T024663", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain", "product": { "name": "Dell PowerProtect Data Domain", "product_id": "T045852", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain Management Center", "product": { "name": "Dell PowerProtect Data Domain Management Center", "product_id": "T045853", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain OS", "product": { "name": "Dell PowerProtect Data Domain OS", "product_id": "T045854", "product_identification_helper": { "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "category": "product_name", "name": "IBM App Connect Enterprise", "product": { "name": "IBM App Connect Enterprise", "product_id": "T032495", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP9 IF03", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP9 IF03", "product_id": "T037731" } }, { "category": "product_version", "name": "7.5.0 UP9 IF03", "product": { "name": "IBM QRadar SIEM 7.5.0 UP9 IF03", "product_id": "T037731-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9_if03" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=1.24.5", "product": { "name": "Open Source wget \u003c=1.24.5", "product_id": "T035493" } }, { "category": "product_version_range", "name": "\u003c=1.24.5", "product": { "name": "Open Source wget \u003c=1.24.5", "product_id": "T035493-fixed" } } ], "category": "product_name", "name": "wget" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "product_status": { "known_affected": [ "T045853", "T045852", "T014381", "T045854", "2951", "T002207", "67646", "T000126", "T024663", "T037731", "T004914", "T032495" ], "last_affected": [ "T035493" ] }, "release_date": "2024-06-16T22:00:00.000+00:00", "title": "CVE-2024-38428" } ] }
wid-sec-w-2025-0225
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um erh\u00f6hte Rechte zu erlangen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0225 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0225.json" }, { "category": "self", "summary": "WID-SEC-2025-0225 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0225" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-022 vom 2025-01-30", "url": "https://www.dell.com/support/kbdoc/de-de/000279157/dsa-2025-022-security-update-for-dell-powerprotect-dd-multiple-vulnerabilities" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2804 vom 2025-04-02", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2804.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7429-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09", "url": "https://ubuntu.com/security/notices/USN-7429-1" }, { "category": "external", "summary": "Security Update for Dell PowerProtect Data Domain", "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities" } ], "source_lang": "en-US", "title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-08-04T22:00:00.000+00:00", "generator": { "date": "2025-08-05T07:21:04.568+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0225", "initial_release_date": "2025-01-30T23:00:00.000+00:00", "revision_history": [ { "date": "2025-01-30T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c8.3.0.0", "product": { "name": "Dell PowerProtect Data Domain \u003c8.3.0.0", "product_id": "T040718" } }, { "category": "product_version", "name": "8.3.0.0", "product": { "name": "Dell PowerProtect Data Domain 8.3.0.0", "product_id": "T040718-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.0.0" } } }, { "category": "product_version_range", "name": "\u003c7.13.1.20", "product": { "name": "Dell PowerProtect Data Domain \u003c7.13.1.20", "product_id": "T040719" } }, { "category": "product_version", "name": "7.13.1.20", "product": { "name": "Dell PowerProtect Data Domain 7.13.1.20", "product_id": "T040719-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.20" } } }, { "category": "product_version_range", "name": "\u003c7.10.1.50", "product": { "name": "Dell PowerProtect Data Domain \u003c7.10.1.50", "product_id": "T040721" } }, { "category": "product_version", "name": "7.10.1.50", "product": { "name": "Dell PowerProtect Data Domain 7.10.1.50", "product_id": "T040721-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.50" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain", "product": { "name": "Dell PowerProtect Data Domain", "product_id": "T045852", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:-" } } } ], "category": "product_name", "name": "PowerProtect Data Domain" }, { "category": "product_name", "name": "Dell PowerProtect Data Domain Management Center", "product": { "name": "Dell PowerProtect Data Domain Management Center", "product_id": "T045853", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain OS", "product": { "name": "Dell PowerProtect Data Domain OS", "product_id": "T045854", "product_identification_helper": { "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4235", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2013-4235" }, { "cve": "CVE-2015-8100", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2015-8100" }, { "cve": "CVE-2017-9271", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2017-9271" }, { "cve": "CVE-2018-6798", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2018-6798" }, { "cve": "CVE-2018-6913", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2018-6913" }, { "cve": "CVE-2019-20633", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2019-20633" }, { "cve": "CVE-2019-20892", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2019-20892" }, { "cve": "CVE-2020-12762", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-15861", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-15862", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2020-15862" }, { "cve": "CVE-2021-3521", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-3521" }, { "cve": "CVE-2021-37750", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-37750" }, { "cve": "CVE-2021-46933", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-46933" }, { "cve": "CVE-2021-46955", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-46955" }, { "cve": "CVE-2021-47074", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47074" }, { "cve": "CVE-2021-47113", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47113" }, { "cve": "CVE-2021-47131", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47131" }, { "cve": "CVE-2021-47162", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47162" }, { "cve": "CVE-2021-47171", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47171" }, { "cve": "CVE-2021-47188", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47188" }, { "cve": "CVE-2021-47206", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47206" }, { "cve": "CVE-2021-47220", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47220" }, { "cve": "CVE-2021-47229", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47229" }, { "cve": "CVE-2021-47231", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47231" }, { "cve": "CVE-2021-47235", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2021-47235" }, { "cve": "CVE-2022-2601", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2022-2601" }, { "cve": "CVE-2022-3775", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2022-3775" }, { "cve": "CVE-2022-44792", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2022-44792" }, { "cve": "CVE-2022-44793", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2022-44793" }, { "cve": "CVE-2022-48566", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2022-48566" }, { "cve": "CVE-2023-27043", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-27043" }, { "cve": "CVE-2023-28074", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-28074" }, { "cve": "CVE-2023-3164", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-3164" }, { "cve": "CVE-2023-36632", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-36632" }, { "cve": "CVE-2023-4421", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-4421" }, { "cve": "CVE-2023-44487", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45288", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-45288" }, { "cve": "CVE-2023-45733", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-45733" }, { "cve": "CVE-2023-45745", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-45745" }, { "cve": "CVE-2023-45918", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-45918" }, { "cve": "CVE-2023-46103", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-46103" }, { "cve": "CVE-2023-4692", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-4692" }, { "cve": "CVE-2023-47233", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-47233" }, { "cve": "CVE-2023-47855", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-47855" }, { "cve": "CVE-2023-49083", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-49083" }, { "cve": "CVE-2023-50782", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-50782" }, { "cve": "CVE-2023-52425", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52426" }, { "cve": "CVE-2023-52428", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52428" }, { "cve": "CVE-2023-52527", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52527" }, { "cve": "CVE-2023-52586", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52586" }, { "cve": "CVE-2023-52591", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52591" }, { "cve": "CVE-2023-52646", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52646" }, { "cve": "CVE-2023-52653", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52653" }, { "cve": "CVE-2023-52655", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52655" }, { "cve": "CVE-2023-52664", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52664" }, { "cve": "CVE-2023-52685", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52685" }, { "cve": "CVE-2023-52686", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52686" }, { "cve": "CVE-2023-52691", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52691" }, { "cve": "CVE-2023-52696", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52696" }, { "cve": "CVE-2023-52698", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52698" }, { "cve": "CVE-2023-52703", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52703" }, { "cve": "CVE-2023-52730", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52730" }, { "cve": "CVE-2023-52732", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52732" }, { "cve": "CVE-2023-52741", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52741" }, { "cve": "CVE-2023-52742", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52742" }, { "cve": "CVE-2023-52747", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52747" }, { "cve": "CVE-2023-52759", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52759" }, { "cve": "CVE-2023-52774", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52774" }, { "cve": "CVE-2023-52781", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52781" }, { "cve": "CVE-2023-52796", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52796" }, { "cve": "CVE-2023-52803", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52803" }, { "cve": "CVE-2023-52821", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52821" }, { "cve": "CVE-2023-52864", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52864" }, { "cve": "CVE-2023-52865", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52865" }, { "cve": "CVE-2023-52867", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52867" }, { "cve": "CVE-2023-52875", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52875" }, { "cve": "CVE-2023-52880", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-52880" }, { "cve": "CVE-2023-5388", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-5388" }, { "cve": "CVE-2023-5752", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-5752" }, { "cve": "CVE-2023-5992", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-5992" }, { "cve": "CVE-2023-6597", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2023-6597" }, { "cve": "CVE-2024-0397", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-0397" }, { "cve": "CVE-2024-0450", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-0450" }, { "cve": "CVE-2024-0639", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-0639" }, { "cve": "CVE-2024-0727", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-0727" }, { "cve": "CVE-2024-1737", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-1737" }, { "cve": "CVE-2024-1975", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-1975" }, { "cve": "CVE-2024-2004", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-2004" }, { "cve": "CVE-2024-20696", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-20696" }, { "cve": "CVE-2024-22195", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-22195" }, { "cve": "CVE-2024-2398", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-2398" }, { "cve": "CVE-2024-24577", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-24577" }, { "cve": "CVE-2024-24790", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-24790" }, { "cve": "CVE-2024-2511", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-2511" }, { "cve": "CVE-2024-25710", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26458", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26458" }, { "cve": "CVE-2024-26461", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26461" }, { "cve": "CVE-2024-26625", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26625" }, { "cve": "CVE-2024-26739", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26739" }, { "cve": "CVE-2024-26752", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26752" }, { "cve": "CVE-2024-26775", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26775" }, { "cve": "CVE-2024-26791", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26791" }, { "cve": "CVE-2024-26828", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26828" }, { "cve": "CVE-2024-26846", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26846" }, { "cve": "CVE-2024-26874", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26874" }, { "cve": "CVE-2024-26876", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26876" }, { "cve": "CVE-2024-26900", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26900" }, { "cve": "CVE-2024-26915", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26915" }, { "cve": "CVE-2024-26920", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26920" }, { "cve": "CVE-2024-26921", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26921" }, { "cve": "CVE-2024-26929", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26929" }, { "cve": "CVE-2024-26930", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26930" }, { "cve": "CVE-2024-26931", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26931" }, { "cve": "CVE-2024-26934", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26934" }, { "cve": "CVE-2024-26957", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26957" }, { "cve": "CVE-2024-26958", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26958" }, { "cve": "CVE-2024-26984", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26984" }, { "cve": "CVE-2024-26996", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-26996" }, { "cve": "CVE-2024-27008", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27008" }, { "cve": "CVE-2024-27054", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27054" }, { "cve": "CVE-2024-27059", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27059" }, { "cve": "CVE-2024-27062", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27062" }, { "cve": "CVE-2024-27388", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27388" }, { "cve": "CVE-2024-27396", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27396" }, { "cve": "CVE-2024-27398", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27398" }, { "cve": "CVE-2024-27401", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27401" }, { "cve": "CVE-2024-27419", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27419" }, { "cve": "CVE-2024-27436", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-27436" }, { "cve": "CVE-2024-28085", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-28085" }, { "cve": "CVE-2024-28182", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-28182" }, { "cve": "CVE-2024-2961", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-2961" }, { "cve": "CVE-2024-32487", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-32487" }, { "cve": "CVE-2024-33599", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-33602" }, { "cve": "CVE-2024-33871", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-33871" }, { "cve": "CVE-2024-34062", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-34062" }, { "cve": "CVE-2024-34064", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34459", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-34459" }, { "cve": "CVE-2024-35195", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35195" }, { "cve": "CVE-2024-35235", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35235" }, { "cve": "CVE-2024-35789", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35789" }, { "cve": "CVE-2024-35791", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35791" }, { "cve": "CVE-2024-35809", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35809" }, { "cve": "CVE-2024-35811", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35811" }, { "cve": "CVE-2024-35830", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35830" }, { "cve": "CVE-2024-35849", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35849" }, { "cve": "CVE-2024-35877", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35877" }, { "cve": "CVE-2024-35878", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35878" }, { "cve": "CVE-2024-35887", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35887" }, { "cve": "CVE-2024-35895", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35895" }, { "cve": "CVE-2024-35914", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35914" }, { "cve": "CVE-2024-35932", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35932" }, { "cve": "CVE-2024-35935", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35935" }, { "cve": "CVE-2024-35936", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35936" }, { "cve": "CVE-2024-35944", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35944" }, { "cve": "CVE-2024-35955", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35955" }, { "cve": "CVE-2024-35969", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35969" }, { "cve": "CVE-2024-35982", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-35982" }, { "cve": "CVE-2024-36015", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-36015" }, { "cve": "CVE-2024-36029", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-36029" }, { "cve": "CVE-2024-3651", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-3651" }, { "cve": "CVE-2024-36954", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-36954" }, { "cve": "CVE-2024-37370", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38428", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-38428" }, { "cve": "CVE-2024-39689", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-39689" }, { "cve": "CVE-2024-4032", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-4032" }, { "cve": "CVE-2024-41110", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-41110" }, { "cve": "CVE-2024-4317", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-4317" }, { "cve": "CVE-2024-4741", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-4741" }, { "cve": "CVE-2024-5206", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-5206" }, { "cve": "CVE-2024-5535", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-5535" }, { "cve": "CVE-2024-6232", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-6232" }, { "cve": "CVE-2024-6345", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-6345" }, { "cve": "CVE-2024-6655", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-6655" }, { "cve": "CVE-2024-7264", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-7264" }, { "cve": "CVE-2024-7592", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-7592" }, { "cve": "CVE-2024-53295", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-53295" }, { "cve": "CVE-2024-51534", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-51534" }, { "cve": "CVE-2024-53296", "product_status": { "known_affected": [ "T045853", "T040719", "T045852", "T040718", "T045854", "T000126", "T040721", "398363" ] }, "release_date": "2025-01-30T23:00:00.000+00:00", "title": "CVE-2024-53296" } ] }
wid-sec-w-2024-1913
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer oder lokaler Angreifer kann mehrere Schwachstellen in Red Hat OpenShift Container Platform ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1913 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1913.json" }, { "category": "self", "summary": "WID-SEC-2024-1913 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1913" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5433 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5433" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5436 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5436" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5439 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5439" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5442 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5442" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5444 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5444" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5446 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5446" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5749 vom 2024-08-22", "url": "https://access.redhat.com/errata/RHSA-2024:5749" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6054 vom 2024-08-30", "url": "https://access.redhat.com/errata/RHSA-2024:6054" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12606 vom 2024-09-03", "url": "https://linux.oracle.com/errata/ELSA-2024-12606.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6159 vom 2024-09-03", "url": "https://access.redhat.com/errata/RHSA-2024:6159" }, { "category": "external", "summary": "ORACLE OVMSA-2024-0011 vom 2024-09-04", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-September/001099.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6011 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6011" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6409 vom 2024-09-11", "url": "https://access.redhat.com/errata/RHSA-2024:6409" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6667 vom 2024-09-13", "url": "https://access.redhat.com/errata/RHSA-2024:6667" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6642 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6642" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6755 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6755" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6687 vom 2024-09-19", "url": "https://access.redhat.com/errata/RHSA-2024:6687" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6685 vom 2024-09-19", "url": "https://access.redhat.com/errata/RHSA-2024:6685" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6998 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6998" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6994 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6994" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6995 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6995" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6997" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6811 vom 2024-09-25", "url": "https://access.redhat.com/errata/RHSA-2024:6811" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7237 vom 2024-09-26", "url": "https://access.redhat.com/errata/RHSA-2024:7237" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7174 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7174" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7436 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7436" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3722 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:3722" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3718 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:3718" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7624 vom 2024-10-03", "url": "https://access.redhat.com/errata/RHSA-2024:7624" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7184 vom 2024-10-03", "url": "https://access.redhat.com/errata/RHSA-2024:7184" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7324 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7324" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7744 vom 2024-10-07", "url": "https://access.redhat.com/errata/RHSA-2024:7744" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7323 vom 2024-10-07", "url": "https://access.redhat.com/errata/RHSA-2024:7323" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8040 vom 2024-10-14", "url": "https://access.redhat.com/errata/RHSA-2024:8040" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8677 vom 2024-10-30", "url": "https://access.redhat.com/errata/RHSA-2024:8677" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3803-1 vom 2024-10-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3849-1 vom 2024-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8856.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8876 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8876.html" }, { "category": "external", "summary": "Red Hat vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9089" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10135 vom 2024-11-21", "url": "https://access.redhat.com/errata/RHSA-2024:10135" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10775 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10775" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4250-1 vom 2024-12-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10823 vom 2024-12-12", "url": "https://access.redhat.com/errata/RHSA-2024:10823" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11562 vom 2025-01-02", "url": "https://access.redhat.com/errata/RHSA-2024:11562" }, { "category": "external", "summary": "IBM Security Bulletin 7180361 vom 2025-01-07", "url": "https://www.ibm.com/support/pages/node/7180361" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2727 vom 2025-01-10", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2727.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1116 vom 2025-02-13", "url": "https://access.redhat.com/errata/RHSA-2025:1116" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1038-1 vom 2025-03-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RDUSLVUE4ABN4A2UXKEXXYBVNZYOL62N/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1037-1 vom 2025-03-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HRXHLPSCYZEZQ6GJKOABY44N37DC5ST2/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1036-1 vom 2025-03-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020615.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14988-1 vom 2025-04-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-099 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-099.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20013-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021364.html" }, { "category": "external", "summary": "IBM Security Bulletin 7236419 vom 2025-06-30", "url": "https://www.ibm.com/support/pages/node/7236419" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11669 vom 2025-07-31", "url": "https://access.redhat.com/errata/RHSA-2025:11669" } ], "source_lang": "en-US", "title": "Red Hat OpenShift Container Platform: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-30T22:00:00.000+00:00", "generator": { "date": "2025-07-31T07:59:47.173+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-1913", "initial_release_date": "2024-08-22T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-22T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-08-29T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-02T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-03T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-04T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von ORACLE und Red Hat aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-18T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-23T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-26T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-13T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-30T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-06T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-08T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-01-13T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-14T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-12T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-26T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-15T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "39" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.6.4", "product_id": "T040030" } }, { "category": "product_version", "name": "10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus 10.1.6.4", "product_id": "T040030-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4" } } } ], "category": "product_name", "name": "Spectrum Protect Plus" }, { "branches": [ { "category": "product_version_range", "name": "\u003c6.1.9.7", "product": { "name": "IBM Storage Scale System \u003c6.1.9.7", "product_id": "T044961" } }, { "category": "product_version", "name": "6.1.9.7", "product": { "name": "IBM Storage Scale System 6.1.9.7", "product_id": "T044961-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.7" } } }, { "category": "product_version_range", "name": "\u003c6.2.3.0", "product": { "name": "IBM Storage Scale System \u003c6.2.3.0", "product_id": "T044962" } }, { "category": "product_version", "name": "6.2.3.0", "product": { "name": "IBM Storage Scale System 6.2.3.0", "product_id": "T044962-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.2.3.0" } } } ], "category": "product_name", "name": "Storage Scale System" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "Advanced Cluster Security for Kubernetes 4", "product": { "name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4", "product_id": "T027916", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4" } } }, { "category": "product_version", "name": "9", "product": { "name": "Red Hat Enterprise Linux 9", "product_id": "T038904", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version_range", "name": "Container Platform \u003c4.14.35", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.35", "product_id": "T037037" } }, { "category": "product_version", "name": "Container Platform 4.14.35", "product": { "name": "Red Hat OpenShift Container Platform 4.14.35", "product_id": "T037037-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.35" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.15.28", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.15.28", "product_id": "T037038" } }, { "category": "product_version", "name": "Container Platform 4.15.28", "product": { "name": "Red Hat OpenShift Container Platform 4.15.28", "product_id": "T037038-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.15.28" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.13.48", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.13.48", "product_id": "T037039" } }, { "category": "product_version", "name": "Container Platform 4.13.48", "product": { "name": "Red Hat OpenShift Container Platform 4.13.48", "product_id": "T037039-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.48" } } }, { "category": "product_version", "name": "CodeReady Workspaces", "product": { "name": "Red Hat OpenShift CodeReady Workspaces", "product_id": "T037618", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:codeready_workspaces" } } }, { "category": "product_version", "name": "Logging Subsystem 5.9.7", "product": { "name": "Red Hat OpenShift Logging Subsystem 5.9.7", "product_id": "T037939", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:logging_subsystem_5.9.7" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.38", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.38", "product_id": "T037940" } }, { "category": "product_version", "name": "Container Platform 4.14.38", "product": { "name": "Red Hat OpenShift Container Platform 4.14.38", "product_id": "T037940-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.38" } } }, { "category": "product_version_range", "name": "Data Foundation \u003c4.14.11", "product": { "name": "Red Hat OpenShift Data Foundation \u003c4.14.11", "product_id": "T037941" } }, { "category": "product_version", "name": "Data Foundation 4.14.11", "product": { "name": "Red Hat OpenShift Data Foundation 4.14.11", "product_id": "T037941-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation__4.14.11" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.15.42", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.15.42", "product_id": "T039989" } }, { "category": "product_version", "name": "Container Platform 4.15.42", "product": { "name": "Red Hat OpenShift Container Platform 4.15.42", "product_id": "T039989-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.15.42" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.54", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.54", "product_id": "T045757" } }, { "category": "product_version", "name": "Container Platform 4.14.54", "product": { "name": "Red Hat OpenShift Container Platform 4.14.54", "product_id": "T045757-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.54" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-15209", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2018-15209" }, { "cve": "CVE-2021-46939", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-46939" }, { "cve": "CVE-2021-47018", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47018" }, { "cve": "CVE-2021-47257", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47257" }, { "cve": "CVE-2021-47284", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47284" }, { "cve": "CVE-2021-47304", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47304" }, { "cve": "CVE-2021-47373", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47373" }, { "cve": "CVE-2021-47383", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47383" }, { "cve": "CVE-2021-47408", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47408" }, { "cve": "CVE-2021-47461", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47461" }, { "cve": "CVE-2021-47468", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47468" }, { "cve": "CVE-2021-47491", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47491" }, { "cve": "CVE-2021-47548", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47548" }, { "cve": "CVE-2021-47579", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47579" }, { "cve": "CVE-2021-47624", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2021-47624" }, { "cve": "CVE-2022-48632", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2022-48632" }, { "cve": "CVE-2022-48637", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2022-48637" }, { "cve": "CVE-2022-48743", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2022-48743" }, { "cve": "CVE-2022-48747", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2022-48747" }, { "cve": "CVE-2022-48757", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2022-48757" }, { "cve": "CVE-2023-25433", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-25433" }, { "cve": "CVE-2023-28746", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-28746" }, { "cve": "CVE-2023-45142", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-45142" }, { "cve": "CVE-2023-45290", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-45290" }, { "cve": "CVE-2023-47108", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-47108" }, { "cve": "CVE-2023-48795", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52356", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52356" }, { "cve": "CVE-2023-52448", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52448" }, { "cve": "CVE-2023-52451", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52451" }, { "cve": "CVE-2023-52458", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52458" }, { "cve": "CVE-2023-52463", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52463" }, { "cve": "CVE-2023-52469", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52469" }, { "cve": "CVE-2023-52471", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52471" }, { "cve": "CVE-2023-52486", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52486" }, { "cve": "CVE-2023-52530", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52530" }, { "cve": "CVE-2023-52619", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52619" }, { "cve": "CVE-2023-52622", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52622" }, { "cve": "CVE-2023-52623", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52623" }, { "cve": "CVE-2023-52635", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52635" }, { "cve": "CVE-2023-52648", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52648" }, { "cve": "CVE-2023-52651", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52651" }, { "cve": "CVE-2023-52653", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52653" }, { "cve": "CVE-2023-52658", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52658" }, { "cve": "CVE-2023-52662", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52662" }, { "cve": "CVE-2023-52679", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52679" }, { "cve": "CVE-2023-52707", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52707" }, { "cve": "CVE-2023-52730", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52730" }, { "cve": "CVE-2023-52756", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52756" }, { "cve": "CVE-2023-52762", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52762" }, { "cve": "CVE-2023-52764", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52764" }, { "cve": "CVE-2023-52771", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52771" }, { "cve": "CVE-2023-52775", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52775" }, { "cve": "CVE-2023-52777", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52777" }, { "cve": "CVE-2023-52784", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52784" }, { "cve": "CVE-2023-52791", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52791" }, { "cve": "CVE-2023-52796", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52796" }, { "cve": "CVE-2023-52803", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52803" }, { "cve": "CVE-2023-52809", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52809" }, { "cve": "CVE-2023-52811", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52811" }, { "cve": "CVE-2023-52832", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52832" }, { "cve": "CVE-2023-52834", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52834" }, { "cve": "CVE-2023-52845", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52845" }, { "cve": "CVE-2023-52847", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52847" }, { "cve": "CVE-2023-52864", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52864" }, { "cve": "CVE-2023-52885", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-52885" }, { "cve": "CVE-2023-6228", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2023-6228" }, { "cve": "CVE-2024-21823", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-21823" }, { "cve": "CVE-2024-2201", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-2201" }, { "cve": "CVE-2024-24788", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-24788" }, { "cve": "CVE-2024-24790", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-24790" }, { "cve": "CVE-2024-25739", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-25739" }, { "cve": "CVE-2024-26586", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26586" }, { "cve": "CVE-2024-26601", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26601" }, { "cve": "CVE-2024-26614", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26614" }, { "cve": "CVE-2024-26640", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26640" }, { "cve": "CVE-2024-26660", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26660" }, { "cve": "CVE-2024-26669", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26669" }, { "cve": "CVE-2024-26686", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26686" }, { "cve": "CVE-2024-26698", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26698" }, { "cve": "CVE-2024-26704", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26704" }, { "cve": "CVE-2024-26733", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26733" }, { "cve": "CVE-2024-26737", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26737" }, { "cve": "CVE-2024-26740", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26740" }, { "cve": "CVE-2024-26772", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26772" }, { "cve": "CVE-2024-26773", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26773" }, { "cve": "CVE-2024-26802", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26802" }, { "cve": "CVE-2024-26810", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26810" }, { "cve": "CVE-2024-26837", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26837" }, { "cve": "CVE-2024-26840", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26840" }, { "cve": "CVE-2024-26843", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26843" }, { "cve": "CVE-2024-26852", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26852" }, { "cve": "CVE-2024-26853", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26853" }, { "cve": "CVE-2024-26855", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26855" }, { "cve": "CVE-2024-26870", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26870" }, { "cve": "CVE-2024-26878", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26878" }, { "cve": "CVE-2024-26897", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26897" }, { "cve": "CVE-2024-26908", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26908" }, { "cve": "CVE-2024-26921", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26921" }, { "cve": "CVE-2024-26925", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26925" }, { "cve": "CVE-2024-26930", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26930" }, { "cve": "CVE-2024-26940", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26940" }, { "cve": "CVE-2024-26947", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26947" }, { "cve": "CVE-2024-26958", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26958" }, { "cve": "CVE-2024-26960", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26960" }, { "cve": "CVE-2024-26961", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-26961" }, { "cve": "CVE-2024-27010", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27010" }, { "cve": "CVE-2024-27011", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27011" }, { "cve": "CVE-2024-27019", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27019" }, { "cve": "CVE-2024-27020", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27020" }, { "cve": "CVE-2024-27025", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27025" }, { "cve": "CVE-2024-27030", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27030" }, { "cve": "CVE-2024-27046", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27046" }, { "cve": "CVE-2024-27052", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27052" }, { "cve": "CVE-2024-27062", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27062" }, { "cve": "CVE-2024-27065", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27065" }, { "cve": "CVE-2024-27388", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27388" }, { "cve": "CVE-2024-27395", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27395" }, { "cve": "CVE-2024-27434", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-27434" }, { "cve": "CVE-2024-31076", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-31076" }, { "cve": "CVE-2024-33621", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-33621" }, { "cve": "CVE-2024-34064", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-34064" }, { "cve": "CVE-2024-35789", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35789" }, { "cve": "CVE-2024-35790", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35790" }, { "cve": "CVE-2024-35801", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35801" }, { "cve": "CVE-2024-35807", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35807" }, { "cve": "CVE-2024-35810", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35810" }, { "cve": "CVE-2024-35814", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35814" }, { "cve": "CVE-2024-35823", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35823" }, { "cve": "CVE-2024-35824", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35824" }, { "cve": "CVE-2024-35845", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35845" }, { "cve": "CVE-2024-35847", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35847" }, { "cve": "CVE-2024-35852", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35852" }, { "cve": "CVE-2024-35876", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35876" }, { "cve": "CVE-2024-35885", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35885" }, { "cve": "CVE-2024-35893", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35893" }, { "cve": "CVE-2024-35896", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35896" }, { "cve": "CVE-2024-35897", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35897" }, { "cve": "CVE-2024-35899", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35899" }, { "cve": "CVE-2024-35900", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35900" }, { "cve": "CVE-2024-35907", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35907" }, { "cve": "CVE-2024-35910", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35910" }, { "cve": "CVE-2024-35912", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35912" }, { "cve": "CVE-2024-35924", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35924" }, { "cve": "CVE-2024-35925", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35925" }, { "cve": "CVE-2024-35930", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35930" }, { "cve": "CVE-2024-35937", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35937" }, { "cve": "CVE-2024-35938", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35938" }, { "cve": "CVE-2024-35946", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35946" }, { "cve": "CVE-2024-35947", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35947" }, { "cve": "CVE-2024-35952", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35952" }, { "cve": "CVE-2024-35962", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-35962" }, { "cve": "CVE-2024-36000", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36000" }, { "cve": "CVE-2024-36005", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36005" }, { "cve": "CVE-2024-36006", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36006" }, { "cve": "CVE-2024-36010", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36010" }, { "cve": "CVE-2024-36016", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36016" }, { "cve": "CVE-2024-36017", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36017" }, { "cve": "CVE-2024-36020", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36020" }, { "cve": "CVE-2024-36025", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36025" }, { "cve": "CVE-2024-36270", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36270" }, { "cve": "CVE-2024-36286", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36286" }, { "cve": "CVE-2024-36489", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36489" }, { "cve": "CVE-2024-36886", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36886" }, { "cve": "CVE-2024-36889", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36889" }, { "cve": "CVE-2024-36896", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36896" }, { "cve": "CVE-2024-36904", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36904" }, { "cve": "CVE-2024-36905", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36905" }, { "cve": "CVE-2024-36917", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36917" }, { "cve": "CVE-2024-36921", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36921" }, { "cve": "CVE-2024-36922", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36922" }, { "cve": "CVE-2024-36927", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36927" }, { "cve": "CVE-2024-36929", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36929" }, { "cve": "CVE-2024-36933", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36933" }, { "cve": "CVE-2024-36940", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36940" }, { "cve": "CVE-2024-36941", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36941" }, { "cve": "CVE-2024-36945", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36945" }, { "cve": "CVE-2024-36950", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36950" }, { "cve": "CVE-2024-36954", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36954" }, { "cve": "CVE-2024-36960", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36960" }, { "cve": "CVE-2024-36971", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36971" }, { "cve": "CVE-2024-36978", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36978" }, { "cve": "CVE-2024-36979", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-36979" }, { "cve": "CVE-2024-37370", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38384", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38384" }, { "cve": "CVE-2024-38428", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38428" }, { "cve": "CVE-2024-38473", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38538", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38538" }, { "cve": "CVE-2024-38555", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38555" }, { "cve": "CVE-2024-38556", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38556" }, { "cve": "CVE-2024-38573", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38573" }, { "cve": "CVE-2024-38575", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38575" }, { "cve": "CVE-2024-38586", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38586" }, { "cve": "CVE-2024-38596", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38596" }, { "cve": "CVE-2024-38598", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38598" }, { "cve": "CVE-2024-38615", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38615" }, { "cve": "CVE-2024-38627", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38627" }, { "cve": "CVE-2024-38663", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-38663" }, { "cve": "CVE-2024-39276", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39276" }, { "cve": "CVE-2024-39472", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39472" }, { "cve": "CVE-2024-39476", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39476" }, { "cve": "CVE-2024-39487", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39487" }, { "cve": "CVE-2024-39502", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39502" }, { "cve": "CVE-2024-39573", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-39573" }, { "cve": "CVE-2024-40897", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-40897" }, { "cve": "CVE-2024-40927", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-40927" }, { "cve": "CVE-2024-40974", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-40974" }, { "cve": "CVE-2024-6104", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-6104" }, { "cve": "CVE-2024-6345", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-6345" }, { "cve": "CVE-2024-6409", "product_status": { "known_affected": [ "T037618", "T038904", "T037939", "67646", "T039989", "T037037", "T037940", "T037038", "T037941", "T037039", "T004914", "T044962", "T044961", "T040030", "T027916", "T002207", "T045757", "T027843", "398363" ] }, "release_date": "2024-08-22T22:00:00.000+00:00", "title": "CVE-2024-6409" } ] }
wid-sec-w-2024-1386
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Wget ist ein Kommandozeilenprogramm zum Herunterladen von Dateien aus dem Internet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in wget ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1386 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1386.json" }, { "category": "self", "summary": "WID-SEC-2024-1386 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1386" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-06-16", "url": "https://github.com/advisories/GHSA-2j66-vp53-phjj" }, { "category": "external", "summary": "GNU.org Mailing List vom 2024-06-16", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2154-1 vom 2024-06-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018793.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2201-1 vom 2024-06-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6852-1 vom 2024-06-26", "url": "https://ubuntu.com/security/notices/USN-6852-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6852-2 vom 2024-06-27", "url": "https://ubuntu.com/security/notices/USN-6852-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2174-1 vom 2024-06-28", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SWPMU2XL6PDMNR7GAR42PDVM3EVKHYXC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2174-2 vom 2024-07-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018949.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4998 vom 2024-08-05", "url": "https://access.redhat.com/errata/RHSA-2024:4998" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06", "url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5299 vom 2024-08-14", "url": "https://linux.oracle.com/errata/ELSA-2024-5299.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5299 vom 2024-08-14", "url": "https://access.redhat.com/errata/RHSA-2024:5299" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6192 vom 2024-09-03", "url": "https://linux.oracle.com/errata/ELSA-2024-6192.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6192 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6192" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6208 vom 2024-09-03", "url": "https://access.redhat.com/errata/RHSA-2024:6208" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6438 vom 2024-09-06", "url": "https://access.redhat.com/errata/RHSA-2024:6438" }, { "category": "external", "summary": "IBM Security Bulletin 7168815 vom 2024-09-18", "url": "https://www.ibm.com/support/pages/node/7168815" }, { "category": "external", "summary": "IBM Security Bulletin 7172523 vom 2024-10-08", "url": "https://www.ibm.com/support/pages/node/7172523" }, { "category": "external", "summary": "Debian Security Advisory DLA-4133 vom 2025-04-21", "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00029.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20010-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021357.html" }, { "category": "external", "summary": "Security Update for Dell PowerProtect Data Domain", "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities" } ], "source_lang": "en-US", "title": "wget: Schwachstelle erm\u00f6glicht nicht spezifizierten Angriff", "tracking": { "current_release_date": "2025-08-04T22:00:00.000+00:00", "generator": { "date": "2025-08-05T07:20:01.823+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-1386", "initial_release_date": "2024-06-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-06-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-06-18T22:00:00.000+00:00", "number": "2", "summary": "Korrektur der Bewertung" }, { "date": "2024-06-23T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-25T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-27T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-30T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-14T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-04T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-05T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-03T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-09-05T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-21T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T024663", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain", "product": { "name": "Dell PowerProtect Data Domain", "product_id": "T045852", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain Management Center", "product": { "name": "Dell PowerProtect Data Domain Management Center", "product_id": "T045853", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain OS", "product": { "name": "Dell PowerProtect Data Domain OS", "product_id": "T045854", "product_identification_helper": { "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "category": "product_name", "name": "IBM App Connect Enterprise", "product": { "name": "IBM App Connect Enterprise", "product_id": "T032495", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP9 IF03", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP9 IF03", "product_id": "T037731" } }, { "category": "product_version", "name": "7.5.0 UP9 IF03", "product": { "name": "IBM QRadar SIEM 7.5.0 UP9 IF03", "product_id": "T037731-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9_if03" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=1.24.5", "product": { "name": "Open Source wget \u003c=1.24.5", "product_id": "T035493" } }, { "category": "product_version_range", "name": "\u003c=1.24.5", "product": { "name": "Open Source wget \u003c=1.24.5", "product_id": "T035493-fixed" } } ], "category": "product_name", "name": "wget" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "product_status": { "known_affected": [ "T045853", "T045852", "T014381", "T045854", "2951", "T002207", "67646", "T000126", "T024663", "T037731", "T004914", "T032495" ], "last_affected": [ "T035493" ] }, "release_date": "2024-06-16T22:00:00.000+00:00", "title": "CVE-2024-38428" } ] }
ghsa-2j66-vp53-phjj
Vulnerability from github
url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.
{ "affected": [], "aliases": [ "CVE-2024-38428" ], "database_specific": { "cwe_ids": [ "CWE-436" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-06-16T03:15:08Z", "severity": "CRITICAL" }, "details": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.", "id": "GHSA-2j66-vp53-phjj", "modified": "2025-04-21T12:30:23Z", "published": "2024-06-16T03:30:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38428" }, { "type": "WEB", "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00029.html" }, { "type": "WEB", "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20241115-0005" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ] }
NCSC-2024-0339
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Microsoft heeft kwetsbaarheden verholpen in Mariner (Azure Linux).", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden betreffen oudere kwetsbaarheden in diverse subcomponenten van de distro, zoals Python, Emacs, Qemu, Django, Curl, wget etc. welke in de nieuwe versie zijn verholpen.", "title": "Interpretaties" }, { "category": "description", "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Misinterpretation of Input", "title": "CWE-115" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Validation of Array Index", "title": "CWE-129" }, { "category": "general", "text": "Partial String Comparison", "title": "CWE-187" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "general", "text": "Off-by-one Error", "title": "CWE-193" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Check for Dropped Privileges", "title": "CWE-273" }, { "category": "general", "text": "Improper Handling of Insufficient Permissions or Privileges ", "title": "CWE-280" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Improper Validation of Certificate with Host Mismatch", "title": "CWE-297" }, { "category": "general", "text": "Improper Check for Certificate Revocation", "title": "CWE-299" }, { "category": "general", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Divide By Zero", "title": "CWE-369" }, { "category": "general", "text": "CWE-371", "title": "CWE-371" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Insertion of Sensitive Information into Log File", "title": "CWE-532" }, { "category": "general", "text": "Improper Locking", "title": "CWE-667" }, { "category": "general", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Deadlock", "title": "CWE-833" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "title": "CWE-95" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "title": "Kwetsbaarheden verholpen in Microsoft Mariner", "tracking": { "current_release_date": "2024-08-13T18:23:22.271316Z", "id": "NCSC-2024-0339", "initial_release_date": "2024-08-13T18:23:22.271316Z", "revision_history": [ { "date": "2024-08-13T18:23:22.271316Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "cbl-mariner", "product": { "name": "cbl-mariner", "product_id": "CSAFPID-1489521", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2601", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2022-2601", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json" } ], "title": "CVE-2022-2601" }, { "cve": "CVE-2022-3775", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2022-3775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3775.json" } ], "title": "CVE-2022-3775" }, { "cve": "CVE-2022-36648", "references": [ { "category": "self", "summary": "CVE-2022-36648", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36648.json" } ], "title": "CVE-2022-36648" }, { "cve": "CVE-2019-3833", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2019-3833", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3833.json" } ], "title": "CVE-2019-3833" }, { "cve": "CVE-2021-3929", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2021-3929", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3929.json" } ], "title": "CVE-2021-3929" }, { "cve": "CVE-2021-4158", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2021-4158", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4158.json" } ], "title": "CVE-2021-4158" }, { "cve": "CVE-2021-4206", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2021-4206", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4206.json" } ], "title": "CVE-2021-4206" }, { "cve": "CVE-2021-4207", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2021-4207", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4207.json" } ], "title": "CVE-2021-4207" }, { "cve": "CVE-2022-26353", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" } ], "references": [ { "category": "self", "summary": "CVE-2022-26353", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26353.json" } ], "title": "CVE-2022-26353" }, { "cve": "CVE-2022-35414", "references": [ { "category": "self", "summary": "CVE-2022-35414", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-35414.json" } ], "title": "CVE-2022-35414" }, { "cve": "CVE-2023-3354", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2023-3354", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3354.json" } ], "title": "CVE-2023-3354" }, { "cve": "CVE-2022-3872", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "other", "text": "Off-by-one Error", "title": "CWE-193" } ], "references": [ { "category": "self", "summary": "CVE-2022-3872", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3872.json" } ], "title": "CVE-2022-3872" }, { "cve": "CVE-2022-4144", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2022-4144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4144.json" } ], "title": "CVE-2022-4144" }, { "cve": "CVE-2023-45288", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-45288", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json" } ], "title": "CVE-2023-45288" }, { "cve": "CVE-2023-29404", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "references": [ { "category": "self", "summary": "CVE-2023-29404", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29404.json" } ], "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29402", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "references": [ { "category": "self", "summary": "CVE-2023-29402", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29402.json" } ], "title": "CVE-2023-29402" }, { "cve": "CVE-2019-3816", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "references": [ { "category": "self", "summary": "CVE-2019-3816", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3816.json" } ], "title": "CVE-2019-3816" }, { "cve": "CVE-2021-3750", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2021-3750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3750.json" } ], "title": "CVE-2021-3750" }, { "cve": "CVE-2022-0358", "cwe": { "id": "CWE-273", "name": "Improper Check for Dropped Privileges" }, "notes": [ { "category": "other", "text": "Improper Check for Dropped Privileges", "title": "CWE-273" } ], "references": [ { "category": "self", "summary": "CVE-2022-0358", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-0358.json" } ], "title": "CVE-2022-0358" }, { "cve": "CVE-2022-26354", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" } ], "references": [ { "category": "self", "summary": "CVE-2022-26354", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26354.json" } ], "title": "CVE-2022-26354" }, { "cve": "CVE-2022-3165", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2022-3165", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3165.json" } ], "title": "CVE-2022-3165" }, { "cve": "CVE-2022-2962", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2022-2962", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2962.json" } ], "title": "CVE-2022-2962" }, { "cve": "CVE-2022-41722", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "references": [ { "category": "self", "summary": "CVE-2022-41722", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41722.json" } ], "title": "CVE-2022-41722" }, { "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "notes": [ { "category": "other", "text": "Improper Handling of Insufficient Permissions or Privileges ", "title": "CWE-280" }, { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "references": [ { "category": "self", "summary": "CVE-2022-29526", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-29526.json" } ], "title": "CVE-2022-29526" }, { "cve": "CVE-2007-4559", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "references": [ { "category": "self", "summary": "CVE-2007-4559", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2007/CVE-2007-4559.json" } ], "title": "CVE-2007-4559" }, { "cve": "CVE-2019-9674", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2019-9674", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-9674.json" } ], "title": "CVE-2019-9674" }, { "cve": "CVE-2017-18207", "references": [ { "category": "self", "summary": "CVE-2017-18207", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-18207.json" } ], "title": "CVE-2017-18207" }, { "cve": "CVE-2019-20907", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2019-20907", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-20907.json" } ], "title": "CVE-2019-20907" }, { "cve": "CVE-2021-23336", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" } ], "references": [ { "category": "self", "summary": "CVE-2021-23336", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23336.json" } ], "title": "CVE-2021-23336" }, { "cve": "CVE-2017-17522", "references": [ { "category": "self", "summary": "CVE-2017-17522", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-17522.json" } ], "title": "CVE-2017-17522" }, { "cve": "CVE-2024-6655", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "references": [ { "category": "self", "summary": "CVE-2024-6655", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6655.json" } ], "title": "CVE-2024-6655" }, { "cve": "CVE-2024-2466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Improper Validation of Certificate with Host Mismatch", "title": "CWE-297" } ], "references": [ { "category": "self", "summary": "CVE-2024-2466", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json" } ], "title": "CVE-2024-2466" }, { "cve": "CVE-2024-39331", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "title": "CWE-95" } ], "references": [ { "category": "self", "summary": "CVE-2024-39331", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39331.json" } ], "title": "CVE-2024-39331" }, { "cve": "CVE-2021-43565", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2021-43565", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-43565.json" } ], "title": "CVE-2021-43565" }, { "cve": "CVE-2024-39277", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "other", "text": "Improper Validation of Array Index", "title": "CWE-129" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-39277", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39277.json" } ], "title": "CVE-2024-39277" }, { "cve": "CVE-2024-38780", "cwe": { "id": "CWE-371", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-371", "title": "CWE-371" }, { "category": "other", "text": "Improper Locking", "title": "CWE-667" } ], "references": [ { "category": "self", "summary": "CVE-2024-38780", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38780.json" } ], "title": "CVE-2024-38780" }, { "cve": "CVE-2024-39292", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-39292", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39292.json" } ], "title": "CVE-2024-39292" }, { "cve": "CVE-2024-39482", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-39482", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39482.json" } ], "title": "CVE-2024-39482" }, { "cve": "CVE-2024-39484", "references": [ { "category": "self", "summary": "CVE-2024-39484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39484.json" } ], "title": "CVE-2024-39484" }, { "cve": "CVE-2024-39495", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-39495", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39495.json" } ], "title": "CVE-2024-39495" }, { "cve": "CVE-2024-40902", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "references": [ { "category": "self", "summary": "CVE-2024-40902", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40902.json" } ], "title": "CVE-2024-40902" }, { "cve": "CVE-2024-41110", "cwe": { "id": "CWE-187", "name": "Partial String Comparison" }, "notes": [ { "category": "other", "text": "Partial String Comparison", "title": "CWE-187" }, { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "references": [ { "category": "self", "summary": "CVE-2024-41110", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41110.json" } ], "title": "CVE-2024-41110" }, { "cve": "CVE-2024-37298", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "references": [ { "category": "self", "summary": "CVE-2024-37298", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37298.json" } ], "title": "CVE-2024-37298" }, { "cve": "CVE-2024-0397", "references": [ { "category": "self", "summary": "CVE-2024-0397", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json" } ], "title": "CVE-2024-0397" }, { "cve": "CVE-2024-38571", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-38571", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38571.json" } ], "title": "CVE-2024-38571" }, { "cve": "CVE-2024-42077", "references": [ { "category": "self", "summary": "CVE-2024-42077", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42077.json" } ], "title": "CVE-2024-42077" }, { "cve": "CVE-2024-39473", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-39473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39473.json" } ], "title": "CVE-2024-39473" }, { "cve": "CVE-2024-26900", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2024-26900", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26900.json" } ], "title": "CVE-2024-26900" }, { "cve": "CVE-2024-39474", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-39474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39474.json" } ], "title": "CVE-2024-39474" }, { "cve": "CVE-2024-42073", "references": [ { "category": "self", "summary": "CVE-2024-42073", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42073.json" } ], "title": "CVE-2024-42073" }, { "cve": "CVE-2024-42074", "references": [ { "category": "self", "summary": "CVE-2024-42074", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42074.json" } ], "title": "CVE-2024-42074" }, { "cve": "CVE-2024-42075", "references": [ { "category": "self", "summary": "CVE-2024-42075", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42075.json" } ], "title": "CVE-2024-42075" }, { "cve": "CVE-2024-42078", "references": [ { "category": "self", "summary": "CVE-2024-42078", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42078.json" } ], "title": "CVE-2024-42078" }, { "cve": "CVE-2024-0853", "cwe": { "id": "CWE-299", "name": "Improper Check for Certificate Revocation" }, "notes": [ { "category": "other", "text": "Improper Check for Certificate Revocation", "title": "CWE-299" } ], "references": [ { "category": "self", "summary": "CVE-2024-0853", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0853.json" } ], "title": "CVE-2024-0853" }, { "cve": "CVE-2024-2004", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "other", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" }, { "category": "other", "text": "Misinterpretation of Input", "title": "CWE-115" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-2004", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json" } ], "title": "CVE-2024-2004" }, { "cve": "CVE-2024-2398", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2024-2398", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json" } ], "title": "CVE-2024-2398" }, { "cve": "CVE-2024-38662", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-38662", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38662.json" } ], "title": "CVE-2024-38662" }, { "cve": "CVE-2024-36288", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "references": [ { "category": "self", "summary": "CVE-2024-36288", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36288.json" } ], "title": "CVE-2024-36288" }, { "cve": "CVE-2024-39480", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "references": [ { "category": "self", "summary": "CVE-2024-39480", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39480.json" } ], "title": "CVE-2024-39480" }, { "cve": "CVE-2024-39476", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "other", "text": "Deadlock", "title": "CWE-833" } ], "references": [ { "category": "self", "summary": "CVE-2024-39476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39476.json" } ], "title": "CVE-2024-39476" }, { "cve": "CVE-2024-39475", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "other", "text": "Divide By Zero", "title": "CWE-369" } ], "references": [ { "category": "self", "summary": "CVE-2024-39475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39475.json" } ], "title": "CVE-2024-39475" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-26461", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2024-26461", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26461.json" } ], "title": "CVE-2024-26461" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "references": [ { "category": "self", "summary": "CVE-2024-37370", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json" } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-6104", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "notes": [ { "category": "other", "text": "Insertion of Sensitive Information into Log File", "title": "CWE-532" } ], "references": [ { "category": "self", "summary": "CVE-2024-6104", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6104.json" } ], "title": "CVE-2024-6104" }, { "cve": "CVE-2024-6257", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-6257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6257.json" } ], "title": "CVE-2024-6257" }, { "cve": "CVE-2024-23722", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-23722", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23722.json" } ], "title": "CVE-2024-23722" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-38583", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-38583", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38583.json" } ], "title": "CVE-2024-38583" }, { "cve": "CVE-2024-39493", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2024-39493", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39493.json" } ], "title": "CVE-2024-39493" }, { "cve": "CVE-2024-42068", "references": [ { "category": "self", "summary": "CVE-2024-42068", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42068.json" } ], "title": "CVE-2024-42068" }, { "cve": "CVE-2024-39489", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2024-39489", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39489.json" } ], "title": "CVE-2024-39489" }, { "cve": "CVE-2024-42070", "references": [ { "category": "self", "summary": "CVE-2024-42070", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42070.json" } ], "title": "CVE-2024-42070" }, { "cve": "CVE-2024-42076", "references": [ { "category": "self", "summary": "CVE-2024-42076", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42076.json" } ], "title": "CVE-2024-42076" }, { "cve": "CVE-2024-42080", "references": [ { "category": "self", "summary": "CVE-2024-42080", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42080.json" } ], "title": "CVE-2024-42080" }, { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "notes": [ { "category": "other", "text": "Misinterpretation of Input", "title": "CWE-115" } ], "references": [ { "category": "self", "summary": "CVE-2024-38428", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38428.json" } ], "title": "CVE-2024-38428" }, { "cve": "CVE-2024-42082", "references": [ { "category": "self", "summary": "CVE-2024-42082", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42082.json" } ], "title": "CVE-2024-42082" }, { "cve": "CVE-2022-48788", "references": [ { "category": "self", "summary": "CVE-2022-48788", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48788.json" } ], "title": "CVE-2022-48788" }, { "cve": "CVE-2023-52340", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-52340", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52340.json" } ], "title": "CVE-2023-52340" }, { "cve": "CVE-2022-48841", "references": [ { "category": "self", "summary": "CVE-2022-48841", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48841.json" } ], "title": "CVE-2022-48841" }, { "cve": "CVE-2024-39485", "references": [ { "category": "self", "summary": "CVE-2024-39485", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39485.json" } ], "title": "CVE-2024-39485" }, { "cve": "CVE-2024-39483", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" } ], "references": [ { "category": "self", "summary": "CVE-2024-39483", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39483.json" } ], "title": "CVE-2024-39483" }, { "cve": "CVE-2024-42071", "references": [ { "category": "self", "summary": "CVE-2024-42071", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42071.json" } ], "title": "CVE-2024-42071" }, { "cve": "CVE-2024-42072", "references": [ { "category": "self", "summary": "CVE-2024-42072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42072.json" } ], "title": "CVE-2024-42072" }, { "cve": "CVE-2024-42237", "references": [ { "category": "self", "summary": "CVE-2024-42237", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42237.json" } ], "title": "CVE-2024-42237" }, { "cve": "CVE-2024-42083", "references": [ { "category": "self", "summary": "CVE-2024-42083", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42083.json" } ], "title": "CVE-2024-42083" } ] }
ncsc-2024-0339
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Microsoft heeft kwetsbaarheden verholpen in Mariner (Azure Linux).", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden betreffen oudere kwetsbaarheden in diverse subcomponenten van de distro, zoals Python, Emacs, Qemu, Django, Curl, wget etc. welke in de nieuwe versie zijn verholpen.", "title": "Interpretaties" }, { "category": "description", "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Misinterpretation of Input", "title": "CWE-115" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Validation of Array Index", "title": "CWE-129" }, { "category": "general", "text": "Partial String Comparison", "title": "CWE-187" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "general", "text": "Off-by-one Error", "title": "CWE-193" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Check for Dropped Privileges", "title": "CWE-273" }, { "category": "general", "text": "Improper Handling of Insufficient Permissions or Privileges ", "title": "CWE-280" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Improper Validation of Certificate with Host Mismatch", "title": "CWE-297" }, { "category": "general", "text": "Improper Check for Certificate Revocation", "title": "CWE-299" }, { "category": "general", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Divide By Zero", "title": "CWE-369" }, { "category": "general", "text": "CWE-371", "title": "CWE-371" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Insertion of Sensitive Information into Log File", "title": "CWE-532" }, { "category": "general", "text": "Improper Locking", "title": "CWE-667" }, { "category": "general", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Deadlock", "title": "CWE-833" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "title": "CWE-95" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "title": "Kwetsbaarheden verholpen in Microsoft Mariner", "tracking": { "current_release_date": "2024-08-13T18:23:22.271316Z", "id": "NCSC-2024-0339", "initial_release_date": "2024-08-13T18:23:22.271316Z", "revision_history": [ { "date": "2024-08-13T18:23:22.271316Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "cbl-mariner", "product": { "name": "cbl-mariner", "product_id": "CSAFPID-1489521", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2601", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2022-2601", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json" } ], "title": "CVE-2022-2601" }, { "cve": "CVE-2022-3775", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2022-3775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3775.json" } ], "title": "CVE-2022-3775" }, { "cve": "CVE-2022-36648", "references": [ { "category": "self", "summary": "CVE-2022-36648", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36648.json" } ], "title": "CVE-2022-36648" }, { "cve": "CVE-2019-3833", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2019-3833", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3833.json" } ], "title": "CVE-2019-3833" }, { "cve": "CVE-2021-3929", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2021-3929", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3929.json" } ], "title": "CVE-2021-3929" }, { "cve": "CVE-2021-4158", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2021-4158", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4158.json" } ], "title": "CVE-2021-4158" }, { "cve": "CVE-2021-4206", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2021-4206", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4206.json" } ], "title": "CVE-2021-4206" }, { "cve": "CVE-2021-4207", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "references": [ { "category": "self", "summary": "CVE-2021-4207", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4207.json" } ], "title": "CVE-2021-4207" }, { "cve": "CVE-2022-26353", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" } ], "references": [ { "category": "self", "summary": "CVE-2022-26353", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26353.json" } ], "title": "CVE-2022-26353" }, { "cve": "CVE-2022-35414", "references": [ { "category": "self", "summary": "CVE-2022-35414", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-35414.json" } ], "title": "CVE-2022-35414" }, { "cve": "CVE-2023-3354", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2023-3354", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3354.json" } ], "title": "CVE-2023-3354" }, { "cve": "CVE-2022-3872", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "other", "text": "Off-by-one Error", "title": "CWE-193" } ], "references": [ { "category": "self", "summary": "CVE-2022-3872", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3872.json" } ], "title": "CVE-2022-3872" }, { "cve": "CVE-2022-4144", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2022-4144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4144.json" } ], "title": "CVE-2022-4144" }, { "cve": "CVE-2023-45288", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-45288", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json" } ], "title": "CVE-2023-45288" }, { "cve": "CVE-2023-29404", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "references": [ { "category": "self", "summary": "CVE-2023-29404", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29404.json" } ], "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29402", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "references": [ { "category": "self", "summary": "CVE-2023-29402", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29402.json" } ], "title": "CVE-2023-29402" }, { "cve": "CVE-2019-3816", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "references": [ { "category": "self", "summary": "CVE-2019-3816", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3816.json" } ], "title": "CVE-2019-3816" }, { "cve": "CVE-2021-3750", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2021-3750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3750.json" } ], "title": "CVE-2021-3750" }, { "cve": "CVE-2022-0358", "cwe": { "id": "CWE-273", "name": "Improper Check for Dropped Privileges" }, "notes": [ { "category": "other", "text": "Improper Check for Dropped Privileges", "title": "CWE-273" } ], "references": [ { "category": "self", "summary": "CVE-2022-0358", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-0358.json" } ], "title": "CVE-2022-0358" }, { "cve": "CVE-2022-26354", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" } ], "references": [ { "category": "self", "summary": "CVE-2022-26354", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26354.json" } ], "title": "CVE-2022-26354" }, { "cve": "CVE-2022-3165", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2022-3165", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3165.json" } ], "title": "CVE-2022-3165" }, { "cve": "CVE-2022-2962", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2022-2962", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2962.json" } ], "title": "CVE-2022-2962" }, { "cve": "CVE-2022-41722", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "references": [ { "category": "self", "summary": "CVE-2022-41722", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41722.json" } ], "title": "CVE-2022-41722" }, { "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "notes": [ { "category": "other", "text": "Improper Handling of Insufficient Permissions or Privileges ", "title": "CWE-280" }, { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "references": [ { "category": "self", "summary": "CVE-2022-29526", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-29526.json" } ], "title": "CVE-2022-29526" }, { "cve": "CVE-2007-4559", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "references": [ { "category": "self", "summary": "CVE-2007-4559", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2007/CVE-2007-4559.json" } ], "title": "CVE-2007-4559" }, { "cve": "CVE-2019-9674", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2019-9674", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-9674.json" } ], "title": "CVE-2019-9674" }, { "cve": "CVE-2017-18207", "references": [ { "category": "self", "summary": "CVE-2017-18207", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-18207.json" } ], "title": "CVE-2017-18207" }, { "cve": "CVE-2019-20907", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2019-20907", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-20907.json" } ], "title": "CVE-2019-20907" }, { "cve": "CVE-2021-23336", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" } ], "references": [ { "category": "self", "summary": "CVE-2021-23336", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23336.json" } ], "title": "CVE-2021-23336" }, { "cve": "CVE-2017-17522", "references": [ { "category": "self", "summary": "CVE-2017-17522", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-17522.json" } ], "title": "CVE-2017-17522" }, { "cve": "CVE-2024-6655", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "references": [ { "category": "self", "summary": "CVE-2024-6655", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6655.json" } ], "title": "CVE-2024-6655" }, { "cve": "CVE-2024-2466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Improper Validation of Certificate with Host Mismatch", "title": "CWE-297" } ], "references": [ { "category": "self", "summary": "CVE-2024-2466", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json" } ], "title": "CVE-2024-2466" }, { "cve": "CVE-2024-39331", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "title": "CWE-95" } ], "references": [ { "category": "self", "summary": "CVE-2024-39331", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39331.json" } ], "title": "CVE-2024-39331" }, { "cve": "CVE-2021-43565", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2021-43565", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-43565.json" } ], "title": "CVE-2021-43565" }, { "cve": "CVE-2024-39277", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "notes": [ { "category": "other", "text": "Improper Validation of Array Index", "title": "CWE-129" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-39277", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39277.json" } ], "title": "CVE-2024-39277" }, { "cve": "CVE-2024-38780", "cwe": { "id": "CWE-371", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-371", "title": "CWE-371" }, { "category": "other", "text": "Improper Locking", "title": "CWE-667" } ], "references": [ { "category": "self", "summary": "CVE-2024-38780", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38780.json" } ], "title": "CVE-2024-38780" }, { "cve": "CVE-2024-39292", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-39292", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39292.json" } ], "title": "CVE-2024-39292" }, { "cve": "CVE-2024-39482", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-39482", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39482.json" } ], "title": "CVE-2024-39482" }, { "cve": "CVE-2024-39484", "references": [ { "category": "self", "summary": "CVE-2024-39484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39484.json" } ], "title": "CVE-2024-39484" }, { "cve": "CVE-2024-39495", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-39495", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39495.json" } ], "title": "CVE-2024-39495" }, { "cve": "CVE-2024-40902", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "references": [ { "category": "self", "summary": "CVE-2024-40902", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40902.json" } ], "title": "CVE-2024-40902" }, { "cve": "CVE-2024-41110", "cwe": { "id": "CWE-187", "name": "Partial String Comparison" }, "notes": [ { "category": "other", "text": "Partial String Comparison", "title": "CWE-187" }, { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "references": [ { "category": "self", "summary": "CVE-2024-41110", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41110.json" } ], "title": "CVE-2024-41110" }, { "cve": "CVE-2024-37298", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "references": [ { "category": "self", "summary": "CVE-2024-37298", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37298.json" } ], "title": "CVE-2024-37298" }, { "cve": "CVE-2024-0397", "references": [ { "category": "self", "summary": "CVE-2024-0397", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json" } ], "title": "CVE-2024-0397" }, { "cve": "CVE-2024-38571", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-38571", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38571.json" } ], "title": "CVE-2024-38571" }, { "cve": "CVE-2024-42077", "references": [ { "category": "self", "summary": "CVE-2024-42077", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42077.json" } ], "title": "CVE-2024-42077" }, { "cve": "CVE-2024-39473", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-39473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39473.json" } ], "title": "CVE-2024-39473" }, { "cve": "CVE-2024-26900", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2024-26900", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26900.json" } ], "title": "CVE-2024-26900" }, { "cve": "CVE-2024-39474", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-39474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39474.json" } ], "title": "CVE-2024-39474" }, { "cve": "CVE-2024-42073", "references": [ { "category": "self", "summary": "CVE-2024-42073", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42073.json" } ], "title": "CVE-2024-42073" }, { "cve": "CVE-2024-42074", "references": [ { "category": "self", "summary": "CVE-2024-42074", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42074.json" } ], "title": "CVE-2024-42074" }, { "cve": "CVE-2024-42075", "references": [ { "category": "self", "summary": "CVE-2024-42075", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42075.json" } ], "title": "CVE-2024-42075" }, { "cve": "CVE-2024-42078", "references": [ { "category": "self", "summary": "CVE-2024-42078", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42078.json" } ], "title": "CVE-2024-42078" }, { "cve": "CVE-2024-0853", "cwe": { "id": "CWE-299", "name": "Improper Check for Certificate Revocation" }, "notes": [ { "category": "other", "text": "Improper Check for Certificate Revocation", "title": "CWE-299" } ], "references": [ { "category": "self", "summary": "CVE-2024-0853", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0853.json" } ], "title": "CVE-2024-0853" }, { "cve": "CVE-2024-2004", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "other", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" }, { "category": "other", "text": "Misinterpretation of Input", "title": "CWE-115" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-2004", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json" } ], "title": "CVE-2024-2004" }, { "cve": "CVE-2024-2398", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2024-2398", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json" } ], "title": "CVE-2024-2398" }, { "cve": "CVE-2024-38662", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-38662", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38662.json" } ], "title": "CVE-2024-38662" }, { "cve": "CVE-2024-36288", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "references": [ { "category": "self", "summary": "CVE-2024-36288", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36288.json" } ], "title": "CVE-2024-36288" }, { "cve": "CVE-2024-39480", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "references": [ { "category": "self", "summary": "CVE-2024-39480", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39480.json" } ], "title": "CVE-2024-39480" }, { "cve": "CVE-2024-39476", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "other", "text": "Deadlock", "title": "CWE-833" } ], "references": [ { "category": "self", "summary": "CVE-2024-39476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39476.json" } ], "title": "CVE-2024-39476" }, { "cve": "CVE-2024-39475", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "other", "text": "Divide By Zero", "title": "CWE-369" } ], "references": [ { "category": "self", "summary": "CVE-2024-39475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39475.json" } ], "title": "CVE-2024-39475" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-26461", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2024-26461", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26461.json" } ], "title": "CVE-2024-26461" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "references": [ { "category": "self", "summary": "CVE-2024-37370", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json" } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-6104", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "notes": [ { "category": "other", "text": "Insertion of Sensitive Information into Log File", "title": "CWE-532" } ], "references": [ { "category": "self", "summary": "CVE-2024-6104", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6104.json" } ], "title": "CVE-2024-6104" }, { "cve": "CVE-2024-6257", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-6257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6257.json" } ], "title": "CVE-2024-6257" }, { "cve": "CVE-2024-23722", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-23722", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23722.json" } ], "title": "CVE-2024-23722" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-38583", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-38583", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38583.json" } ], "title": "CVE-2024-38583" }, { "cve": "CVE-2024-39493", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2024-39493", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39493.json" } ], "title": "CVE-2024-39493" }, { "cve": "CVE-2024-42068", "references": [ { "category": "self", "summary": "CVE-2024-42068", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42068.json" } ], "title": "CVE-2024-42068" }, { "cve": "CVE-2024-39489", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "references": [ { "category": "self", "summary": "CVE-2024-39489", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39489.json" } ], "title": "CVE-2024-39489" }, { "cve": "CVE-2024-42070", "references": [ { "category": "self", "summary": "CVE-2024-42070", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42070.json" } ], "title": "CVE-2024-42070" }, { "cve": "CVE-2024-42076", "references": [ { "category": "self", "summary": "CVE-2024-42076", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42076.json" } ], "title": "CVE-2024-42076" }, { "cve": "CVE-2024-42080", "references": [ { "category": "self", "summary": "CVE-2024-42080", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42080.json" } ], "title": "CVE-2024-42080" }, { "cve": "CVE-2024-38428", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "notes": [ { "category": "other", "text": "Misinterpretation of Input", "title": "CWE-115" } ], "references": [ { "category": "self", "summary": "CVE-2024-38428", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38428.json" } ], "title": "CVE-2024-38428" }, { "cve": "CVE-2024-42082", "references": [ { "category": "self", "summary": "CVE-2024-42082", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42082.json" } ], "title": "CVE-2024-42082" }, { "cve": "CVE-2022-48788", "references": [ { "category": "self", "summary": "CVE-2022-48788", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48788.json" } ], "title": "CVE-2022-48788" }, { "cve": "CVE-2023-52340", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-52340", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52340.json" } ], "title": "CVE-2023-52340" }, { "cve": "CVE-2022-48841", "references": [ { "category": "self", "summary": "CVE-2022-48841", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48841.json" } ], "title": "CVE-2022-48841" }, { "cve": "CVE-2024-39485", "references": [ { "category": "self", "summary": "CVE-2024-39485", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39485.json" } ], "title": "CVE-2024-39485" }, { "cve": "CVE-2024-39483", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "title": "CWE-74" } ], "references": [ { "category": "self", "summary": "CVE-2024-39483", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39483.json" } ], "title": "CVE-2024-39483" }, { "cve": "CVE-2024-42071", "references": [ { "category": "self", "summary": "CVE-2024-42071", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42071.json" } ], "title": "CVE-2024-42071" }, { "cve": "CVE-2024-42072", "references": [ { "category": "self", "summary": "CVE-2024-42072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42072.json" } ], "title": "CVE-2024-42072" }, { "cve": "CVE-2024-42237", "references": [ { "category": "self", "summary": "CVE-2024-42237", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42237.json" } ], "title": "CVE-2024-42237" }, { "cve": "CVE-2024-42083", "references": [ { "category": "self", "summary": "CVE-2024-42083", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42083.json" } ], "title": "CVE-2024-42083" } ] }
suse-su-2024:2174-2
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wget", "title": "Title of the patch" }, { "category": "description", "text": "This update for wget fixes the following issues:\n\n- CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a URI. (bsc#1226419)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-2174,SUSE-SLE-Micro-5.5-2024-2174", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2174-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:2174-2", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242174-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:2174-2", "url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035950.html" }, { "category": "self", "summary": "SUSE Bug 1226419", "url": "https://bugzilla.suse.com/1226419" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38428 page", "url": "https://www.suse.com/security/cve/CVE-2024-38428/" } ], "title": "Security update for wget", "tracking": { "current_release_date": "2024-06-24T05:20:58Z", "generator": { "date": "2024-06-24T05:20:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:2174-2", "initial_release_date": "2024-06-24T05:20:58Z", "revision_history": [ { "date": "2024-06-24T05:20:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150000.3.20.1.aarch64", "product": { "name": "wget-1.20.3-150000.3.20.1.aarch64", "product_id": "wget-1.20.3-150000.3.20.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150000.3.20.1.i586", "product": { "name": "wget-1.20.3-150000.3.20.1.i586", "product_id": "wget-1.20.3-150000.3.20.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "wget-lang-1.20.3-150000.3.20.1.noarch", "product": { "name": "wget-lang-1.20.3-150000.3.20.1.noarch", "product_id": "wget-lang-1.20.3-150000.3.20.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150000.3.20.1.ppc64le", "product": { "name": "wget-1.20.3-150000.3.20.1.ppc64le", "product_id": "wget-1.20.3-150000.3.20.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150000.3.20.1.s390x", "product": { "name": "wget-1.20.3-150000.3.20.1.s390x", "product_id": "wget-1.20.3-150000.3.20.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150000.3.20.1.x86_64", "product": { "name": "wget-1.20.3-150000.3.20.1.x86_64", "product_id": "wget-1.20.3-150000.3.20.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.aarch64" }, "product_reference": "wget-1.20.3-150000.3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.ppc64le" }, "product_reference": "wget-1.20.3-150000.3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.s390x" }, "product_reference": "wget-1.20.3-150000.3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.x86_64" }, "product_reference": "wget-1.20.3-150000.3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38428" } ], "notes": [ { "category": "general", "text": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.aarch64", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.s390x", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38428", "url": "https://www.suse.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "SUSE Bug 1226419 for CVE-2024-38428", "url": "https://bugzilla.suse.com/1226419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.aarch64", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.s390x", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.aarch64", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.s390x", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-24T05:20:58Z", "details": "moderate" } ], "title": "CVE-2024-38428" } ] }
suse-su-2024:2154-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wget", "title": "Title of the patch" }, { "category": "description", "text": "This update for wget fixes the following issues:\n\n- CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a URI. (bsc#1226419)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-2154,SUSE-SLE-SERVER-12-SP5-2024-2154", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2154-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:2154-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242154-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:2154-1", "url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035694.html" }, { "category": "self", "summary": "SUSE Bug 1226419", "url": "https://bugzilla.suse.com/1226419" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38428 page", "url": "https://www.suse.com/security/cve/CVE-2024-38428/" } ], "title": "Security update for wget", "tracking": { "current_release_date": "2024-06-21T14:15:13Z", "generator": { "date": "2024-06-21T14:15:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:2154-1", "initial_release_date": "2024-06-21T14:15:13Z", "revision_history": [ { "date": "2024-06-21T14:15:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wget-1.14-21.19.1.aarch64", "product": { "name": "wget-1.14-21.19.1.aarch64", "product_id": "wget-1.14-21.19.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-1.14-21.19.1.i586", "product": { "name": "wget-1.14-21.19.1.i586", "product_id": "wget-1.14-21.19.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "wget-1.14-21.19.1.ppc64le", "product": { "name": "wget-1.14-21.19.1.ppc64le", "product_id": "wget-1.14-21.19.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-1.14-21.19.1.s390", "product": { "name": "wget-1.14-21.19.1.s390", "product_id": "wget-1.14-21.19.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "wget-1.14-21.19.1.s390x", "product": { "name": "wget-1.14-21.19.1.s390x", "product_id": "wget-1.14-21.19.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wget-1.14-21.19.1.x86_64", "product": { "name": "wget-1.14-21.19.1.x86_64", "product_id": "wget-1.14-21.19.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.aarch64" }, "product_reference": "wget-1.14-21.19.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.ppc64le" }, "product_reference": "wget-1.14-21.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.s390x" }, "product_reference": "wget-1.14-21.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.x86_64" }, "product_reference": "wget-1.14-21.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.19.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.aarch64" }, "product_reference": "wget-1.14-21.19.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.ppc64le" }, "product_reference": "wget-1.14-21.19.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.s390x" }, "product_reference": "wget-1.14-21.19.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.x86_64" }, "product_reference": "wget-1.14-21.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38428" } ], "notes": [ { "category": "general", "text": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38428", "url": "https://www.suse.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "SUSE Bug 1226419 for CVE-2024-38428", "url": "https://bugzilla.suse.com/1226419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.s390x", "SUSE Linux Enterprise Server 12 SP5:wget-1.14-21.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:wget-1.14-21.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-21T14:15:13Z", "details": "moderate" } ], "title": "CVE-2024-38428" } ] }
suse-su-2024:2201-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wget", "title": "Title of the patch" }, { "category": "description", "text": "This update for wget fixes the following issues:\n\n- CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a URI. (bsc#1226419)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-2201,SUSE-SLE-Module-Basesystem-15-SP6-2024-2201,openSUSE-SLE-15.6-2024-2201", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2201-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:2201-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242201-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:2201-1", "url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035723.html" }, { "category": "self", "summary": "SUSE Bug 1226419", "url": "https://bugzilla.suse.com/1226419" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38428 page", "url": "https://www.suse.com/security/cve/CVE-2024-38428/" } ], "title": "Security update for wget", "tracking": { "current_release_date": "2024-06-25T11:53:40Z", "generator": { "date": "2024-06-25T11:53:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:2201-1", "initial_release_date": "2024-06-25T11:53:40Z", "revision_history": [ { "date": "2024-06-25T11:53:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150600.19.3.1.aarch64", "product": { "name": "wget-1.20.3-150600.19.3.1.aarch64", "product_id": "wget-1.20.3-150600.19.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150600.19.3.1.i586", "product": { "name": "wget-1.20.3-150600.19.3.1.i586", "product_id": "wget-1.20.3-150600.19.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "wget-lang-1.20.3-150600.19.3.1.noarch", "product": { "name": "wget-lang-1.20.3-150600.19.3.1.noarch", "product_id": "wget-lang-1.20.3-150600.19.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150600.19.3.1.ppc64le", "product": { "name": "wget-1.20.3-150600.19.3.1.ppc64le", "product_id": "wget-1.20.3-150600.19.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150600.19.3.1.s390x", "product": { "name": "wget-1.20.3-150600.19.3.1.s390x", "product_id": "wget-1.20.3-150600.19.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150600.19.3.1.x86_64", "product": { "name": "wget-1.20.3-150600.19.3.1.x86_64", "product_id": "wget-1.20.3-150600.19.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150600.19.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.aarch64" }, "product_reference": "wget-1.20.3-150600.19.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150600.19.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.ppc64le" }, "product_reference": "wget-1.20.3-150600.19.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150600.19.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.s390x" }, "product_reference": "wget-1.20.3-150600.19.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150600.19.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.x86_64" }, "product_reference": "wget-1.20.3-150600.19.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150600.19.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.aarch64" }, "product_reference": "wget-1.20.3-150600.19.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150600.19.3.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.ppc64le" }, "product_reference": "wget-1.20.3-150600.19.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150600.19.3.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.s390x" }, "product_reference": "wget-1.20.3-150600.19.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150600.19.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.x86_64" }, "product_reference": "wget-1.20.3-150600.19.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-lang-1.20.3-150600.19.3.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:wget-lang-1.20.3-150600.19.3.1.noarch" }, "product_reference": "wget-lang-1.20.3-150600.19.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38428" } ], "notes": [ { "category": "general", "text": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.x86_64", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.aarch64", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.ppc64le", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.s390x", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.x86_64", "openSUSE Leap 15.6:wget-lang-1.20.3-150600.19.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38428", "url": "https://www.suse.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "SUSE Bug 1226419 for CVE-2024-38428", "url": "https://bugzilla.suse.com/1226419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.x86_64", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.aarch64", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.ppc64le", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.s390x", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.x86_64", "openSUSE Leap 15.6:wget-lang-1.20.3-150600.19.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:wget-1.20.3-150600.19.3.1.x86_64", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.aarch64", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.ppc64le", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.s390x", "openSUSE Leap 15.6:wget-1.20.3-150600.19.3.1.x86_64", "openSUSE Leap 15.6:wget-lang-1.20.3-150600.19.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-06-25T11:53:40Z", "details": "moderate" } ], "title": "CVE-2024-38428" } ] }
suse-su-2024:2174-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wget", "title": "Title of the patch" }, { "category": "description", "text": "This update for wget fixes the following issues:\n\n- CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a URI. (bsc#1226419)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-2174,SUSE-SLE-Micro-5.5-2024-2174,SUSE-SLE-Module-Basesystem-15-SP5-2024-2174,openSUSE-SLE-15.5-2024-2174", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2174-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:2174-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242174-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:2174-1", "url": "https://lists.suse.com/pipermail/sle-updates/2024-June/035703.html" }, { "category": "self", "summary": "SUSE Bug 1226419", "url": "https://bugzilla.suse.com/1226419" }, { "category": "self", "summary": "SUSE CVE CVE-2024-38428 page", "url": "https://www.suse.com/security/cve/CVE-2024-38428/" } ], "title": "Security update for wget", "tracking": { "current_release_date": "2024-06-24T05:20:50Z", "generator": { "date": "2024-06-24T05:20:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:2174-1", "initial_release_date": "2024-06-24T05:20:50Z", "revision_history": [ { "date": "2024-06-24T05:20:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150000.3.20.1.aarch64", "product": { "name": "wget-1.20.3-150000.3.20.1.aarch64", "product_id": "wget-1.20.3-150000.3.20.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150000.3.20.1.i586", "product": { "name": "wget-1.20.3-150000.3.20.1.i586", "product_id": "wget-1.20.3-150000.3.20.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "wget-lang-1.20.3-150000.3.20.1.noarch", "product": { "name": "wget-lang-1.20.3-150000.3.20.1.noarch", "product_id": "wget-lang-1.20.3-150000.3.20.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150000.3.20.1.ppc64le", "product": { "name": "wget-1.20.3-150000.3.20.1.ppc64le", "product_id": "wget-1.20.3-150000.3.20.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150000.3.20.1.s390x", "product": { "name": "wget-1.20.3-150000.3.20.1.s390x", "product_id": "wget-1.20.3-150000.3.20.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wget-1.20.3-150000.3.20.1.x86_64", "product": { "name": "wget-1.20.3-150000.3.20.1.x86_64", "product_id": "wget-1.20.3-150000.3.20.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.aarch64" }, "product_reference": "wget-1.20.3-150000.3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.ppc64le" }, "product_reference": "wget-1.20.3-150000.3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.s390x" }, "product_reference": "wget-1.20.3-150000.3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.x86_64" }, "product_reference": "wget-1.20.3-150000.3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.aarch64" }, "product_reference": "wget-1.20.3-150000.3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.ppc64le" }, "product_reference": "wget-1.20.3-150000.3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.s390x" }, "product_reference": "wget-1.20.3-150000.3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.x86_64" }, "product_reference": "wget-1.20.3-150000.3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.aarch64" }, "product_reference": "wget-1.20.3-150000.3.20.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.ppc64le" }, "product_reference": "wget-1.20.3-150000.3.20.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.s390x" }, "product_reference": "wget-1.20.3-150000.3.20.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.20.3-150000.3.20.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.x86_64" }, "product_reference": "wget-1.20.3-150000.3.20.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "wget-lang-1.20.3-150000.3.20.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:wget-lang-1.20.3-150000.3.20.1.noarch" }, "product_reference": "wget-lang-1.20.3-150000.3.20.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-38428" } ], "notes": [ { "category": "general", "text": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.aarch64", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.s390x", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.x86_64", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.aarch64", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.ppc64le", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.s390x", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.x86_64", "openSUSE Leap 15.5:wget-lang-1.20.3-150000.3.20.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-38428", "url": "https://www.suse.com/security/cve/CVE-2024-38428" }, { "category": "external", "summary": "SUSE Bug 1226419 for CVE-2024-38428", "url": "https://bugzilla.suse.com/1226419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.aarch64", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.s390x", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.x86_64", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.aarch64", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.ppc64le", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.s390x", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.x86_64", "openSUSE Leap 15.5:wget-lang-1.20.3-150000.3.20.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.aarch64", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.s390x", "SUSE Linux Enterprise Micro 5.5:wget-1.20.3-150000.3.20.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:wget-1.20.3-150000.3.20.1.x86_64", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.aarch64", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.ppc64le", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.s390x", "openSUSE Leap 15.5:wget-1.20.3-150000.3.20.1.x86_64", "openSUSE Leap 15.5:wget-lang-1.20.3-150000.3.20.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-06-24T05:20:50Z", "details": "moderate" } ], "title": "CVE-2024-38428" } ] }
fkie_cve-2024-38428
Vulnerability from fkie_nvd
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
URL | Tags | ||
---|---|---|---|
cve@mitre.org | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace | Mailing List, Patch | |
cve@mitre.org | https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html | Mailing List, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace | Mailing List, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2025/04/msg00029.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html | Mailing List, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20241115-0005/ |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFC92ECA-B3E9-413B-A576-D563F357A047", "versionEndIncluding": "1.24.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent." }, { "lang": "es", "value": "url.c en GNU Wget hasta 1.24.5 maneja mal los puntos y comas en el subcomponente de informaci\u00f3n de usuario de un URI y, por lo tanto, puede haber un comportamiento inseguro en el que los datos que se supon\u00eda que estaban en el subcomponente de informaci\u00f3n de usuario se malinterpretan como parte del subcomponente del host." } ], "id": "CVE-2024-38428", "lastModified": "2025-04-21T10:15:14.207", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-06-16T03:15:08.430", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch" ], "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch" ], "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch" ], "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch" ], "url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20241115-0005/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-436" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-436" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.