Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-42234 (GCVE-0-2024-42234)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42234", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T16:14:10.736603Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T17:34:32.409Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "mm/memcontrol.c", "mm/migrate.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "fc7facce686b64201dbf0b9614cc1d0bfad70010", "status": "affected", "version": "9bcef5973e31020e5aa8571eb994d67b77318356", "versionType": "git" }, { "lessThan": "be9581ea8c058d81154251cb0695987098996cad", "status": "affected", "version": "9bcef5973e31020e5aa8571eb994d67b77318356", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "mm/memcontrol.c", "mm/migrate.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.7" }, { "lessThan": "6.7", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.9.*", "status": "unaffected", "version": "6.9.10", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.10", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.9.10", "versionStartIncluding": "6.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.10", "versionStartIncluding": "6.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix crashes from deferred split racing folio migration\n\nEven on 6.10-rc6, I\u0027ve been seeing elusive \"Bad page state\"s (often on\nflags when freeing, yet the flags shown are not bad: PG_locked had been\nset and cleared??), and VM_BUG_ON_PAGE(page_ref_count(page) == 0)s from\ndeferred_split_scan()\u0027s folio_put(), and a variety of other BUG and WARN\nsymptoms implying double free by deferred split and large folio migration.\n\n6.7 commit 9bcef5973e31 (\"mm: memcg: fix split queue list crash when large\nfolio migration\") was right to fix the memcg-dependent locking broken in\n85ce2c517ade (\"memcontrol: only transfer the memcg data for migration\"),\nbut missed a subtlety of deferred_split_scan(): it moves folios to its own\nlocal list to work on them without split_queue_lock, during which time\nfolio-\u003e_deferred_list is not empty, but even the \"right\" lock does nothing\nto secure the folio and the list it is on.\n\nFortunately, deferred_split_scan() is careful to use folio_try_get(): so\nfolio_migrate_mapping() can avoid the race by folio_undo_large_rmappable()\nwhile the old folio\u0027s reference count is temporarily frozen to 0 - adding\nsuch a freeze in the !mapping case too (originally, folio lock and\nunmapping and no swap cache left an anon folio unreachable, so no freezing\nwas needed there: but the deferred split queue offers a way to reach it)." } ], "providerMetadata": { "dateUpdated": "2025-05-04T09:24:43.812Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/fc7facce686b64201dbf0b9614cc1d0bfad70010" }, { "url": "https://git.kernel.org/stable/c/be9581ea8c058d81154251cb0695987098996cad" } ], "title": "mm: fix crashes from deferred split racing folio migration", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-42234", "datePublished": "2024-08-07T15:14:24.467Z", "dateReserved": "2024-07-30T07:40:12.252Z", "dateUpdated": "2025-05-04T09:24:43.812Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-42234\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-08-07T16:15:46.390\",\"lastModified\":\"2024-08-08T14:55:29.913\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm: fix crashes from deferred split racing folio migration\\n\\nEven on 6.10-rc6, I\u0027ve been seeing elusive \\\"Bad page state\\\"s (often on\\nflags when freeing, yet the flags shown are not bad: PG_locked had been\\nset and cleared??), and VM_BUG_ON_PAGE(page_ref_count(page) == 0)s from\\ndeferred_split_scan()\u0027s folio_put(), and a variety of other BUG and WARN\\nsymptoms implying double free by deferred split and large folio migration.\\n\\n6.7 commit 9bcef5973e31 (\\\"mm: memcg: fix split queue list crash when large\\nfolio migration\\\") was right to fix the memcg-dependent locking broken in\\n85ce2c517ade (\\\"memcontrol: only transfer the memcg data for migration\\\"),\\nbut missed a subtlety of deferred_split_scan(): it moves folios to its own\\nlocal list to work on them without split_queue_lock, during which time\\nfolio-\u003e_deferred_list is not empty, but even the \\\"right\\\" lock does nothing\\nto secure the folio and the list it is on.\\n\\nFortunately, deferred_split_scan() is careful to use folio_try_get(): so\\nfolio_migrate_mapping() can avoid the race by folio_undo_large_rmappable()\\nwhile the old folio\u0027s reference count is temporarily frozen to 0 - adding\\nsuch a freeze in the !mapping case too (originally, folio lock and\\nunmapping and no swap cache left an anon folio unreachable, so no freezing\\nwas needed there: but the deferred split queue offers a way to reach it).\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm: corrige fallas debido a la migraci\u00f3n diferida de folios de ejecuciones divididas Incluso en 6.10-rc6, he estado viendo \\\"estados de p\u00e1gina incorrectos\\\" esquivos (a menudo en indicadores al liberar, pero los indicadores mostrados no son malos: \u00bfPG_locked se hab\u00eda configurado y borrado?), y VM_BUG_ON_PAGE(page_ref_count(page) == 0)s de folio_put() de deferred_split_scan(), y una variedad de otros s\u00edntomas de ERROR y ADVERTENCIA que implican doble liberaci\u00f3n por divisi\u00f3n diferida y migraci\u00f3n de folios grandes. 6.7 el commit 9bcef5973e31 (\\\"mm: memcg: corregir el bloqueo de la lista de colas divididas cuando se migra un folio grande\\\") ten\u00eda raz\u00f3n al corregir el bloqueo dependiente de memcg roto en 85ce2c517ade (\\\"memcontrol: transferir solo los datos de memcg para la migraci\u00f3n\\\"), pero omiti\u00f3 una sutileza de deferred_split_scan(): mueve las publicaciones a su propia lista local para trabajar en ellas sin split_queue_lock, tiempo durante el cual folio-\u0026gt;_deferred_list no est\u00e1 vac\u00edo, pero ni siquiera el bloqueo \\\"derecho\\\" hace nada para proteger la publicaci\u00f3n y la lista en la que se encuentra. Afortunadamente, deferred_split_scan() tiene cuidado al usar folio_try_get(): por lo que folio_migrate_mapping() puede evitar la ejecuci\u00f3n mediante folio_undo_large_rmappable() mientras el recuento de referencias de la publicaci\u00f3n anterior se congela temporalmente en 0; agregando dicha congelaci\u00f3n tambi\u00e9n en el caso de !mapping (originalmente, El bloqueo y la desasignaci\u00f3n de folios y la falta de cach\u00e9 de intercambio dejaron un folio an\u00f3nimo inalcanzable, por lo que no fue necesario congelarlo all\u00ed: pero la cola dividida diferida ofrece una forma de acceder a \u00e9l).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-415\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.9.10\",\"matchCriteriaId\":\"AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/be9581ea8c058d81154251cb0695987098996cad\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/fc7facce686b64201dbf0b9614cc1d0bfad70010\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-42234\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:14:10.736603Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:24.305Z\"}}], \"cna\": {\"title\": \"mm: fix crashes from deferred split racing folio migration\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"9bcef5973e31020e5aa8571eb994d67b77318356\", \"lessThan\": \"fc7facce686b64201dbf0b9614cc1d0bfad70010\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"9bcef5973e31020e5aa8571eb994d67b77318356\", \"lessThan\": \"be9581ea8c058d81154251cb0695987098996cad\", \"versionType\": \"git\"}], \"programFiles\": [\"mm/memcontrol.c\", \"mm/migrate.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.7\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.7\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.9.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"mm/memcontrol.c\", \"mm/migrate.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/fc7facce686b64201dbf0b9614cc1d0bfad70010\"}, {\"url\": \"https://git.kernel.org/stable/c/be9581ea8c058d81154251cb0695987098996cad\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm: fix crashes from deferred split racing folio migration\\n\\nEven on 6.10-rc6, I\u0027ve been seeing elusive \\\"Bad page state\\\"s (often on\\nflags when freeing, yet the flags shown are not bad: PG_locked had been\\nset and cleared??), and VM_BUG_ON_PAGE(page_ref_count(page) == 0)s from\\ndeferred_split_scan()\u0027s folio_put(), and a variety of other BUG and WARN\\nsymptoms implying double free by deferred split and large folio migration.\\n\\n6.7 commit 9bcef5973e31 (\\\"mm: memcg: fix split queue list crash when large\\nfolio migration\\\") was right to fix the memcg-dependent locking broken in\\n85ce2c517ade (\\\"memcontrol: only transfer the memcg data for migration\\\"),\\nbut missed a subtlety of deferred_split_scan(): it moves folios to its own\\nlocal list to work on them without split_queue_lock, during which time\\nfolio-\u003e_deferred_list is not empty, but even the \\\"right\\\" lock does nothing\\nto secure the folio and the list it is on.\\n\\nFortunately, deferred_split_scan() is careful to use folio_try_get(): so\\nfolio_migrate_mapping() can avoid the race by folio_undo_large_rmappable()\\nwhile the old folio\u0027s reference count is temporarily frozen to 0 - adding\\nsuch a freeze in the !mapping case too (originally, folio lock and\\nunmapping and no swap cache left an anon folio unreachable, so no freezing\\nwas needed there: but the deferred split queue offers a way to reach it).\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.9.10\", \"versionStartIncluding\": \"6.7\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10\", \"versionStartIncluding\": \"6.7\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:24:43.812Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-42234\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:24:43.812Z\", \"dateReserved\": \"2024-07-30T07:40:12.252Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-08-07T15:14:24.467Z\", \"assignerShortName\": \"Linux\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
wid-sec-w-2024-1788
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1788 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1788.json" }, { "category": "self", "summary": "WID-SEC-2024-1788 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1788" }, { "category": "external", "summary": "Linux CVE Announce vom 2024-08-07", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5747 vom 2024-08-12", "url": "https://security-tracker.debian.org/tracker/DSA-5747-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12610 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12610.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12612 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12612.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12618 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12618.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7003-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3227-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019430.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7006-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7006-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3225-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019432.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-3 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7003-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-1 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7007-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3249-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019438.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6745 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6745" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6744 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6744" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-2 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7007-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6997" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-3 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7007-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3408-1 vom 2024-09-24", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TGC7PQ5QNGEZWYIHCKH2KPZMGYJ4VN6B/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7009-2 vom 2024-09-25", "url": "https://ubuntu.com/security/notices/USN-7009-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6997 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-6997.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-7000.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-4 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7003-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3467-1 vom 2024-09-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019532.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7001" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3499-1 vom 2024-09-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019536.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-5 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7003-5" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12779.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16", "url": "https://ubuntu.com/security/notices/USN-7069-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7069-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7174634" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7089-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7090-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7090-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7089-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8870" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8856" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8856.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-3 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7089-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7095-1 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7095-1" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8870" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-4 vom 2024-11-13", "url": "https://ubuntu.com/security/notices/USN-7089-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7089-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-6 vom 2024-11-15", "url": "https://ubuntu.com/security/notices/USN-7089-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-7 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7089-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10274 vom 2024-11-26", "url": "https://access.redhat.com/errata/RHSA-2024:10274" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25", "url": "https://ubuntu.com/security/notices/USN-7121-3" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10274 vom 2024-11-27", "url": "https://linux.oracle.com/errata/ELSA-2024-10274.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10772 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10772" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10773 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10773" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10771 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10771" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10", "url": "https://ubuntu.com/security/notices/USN-7148-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7159-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7159-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7159-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7166-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-4 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7159-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-5 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7159-5" }, { "category": "external", "summary": "IBM Security Bulletin 7180361 vom 2025-01-07", "url": "https://www.ibm.com/support/pages/node/7180361" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7195-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14", "url": "https://ubuntu.com/security/notices/USN-7195-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-1 vom 2025-01-28", "url": "https://ubuntu.com/security/notices/USN-7233-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-2 vom 2025-01-30", "url": "https://ubuntu.com/security/notices/USN-7233-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-3 vom 2025-02-03", "url": "https://ubuntu.com/security/notices/USN-7233-3" }, { "category": "external", "summary": "IBM Security Bulletin 7182335 vom 2025-02-03", "url": "https://www.ibm.com/support/pages/node/7182335" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-1 vom 2025-02-10", "url": "https://ubuntu.com/security/notices/USN-7262-1" }, { "category": "external", "summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7289-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-2 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7262-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7288-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7288-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7293-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7293-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7291-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7291-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7294-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7295-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7289-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7294-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7308-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7294-3" }, { "category": "external", "summary": "Debian Security Advisory DLA-4076 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03", "url": "https://ubuntu.com/security/notices/USN-7294-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1027-1 vom 2025-03-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7393-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7401-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7413-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7458-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-9080 vom 2025-06-18", "url": "http://linux.oracle.com/errata/ELSA-2025-9080.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02391-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021880.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02398-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZIQSMDCERQHP4JSQ3YSIO5TMBD637EV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02392-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021879.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02403-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXLF63OLKSA5LWF3BYMVRASA55GHVYJY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02390-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021881.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02419-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02422-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021884.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02440-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON72ZMOEO6E3K3KZFRVFHX5LUYA6RAXJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02455-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2GXZ2EL5OVKMNFWDPFV7NT367YYOFZO/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02436-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOC4XFCSYMATM6FYIQWRDFK5AQF4P2LT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02416-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021890.html" }, { "category": "external", "summary": "IBM Security Bulletin 7241167 vom 2025-07-30", "url": "https://www.ibm.com/support/pages/node/7241167" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff", "tracking": { "current_release_date": "2025-07-30T22:00:00.000+00:00", "generator": { "date": "2025-07-31T07:59:45.474+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-1788", "initial_release_date": "2024-08-07T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-08-12T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-09-10T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-09-16T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-22T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-23T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat, Ubuntu und SUSE aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Rocky Enterprise Software Foundation und SUSE aufgenommen" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-06T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-28T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-08T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-14T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-21T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-28T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-30T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-03T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu und IBM aufgenommen" }, { "date": "2025-02-10T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von BROCADE aufgenommen" }, { "date": "2025-02-24T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-26T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "73", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "73" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Broadcom Brocade SANnav", "product": { "name": "Broadcom Brocade SANnav", "product_id": "T034392", "product_identification_helper": { "cpe": "cpe:/a:broadcom:brocade_sannav:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01", "product_id": "T038741" } }, { "category": "product_version", "name": "7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP10 IF01", "product_id": "T038741-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP11", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11", "product_id": "T040749" } }, { "category": "product_version", "name": "7.5.0 UP11", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11", "product_id": "T040749-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.6.4", "product_id": "T040030" } }, { "category": "product_version", "name": "10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus 10.1.6.4", "product_id": "T040030-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4" } } } ], "category": "product_name", "name": "Spectrum Protect Plus" }, { "branches": [ { "category": "product_version_range", "name": "\u003c6.1.9.6", "product": { "name": "IBM Storage Scale System \u003c6.1.9.6", "product_id": "T041757" } }, { "category": "product_version", "name": "6.1.9.6", "product": { "name": "IBM Storage Scale System 6.1.9.6", "product_id": "T041757-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.6" } } }, { "category": "product_version_range", "name": "\u003c6.2.2.1", "product": { "name": "IBM Storage Scale System \u003c6.2.2.1", "product_id": "T041759" } }, { "category": "product_version", "name": "6.2.2.1", "product": { "name": "IBM Storage Scale System 6.2.2.1", "product_id": "T041759-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.2.2.1" } } } ], "category": "product_name", "name": "Storage Scale System" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.10", "product": { "name": "Open Source Linux Kernel \u003c6.10", "product_id": "T036648" } }, { "category": "product_version", "name": "6.1", "product": { "name": "Open Source Linux Kernel 6.10", "product_id": "T036648-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.10" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-42232", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42232" }, { "cve": "CVE-2024-42233", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42233" }, { "cve": "CVE-2024-42234", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42234" }, { "cve": "CVE-2024-42235", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42235" }, { "cve": "CVE-2024-42236", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42236" }, { "cve": "CVE-2024-42237", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42237" }, { "cve": "CVE-2024-42238", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42238" }, { "cve": "CVE-2024-42239", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42239" }, { "cve": "CVE-2024-42240", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42240" }, { "cve": "CVE-2024-42241", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42241" }, { "cve": "CVE-2024-42242", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42242" }, { "cve": "CVE-2024-42243", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42243" }, { "cve": "CVE-2024-42244", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42244" }, { "cve": "CVE-2024-42245", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42245" }, { "cve": "CVE-2024-42246", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42246" }, { "cve": "CVE-2024-42247", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42247" }, { "cve": "CVE-2024-42248", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42248" }, { "cve": "CVE-2024-42249", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42249" }, { "cve": "CVE-2024-42250", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42250" }, { "cve": "CVE-2024-42251", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42251" }, { "cve": "CVE-2024-42252", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42252" }, { "cve": "CVE-2024-42253", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42253" }, { "cve": "CVE-2024-42254", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42254" }, { "cve": "CVE-2024-42255", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42255" }, { "cve": "CVE-2024-42256", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42256" }, { "cve": "CVE-2024-42257", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42257" } ] }
WID-SEC-W-2024-1788
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1788 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1788.json" }, { "category": "self", "summary": "WID-SEC-2024-1788 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1788" }, { "category": "external", "summary": "Linux CVE Announce vom 2024-08-07", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5747 vom 2024-08-12", "url": "https://security-tracker.debian.org/tracker/DSA-5747-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12610 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12610.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12612 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12612.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12618 vom 2024-09-12", "url": "https://linux.oracle.com/errata/ELSA-2024-12618.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7003-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3227-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019430.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7006-1 vom 2024-09-12", "url": "https://ubuntu.com/security/notices/USN-7006-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3225-1 vom 2024-09-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019432.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-3 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7003-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-1 vom 2024-09-13", "url": "https://ubuntu.com/security/notices/USN-7007-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3249-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019438.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6745 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6745" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6744 vom 2024-09-18", "url": "https://access.redhat.com/errata/RHSA-2024:6744" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-2 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7007-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6997" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7007-3 vom 2024-09-23", "url": "https://ubuntu.com/security/notices/USN-7007-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7001" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:7000" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3408-1 vom 2024-09-24", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TGC7PQ5QNGEZWYIHCKH2KPZMGYJ4VN6B/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7009-2 vom 2024-09-25", "url": "https://ubuntu.com/security/notices/USN-7009-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-6997 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-6997.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26", "url": "https://linux.oracle.com/errata/ELSA-2024-7000.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-4 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7003-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3467-1 vom 2024-09-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019532.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7001" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3499-1 vom 2024-09-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019536.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7003-5 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7003-5" }, { "category": "external", "summary": "Debian Security Advisory DLA-3912 vom 2024-10-07", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14", "url": "https://linux.oracle.com/errata/ELSA-2024-12779.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16", "url": "https://ubuntu.com/security/notices/USN-7069-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17", "url": "https://ubuntu.com/security/notices/USN-7069-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31", "url": "https://ubuntu.com/security/notices/USN-7088-1" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7174634" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7089-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7090-1 vom 2024-11-01", "url": "https://ubuntu.com/security/notices/USN-7090-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7088-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-2 vom 2024-11-04", "url": "https://ubuntu.com/security/notices/USN-7089-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8870" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05", "url": "https://access.redhat.com/errata/RHSA-2024:8856" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06", "url": "https://linux.oracle.com/errata/ELSA-2024-8856.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06", "url": "https://ubuntu.com/security/notices/USN-7088-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-3 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7089-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7095-1 vom 2024-11-07", "url": "https://ubuntu.com/security/notices/USN-7095-1" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8870" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11", "url": "https://ubuntu.com/security/notices/USN-7100-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12", "url": "https://ubuntu.com/security/notices/USN-7100-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-4 vom 2024-11-13", "url": "https://ubuntu.com/security/notices/USN-7089-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7089-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14", "url": "https://ubuntu.com/security/notices/USN-7088-5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-6 vom 2024-11-15", "url": "https://ubuntu.com/security/notices/USN-7089-6" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7119-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7089-7 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7089-7" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20", "url": "https://ubuntu.com/security/notices/USN-7121-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10274 vom 2024-11-26", "url": "https://access.redhat.com/errata/RHSA-2024:10274" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25", "url": "https://ubuntu.com/security/notices/USN-7121-3" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-10274 vom 2024-11-27", "url": "https://linux.oracle.com/errata/ELSA-2024-10274.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10772 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10772" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10773 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10773" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10771 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10771" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09", "url": "https://ubuntu.com/security/notices/USN-7144-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10", "url": "https://ubuntu.com/security/notices/USN-7148-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7156-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-1 vom 2024-12-12", "url": "https://ubuntu.com/security/notices/USN-7159-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-17", "url": "https://ubuntu.com/security/notices/USN-7159-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7159-3" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18", "url": "https://ubuntu.com/security/notices/USN-7166-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-4 vom 2024-12-20", "url": "https://ubuntu.com/security/notices/USN-7159-4" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7159-5 vom 2025-01-06", "url": "https://ubuntu.com/security/notices/USN-7159-5" }, { "category": "external", "summary": "IBM Security Bulletin 7180361 vom 2025-01-07", "url": "https://www.ibm.com/support/pages/node/7180361" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09", "url": "https://ubuntu.com/security/notices/USN-7195-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14", "url": "https://ubuntu.com/security/notices/USN-7195-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-1 vom 2025-01-28", "url": "https://ubuntu.com/security/notices/USN-7233-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-2 vom 2025-01-30", "url": "https://ubuntu.com/security/notices/USN-7233-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7233-3 vom 2025-02-03", "url": "https://ubuntu.com/security/notices/USN-7233-3" }, { "category": "external", "summary": "IBM Security Bulletin 7182335 vom 2025-02-03", "url": "https://www.ibm.com/support/pages/node/7182335" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-1 vom 2025-02-10", "url": "https://ubuntu.com/security/notices/USN-7262-1" }, { "category": "external", "summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7289-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7262-2 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7262-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24", "url": "https://ubuntu.com/security/notices/USN-7288-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7288-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-2 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7293-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7293-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7291-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7291-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7289-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7294-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25", "url": "https://ubuntu.com/security/notices/USN-7295-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7289-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7294-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27", "url": "https://ubuntu.com/security/notices/USN-7308-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28", "url": "https://ubuntu.com/security/notices/USN-7294-3" }, { "category": "external", "summary": "Debian Security Advisory DLA-4076 vom 2025-03-01", "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03", "url": "https://ubuntu.com/security/notices/USN-7294-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1027-1 vom 2025-03-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27", "url": "https://ubuntu.com/security/notices/USN-7388-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7390-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7393-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28", "url": "https://ubuntu.com/security/notices/USN-7389-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01", "url": "https://ubuntu.com/security/notices/USN-7401-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03", "url": "https://ubuntu.com/security/notices/USN-7413-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24", "url": "https://ubuntu.com/security/notices/USN-7458-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:6966" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7540-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28", "url": "https://ubuntu.com/security/notices/USN-7539-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-9080 vom 2025-06-18", "url": "http://linux.oracle.com/errata/ELSA-2025-9080.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02391-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021880.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02398-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZIQSMDCERQHP4JSQ3YSIO5TMBD637EV/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02392-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021879.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02403-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXLF63OLKSA5LWF3BYMVRASA55GHVYJY/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02390-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021881.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02419-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02422-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021884.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02440-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ON72ZMOEO6E3K3KZFRVFHX5LUYA6RAXJ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02455-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2GXZ2EL5OVKMNFWDPFV7NT367YYOFZO/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02436-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOC4XFCSYMATM6FYIQWRDFK5AQF4P2LT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02416-1 vom 2025-07-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021890.html" }, { "category": "external", "summary": "IBM Security Bulletin 7241167 vom 2025-07-30", "url": "https://www.ibm.com/support/pages/node/7241167" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff", "tracking": { "current_release_date": "2025-07-30T22:00:00.000+00:00", "generator": { "date": "2025-07-31T07:59:45.474+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-1788", "initial_release_date": "2024-08-07T22:00:00.000+00:00", "revision_history": [ { "date": "2024-08-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-08-12T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-09-10T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE und Ubuntu aufgenommen" }, { "date": "2024-09-16T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-17T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-22T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-23T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat, Ubuntu und SUSE aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Rocky Enterprise Software Foundation und SUSE aufgenommen" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-10-08T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-15T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2024-11-05T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-06T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-14T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-28T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-12-22T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-08T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-14T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-21T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-28T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-01-30T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-03T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Ubuntu und IBM aufgenommen" }, { "date": "2025-02-10T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von BROCADE aufgenommen" }, { "date": "2025-02-24T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-25T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-11T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-26T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-17T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "73", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "73" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Broadcom Brocade SANnav", "product": { "name": "Broadcom Brocade SANnav", "product_id": "T034392", "product_identification_helper": { "cpe": "cpe:/a:broadcom:brocade_sannav:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01", "product_id": "T038741" } }, { "category": "product_version", "name": "7.5.0 UP10 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP10 IF01", "product_id": "T038741-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP11", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11", "product_id": "T040749" } }, { "category": "product_version", "name": "7.5.0 UP11", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11", "product_id": "T040749-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus \u003c10.1.6.4", "product_id": "T040030" } }, { "category": "product_version", "name": "10.1.6.4", "product": { "name": "IBM Spectrum Protect Plus 10.1.6.4", "product_id": "T040030-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4" } } } ], "category": "product_name", "name": "Spectrum Protect Plus" }, { "branches": [ { "category": "product_version_range", "name": "\u003c6.1.9.6", "product": { "name": "IBM Storage Scale System \u003c6.1.9.6", "product_id": "T041757" } }, { "category": "product_version", "name": "6.1.9.6", "product": { "name": "IBM Storage Scale System 6.1.9.6", "product_id": "T041757-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.6" } } }, { "category": "product_version_range", "name": "\u003c6.2.2.1", "product": { "name": "IBM Storage Scale System \u003c6.2.2.1", "product_id": "T041759" } }, { "category": "product_version", "name": "6.2.2.1", "product": { "name": "IBM Storage Scale System 6.2.2.1", "product_id": "T041759-fixed", "product_identification_helper": { "cpe": "cpe:/h:ibm:storage_scale_system:6.2.2.1" } } } ], "category": "product_name", "name": "Storage Scale System" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.10", "product": { "name": "Open Source Linux Kernel \u003c6.10", "product_id": "T036648" } }, { "category": "product_version", "name": "6.1", "product": { "name": "Open Source Linux Kernel 6.10", "product_id": "T036648-fixed", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.10" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-42232", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42232" }, { "cve": "CVE-2024-42233", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42233" }, { "cve": "CVE-2024-42234", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42234" }, { "cve": "CVE-2024-42235", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42235" }, { "cve": "CVE-2024-42236", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42236" }, { "cve": "CVE-2024-42237", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42237" }, { "cve": "CVE-2024-42238", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42238" }, { "cve": "CVE-2024-42239", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42239" }, { "cve": "CVE-2024-42240", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42240" }, { "cve": "CVE-2024-42241", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42241" }, { "cve": "CVE-2024-42242", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42242" }, { "cve": "CVE-2024-42243", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42243" }, { "cve": "CVE-2024-42244", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42244" }, { "cve": "CVE-2024-42245", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42245" }, { "cve": "CVE-2024-42246", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42246" }, { "cve": "CVE-2024-42247", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42247" }, { "cve": "CVE-2024-42248", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42248" }, { "cve": "CVE-2024-42249", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42249" }, { "cve": "CVE-2024-42250", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42250" }, { "cve": "CVE-2024-42251", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42251" }, { "cve": "CVE-2024-42252", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42252" }, { "cve": "CVE-2024-42253", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42253" }, { "cve": "CVE-2024-42254", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42254" }, { "cve": "CVE-2024-42255", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42255" }, { "cve": "CVE-2024-42256", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42256" }, { "cve": "CVE-2024-42257", "product_status": { "known_affected": [ "T040749", "67646", "T041759", "T036648", "T041757", "T004914", "T032255", "T038741", "T040030", "2951", "T002207", "T034392", "T000126" ] }, "release_date": "2024-08-07T22:00:00.000+00:00", "title": "CVE-2024-42257" } ] }
fkie_cve-2024-42234
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352", "versionEndExcluding": "6.9.10", "versionStartIncluding": "6.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix crashes from deferred split racing folio migration\n\nEven on 6.10-rc6, I\u0027ve been seeing elusive \"Bad page state\"s (often on\nflags when freeing, yet the flags shown are not bad: PG_locked had been\nset and cleared??), and VM_BUG_ON_PAGE(page_ref_count(page) == 0)s from\ndeferred_split_scan()\u0027s folio_put(), and a variety of other BUG and WARN\nsymptoms implying double free by deferred split and large folio migration.\n\n6.7 commit 9bcef5973e31 (\"mm: memcg: fix split queue list crash when large\nfolio migration\") was right to fix the memcg-dependent locking broken in\n85ce2c517ade (\"memcontrol: only transfer the memcg data for migration\"),\nbut missed a subtlety of deferred_split_scan(): it moves folios to its own\nlocal list to work on them without split_queue_lock, during which time\nfolio-\u003e_deferred_list is not empty, but even the \"right\" lock does nothing\nto secure the folio and the list it is on.\n\nFortunately, deferred_split_scan() is careful to use folio_try_get(): so\nfolio_migrate_mapping() can avoid the race by folio_undo_large_rmappable()\nwhile the old folio\u0027s reference count is temporarily frozen to 0 - adding\nsuch a freeze in the !mapping case too (originally, folio lock and\nunmapping and no swap cache left an anon folio unreachable, so no freezing\nwas needed there: but the deferred split queue offers a way to reach it)." }, { "lang": "es", "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm: corrige fallas debido a la migraci\u00f3n diferida de folios de ejecuciones divididas Incluso en 6.10-rc6, he estado viendo \"estados de p\u00e1gina incorrectos\" esquivos (a menudo en indicadores al liberar, pero los indicadores mostrados no son malos: \u00bfPG_locked se hab\u00eda configurado y borrado?), y VM_BUG_ON_PAGE(page_ref_count(page) == 0)s de folio_put() de deferred_split_scan(), y una variedad de otros s\u00edntomas de ERROR y ADVERTENCIA que implican doble liberaci\u00f3n por divisi\u00f3n diferida y migraci\u00f3n de folios grandes. 6.7 el commit 9bcef5973e31 (\"mm: memcg: corregir el bloqueo de la lista de colas divididas cuando se migra un folio grande\") ten\u00eda raz\u00f3n al corregir el bloqueo dependiente de memcg roto en 85ce2c517ade (\"memcontrol: transferir solo los datos de memcg para la migraci\u00f3n\"), pero omiti\u00f3 una sutileza de deferred_split_scan(): mueve las publicaciones a su propia lista local para trabajar en ellas sin split_queue_lock, tiempo durante el cual folio-\u0026gt;_deferred_list no est\u00e1 vac\u00edo, pero ni siquiera el bloqueo \"derecho\" hace nada para proteger la publicaci\u00f3n y la lista en la que se encuentra. Afortunadamente, deferred_split_scan() tiene cuidado al usar folio_try_get(): por lo que folio_migrate_mapping() puede evitar la ejecuci\u00f3n mediante folio_undo_large_rmappable() mientras el recuento de referencias de la publicaci\u00f3n anterior se congela temporalmente en 0; agregando dicha congelaci\u00f3n tambi\u00e9n en el caso de !mapping (originalmente, El bloqueo y la desasignaci\u00f3n de folios y la falta de cach\u00e9 de intercambio dejaron un folio an\u00f3nimo inalcanzable, por lo que no fue necesario congelarlo all\u00ed: pero la cola dividida diferida ofrece una forma de acceder a \u00e9l)." } ], "id": "CVE-2024-42234", "lastModified": "2024-08-08T14:55:29.913", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-07T16:15:46.390", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/be9581ea8c058d81154251cb0695987098996cad" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/fc7facce686b64201dbf0b9614cc1d0bfad70010" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-6p6f-gc59-4w3f
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
mm: fix crashes from deferred split racing folio migration
Even on 6.10-rc6, I've been seeing elusive "Bad page state"s (often on flags when freeing, yet the flags shown are not bad: PG_locked had been set and cleared??), and VM_BUG_ON_PAGE(page_ref_count(page) == 0)s from deferred_split_scan()'s folio_put(), and a variety of other BUG and WARN symptoms implying double free by deferred split and large folio migration.
6.7 commit 9bcef5973e31 ("mm: memcg: fix split queue list crash when large folio migration") was right to fix the memcg-dependent locking broken in 85ce2c517ade ("memcontrol: only transfer the memcg data for migration"), but missed a subtlety of deferred_split_scan(): it moves folios to its own local list to work on them without split_queue_lock, during which time folio->_deferred_list is not empty, but even the "right" lock does nothing to secure the folio and the list it is on.
Fortunately, deferred_split_scan() is careful to use folio_try_get(): so folio_migrate_mapping() can avoid the race by folio_undo_large_rmappable() while the old folio's reference count is temporarily frozen to 0 - adding such a freeze in the !mapping case too (originally, folio lock and unmapping and no swap cache left an anon folio unreachable, so no freezing was needed there: but the deferred split queue offers a way to reach it).
{ "affected": [], "aliases": [ "CVE-2024-42234" ], "database_specific": { "cwe_ids": [ "CWE-415" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-08-07T16:15:46Z", "severity": "MODERATE" }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix crashes from deferred split racing folio migration\n\nEven on 6.10-rc6, I\u0027ve been seeing elusive \"Bad page state\"s (often on\nflags when freeing, yet the flags shown are not bad: PG_locked had been\nset and cleared??), and VM_BUG_ON_PAGE(page_ref_count(page) == 0)s from\ndeferred_split_scan()\u0027s folio_put(), and a variety of other BUG and WARN\nsymptoms implying double free by deferred split and large folio migration.\n\n6.7 commit 9bcef5973e31 (\"mm: memcg: fix split queue list crash when large\nfolio migration\") was right to fix the memcg-dependent locking broken in\n85ce2c517ade (\"memcontrol: only transfer the memcg data for migration\"),\nbut missed a subtlety of deferred_split_scan(): it moves folios to its own\nlocal list to work on them without split_queue_lock, during which time\nfolio-\u003e_deferred_list is not empty, but even the \"right\" lock does nothing\nto secure the folio and the list it is on.\n\nFortunately, deferred_split_scan() is careful to use folio_try_get(): so\nfolio_migrate_mapping() can avoid the race by folio_undo_large_rmappable()\nwhile the old folio\u0027s reference count is temporarily frozen to 0 - adding\nsuch a freeze in the !mapping case too (originally, folio lock and\nunmapping and no swap cache left an anon folio unreachable, so no freezing\nwas needed there: but the deferred split queue offers a way to reach it).", "id": "GHSA-6p6f-gc59-4w3f", "modified": "2024-08-08T15:31:28Z", "published": "2024-08-07T18:30:43Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42234" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/be9581ea8c058d81154251cb0695987098996cad" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/fc7facce686b64201dbf0b9614cc1d0bfad70010" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.